43b6b6b2a4
* IDForwading: Set authenticated by for users
89 lines
2.9 KiB
Go
89 lines
2.9 KiB
Go
package idimpl
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/remotecache"
|
|
"github.com/grafana/grafana/pkg/services/auth"
|
|
"github.com/grafana/grafana/pkg/services/auth/idtest"
|
|
"github.com/grafana/grafana/pkg/services/authn"
|
|
"github.com/grafana/grafana/pkg/services/authn/authntest"
|
|
"github.com/grafana/grafana/pkg/services/featuremgmt"
|
|
"github.com/grafana/grafana/pkg/services/login"
|
|
"github.com/grafana/grafana/pkg/services/login/authinfotest"
|
|
"github.com/grafana/grafana/pkg/services/user"
|
|
"github.com/grafana/grafana/pkg/setting"
|
|
)
|
|
|
|
func Test_ProvideService(t *testing.T) {
|
|
t.Run("should register post auth hook when feature flag is enabled", func(t *testing.T) {
|
|
features := featuremgmt.WithFeatures(featuremgmt.FlagIdForwarding)
|
|
|
|
var hookRegistered bool
|
|
authnService := &authntest.MockService{
|
|
RegisterPostAuthHookFunc: func(_ authn.PostAuthHookFn, _ uint) {
|
|
hookRegistered = true
|
|
},
|
|
}
|
|
|
|
_ = ProvideService(setting.NewCfg(), nil, nil, features, authnService, nil, nil)
|
|
assert.True(t, hookRegistered)
|
|
})
|
|
|
|
t.Run("should not register post auth hook when feature flag is disabled", func(t *testing.T) {
|
|
features := featuremgmt.WithFeatures()
|
|
|
|
var hookRegistered bool
|
|
authnService := &authntest.MockService{
|
|
RegisterPostAuthHookFunc: func(_ authn.PostAuthHookFn, _ uint) {
|
|
hookRegistered = true
|
|
},
|
|
}
|
|
|
|
_ = ProvideService(setting.NewCfg(), nil, nil, features, authnService, nil, nil)
|
|
assert.False(t, hookRegistered)
|
|
})
|
|
}
|
|
|
|
func TestService_SignIdentity(t *testing.T) {
|
|
signer := &idtest.MockSigner{
|
|
SignIDTokenFn: func(_ context.Context, claims *auth.IDClaims) (string, error) {
|
|
data, err := json.Marshal(claims)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
return string(data), nil
|
|
},
|
|
}
|
|
|
|
t.Run("should sing identity", func(t *testing.T) {
|
|
s := ProvideService(
|
|
setting.NewCfg(), signer, remotecache.NewFakeCacheStorage(),
|
|
featuremgmt.WithFeatures(featuremgmt.FlagIdForwarding),
|
|
&authntest.FakeService{}, &authinfotest.FakeService{ExpectedError: user.ErrUserNotFound}, nil,
|
|
)
|
|
token, err := s.SignIdentity(context.Background(), &authn.Identity{ID: "user:1"})
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, token)
|
|
})
|
|
|
|
t.Run("should sing identity with authenticated by if user is externally authenticated", func(t *testing.T) {
|
|
s := ProvideService(
|
|
setting.NewCfg(), signer, remotecache.NewFakeCacheStorage(),
|
|
featuremgmt.WithFeatures(featuremgmt.FlagIdForwarding),
|
|
&authntest.FakeService{}, &authinfotest.FakeService{ExpectedUserAuth: &login.UserAuth{AuthModule: login.AzureADAuthModule}}, nil,
|
|
)
|
|
token, err := s.SignIdentity(context.Background(), &authn.Identity{ID: "user:1"})
|
|
require.NoError(t, err)
|
|
|
|
claims := &auth.IDClaims{}
|
|
require.NoError(t, json.Unmarshal([]byte(token), claims))
|
|
assert.Equal(t, login.AzureADAuthModule, claims.AuthenticatedBy)
|
|
})
|
|
}
|