mirror of
https://github.com/pocket-id/pocket-id.git
synced 2025-12-10 01:10:42 +03:00
408 lines
13 KiB
Go
408 lines
13 KiB
Go
//go:build e2etest
|
|
|
|
package service
|
|
|
|
import (
|
|
"context"
|
|
"crypto/ecdsa"
|
|
"crypto/x509"
|
|
"encoding/base64"
|
|
"fmt"
|
|
"log"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"github.com/fxamacker/cbor/v2"
|
|
"github.com/go-webauthn/webauthn/protocol"
|
|
"github.com/lestrrat-go/jwx/v3/jwk"
|
|
"gorm.io/gorm"
|
|
|
|
"github.com/pocket-id/pocket-id/backend/internal/common"
|
|
"github.com/pocket-id/pocket-id/backend/internal/model"
|
|
datatype "github.com/pocket-id/pocket-id/backend/internal/model/types"
|
|
"github.com/pocket-id/pocket-id/backend/internal/utils"
|
|
"github.com/pocket-id/pocket-id/backend/resources"
|
|
)
|
|
|
|
type TestService struct {
|
|
db *gorm.DB
|
|
jwtService *JwtService
|
|
appConfigService *AppConfigService
|
|
ldapService *LdapService
|
|
}
|
|
|
|
func NewTestService(db *gorm.DB, appConfigService *AppConfigService, jwtService *JwtService, ldapService *LdapService) *TestService {
|
|
return &TestService{db: db, appConfigService: appConfigService, jwtService: jwtService, ldapService: ldapService}
|
|
}
|
|
|
|
//nolint:gocognit
|
|
func (s *TestService) SeedDatabase() error {
|
|
err := s.db.Transaction(func(tx *gorm.DB) error {
|
|
users := []model.User{
|
|
{
|
|
Base: model.Base{
|
|
ID: "f4b89dc2-62fb-46bf-9f5f-c34f4eafe93e",
|
|
},
|
|
Username: "tim",
|
|
Email: "tim.cook@test.com",
|
|
FirstName: "Tim",
|
|
LastName: "Cook",
|
|
IsAdmin: true,
|
|
},
|
|
{
|
|
Base: model.Base{
|
|
ID: "1cd19686-f9a6-43f4-a41f-14a0bf5b4036",
|
|
},
|
|
Username: "craig",
|
|
Email: "craig.federighi@test.com",
|
|
FirstName: "Craig",
|
|
LastName: "Federighi",
|
|
IsAdmin: false,
|
|
},
|
|
}
|
|
for _, user := range users {
|
|
if err := tx.Create(&user).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
oneTimeAccessTokens := []model.OneTimeAccessToken{{
|
|
Base: model.Base{
|
|
ID: "bf877753-4ea4-4c9c-bbbd-e198bb201cb8",
|
|
},
|
|
Token: "HPe6k6uiDRRVuAQV",
|
|
ExpiresAt: datatype.DateTime(time.Now().Add(1 * time.Hour)),
|
|
UserID: users[0].ID,
|
|
},
|
|
{
|
|
Base: model.Base{
|
|
ID: "d3afae24-fe2d-4a98-abec-cf0b8525096a",
|
|
},
|
|
Token: "YCGDtftvsvYWiXd0",
|
|
ExpiresAt: datatype.DateTime(time.Now().Add(-1 * time.Second)), // expired
|
|
UserID: users[0].ID,
|
|
},
|
|
}
|
|
for _, token := range oneTimeAccessTokens {
|
|
if err := tx.Create(&token).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
userGroups := []model.UserGroup{
|
|
{
|
|
Base: model.Base{
|
|
ID: "c7ae7c01-28a3-4f3c-9572-1ee734ea8368",
|
|
},
|
|
Name: "developers",
|
|
FriendlyName: "Developers",
|
|
Users: []model.User{users[0], users[1]},
|
|
},
|
|
{
|
|
Base: model.Base{
|
|
ID: "adab18bf-f89d-4087-9ee1-70ff15b48211",
|
|
},
|
|
Name: "designers",
|
|
FriendlyName: "Designers",
|
|
Users: []model.User{users[0]},
|
|
},
|
|
}
|
|
for _, group := range userGroups {
|
|
if err := tx.Create(&group).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
oidcClients := []model.OidcClient{
|
|
{
|
|
Base: model.Base{
|
|
ID: "3654a746-35d4-4321-ac61-0bdcff2b4055",
|
|
},
|
|
Name: "Nextcloud",
|
|
Secret: "$2a$10$9dypwot8nGuCjT6wQWWpJOckZfRprhe2EkwpKizxS/fpVHrOLEJHC", // w2mUeZISmEvIDMEDvpY0PnxQIpj1m3zY
|
|
CallbackURLs: model.UrlList{"http://nextcloud/auth/callback"},
|
|
LogoutCallbackURLs: model.UrlList{"http://nextcloud/auth/logout/callback"},
|
|
ImageType: utils.StringPointer("png"),
|
|
CreatedByID: users[0].ID,
|
|
},
|
|
{
|
|
Base: model.Base{
|
|
ID: "606c7782-f2b1-49e5-8ea9-26eb1b06d018",
|
|
},
|
|
Name: "Immich",
|
|
Secret: "$2a$10$Ak.FP8riD1ssy2AGGbG.gOpnp/rBpymd74j0nxNMtW0GG1Lb4gzxe", // PYjrE9u4v9GVqXKi52eur0eb2Ci4kc0x
|
|
CallbackURLs: model.UrlList{"http://immich/auth/callback"},
|
|
CreatedByID: users[1].ID,
|
|
AllowedUserGroups: []model.UserGroup{
|
|
userGroups[1],
|
|
},
|
|
},
|
|
}
|
|
for _, client := range oidcClients {
|
|
if err := tx.Create(&client).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
authCode := model.OidcAuthorizationCode{
|
|
Code: "auth-code",
|
|
Scope: "openid profile",
|
|
Nonce: "nonce",
|
|
ExpiresAt: datatype.DateTime(time.Now().Add(1 * time.Hour)),
|
|
UserID: users[0].ID,
|
|
ClientID: oidcClients[0].ID,
|
|
}
|
|
if err := tx.Create(&authCode).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
refreshToken := model.OidcRefreshToken{
|
|
Token: utils.CreateSha256Hash("ou87UDg249r1StBLYkMEqy9TXDbV5HmGuDpMcZDo"),
|
|
ExpiresAt: datatype.DateTime(time.Now().Add(24 * time.Hour)),
|
|
Scope: "openid profile email",
|
|
UserID: users[0].ID,
|
|
ClientID: oidcClients[0].ID,
|
|
}
|
|
if err := tx.Create(&refreshToken).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
accessToken := model.OneTimeAccessToken{
|
|
Token: "one-time-token",
|
|
ExpiresAt: datatype.DateTime(time.Now().Add(1 * time.Hour)),
|
|
UserID: users[0].ID,
|
|
}
|
|
if err := tx.Create(&accessToken).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
userAuthorizedClient := model.UserAuthorizedOidcClient{
|
|
Scope: "openid profile email",
|
|
UserID: users[0].ID,
|
|
ClientID: oidcClients[0].ID,
|
|
}
|
|
if err := tx.Create(&userAuthorizedClient).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
// To generate a new key pair, run the following command:
|
|
// openssl genpkey -algorithm EC -pkeyopt ec_paramgen_curve:P-256 | \
|
|
// openssl pkcs8 -topk8 -nocrypt | tee >(openssl pkey -pubout)
|
|
|
|
publicKeyPasskey1, _ := s.getCborPublicKey("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEwcOo5KV169KR67QEHrcYkeXE3CCxv2BgwnSq4VYTQxyLtdmKxegexa8JdwFKhKXa2BMI9xaN15BoL6wSCRFJhg==")
|
|
publicKeyPasskey2, _ := s.getCborPublicKey("MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEj4qA0PrZzg8Co1C27nyUbzrp8Ewjr7eOlGI2LfrzmbL5nPhZRAdJ3hEaqrHMSnJBhfMqtQGKwDYpaLIQFAKLhw==")
|
|
webauthnCredentials := []model.WebauthnCredential{
|
|
{
|
|
Name: "Passkey 1",
|
|
CredentialID: []byte("test-credential-tim"),
|
|
PublicKey: publicKeyPasskey1,
|
|
AttestationType: "none",
|
|
Transport: model.AuthenticatorTransportList{protocol.Internal},
|
|
UserID: users[0].ID,
|
|
},
|
|
{
|
|
Name: "Passkey 2",
|
|
CredentialID: []byte("test-credential-craig"),
|
|
PublicKey: publicKeyPasskey2,
|
|
AttestationType: "none",
|
|
Transport: model.AuthenticatorTransportList{protocol.Internal},
|
|
UserID: users[1].ID,
|
|
},
|
|
}
|
|
for _, credential := range webauthnCredentials {
|
|
if err := tx.Create(&credential).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
webauthnSession := model.WebauthnSession{
|
|
Challenge: "challenge",
|
|
ExpiresAt: datatype.DateTime(time.Now().Add(1 * time.Hour)),
|
|
UserVerification: "preferred",
|
|
}
|
|
if err := tx.Create(&webauthnSession).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
apiKey := model.ApiKey{
|
|
Base: model.Base{
|
|
ID: "5f1fa856-c164-4295-961e-175a0d22d725",
|
|
},
|
|
Name: "Test API Key",
|
|
Key: "6c34966f57ef2bb7857649aff0e7ab3ad67af93c846342ced3f5a07be8706c20",
|
|
UserID: users[0].ID,
|
|
}
|
|
if err := tx.Create(&apiKey).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
})
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s *TestService) ResetDatabase() error {
|
|
err := s.db.Transaction(func(tx *gorm.DB) error {
|
|
var tables []string
|
|
|
|
switch common.EnvConfig.DbProvider {
|
|
case common.DbProviderSqlite:
|
|
// Query to get all tables for SQLite
|
|
if err := tx.Raw("SELECT name FROM sqlite_master WHERE type='table' AND name NOT LIKE 'sqlite_%' AND name != 'schema_migrations';").Scan(&tables).Error; err != nil {
|
|
return err
|
|
}
|
|
case common.DbProviderPostgres:
|
|
// Query to get all tables for PostgreSQL
|
|
if err := tx.Raw(`
|
|
SELECT tablename
|
|
FROM pg_tables
|
|
WHERE schemaname = 'public' AND tablename != 'schema_migrations';
|
|
`).Scan(&tables).Error; err != nil {
|
|
return err
|
|
}
|
|
default:
|
|
return fmt.Errorf("unsupported database provider: %s", common.EnvConfig.DbProvider)
|
|
}
|
|
|
|
// Delete all rows from all tables
|
|
for _, table := range tables {
|
|
if err := tx.Exec(fmt.Sprintf("DELETE FROM %s;", table)).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
})
|
|
|
|
return err
|
|
}
|
|
|
|
func (s *TestService) ResetApplicationImages() error {
|
|
if err := os.RemoveAll(common.EnvConfig.UploadPath); err != nil {
|
|
log.Printf("Error removing directory: %v", err)
|
|
return err
|
|
}
|
|
|
|
files, err := resources.FS.ReadDir("images")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, file := range files {
|
|
srcFilePath := filepath.Join("images", file.Name())
|
|
destFilePath := filepath.Join(common.EnvConfig.UploadPath, "application-images", file.Name())
|
|
|
|
err := utils.CopyEmbeddedFileToDisk(srcFilePath, destFilePath)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (s *TestService) ResetAppConfig(ctx context.Context) error {
|
|
// Reset all app config variables to their default values in the database
|
|
err := s.db.Session(&gorm.Session{AllowGlobalUpdate: true}).Model(&model.AppConfigVariable{}).Update("value", "").Error
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Reload the app config from the database after resetting the values
|
|
return s.appConfigService.LoadDbConfig(ctx)
|
|
}
|
|
|
|
func (s *TestService) SetJWTKeys() {
|
|
const privateKeyString = `{"alg":"RS256","d":"mvMDWSdPPvcum0c0iEHE2gbqtV2NKMmLwrl9E6K7g8lTV95SePLnW_bwyMPV7EGp7PQk3l17I5XRhFjze7GqTnFIOgKzMianPs7jv2ELtBMGK0xOPATgu1iGb70xZ6vcvuEfRyY3dJ0zr4jpUdVuXwKmx9rK4IdZn2dFCKfvSuspqIpz11RhF1ALrqDLkxGVv7ZwNh0_VhJZU9hcjG5l6xc7rQEKpPRkZp0IdjkGS8Z0FskoVaiRIWAbZuiVFB9WCW8k1czC4HQTPLpII01bUQx2ludbm0UlXRgVU9ptUUbU7GAImQqTOW8LfPGklEvcgzlIlR_oqw4P9yBxLi-yMQ","dp":"pvNCSnnhbo8Igw9psPR-DicxFnkXlu_ix4gpy6efTrxA-z1VDFDioJ814vKQNioYDzpyAP1gfMPhRkvG_q0hRZsJah3Sb9dfA-WkhSWY7lURQP4yIBTMU0PF_rEATuS7lRciYk1SOx5fqXZd3m_LP0vpBC4Ujlq6NAq6CIjCnms","dq":"TtUVGCCkPNgfOLmkYXu7dxxUCV5kB01-xAEK2OY0n0pG8vfDophH4_D_ZC7nvJ8J9uDhs_3JStexq1lIvaWtG99RNTChIEDzpdn6GH9yaVcb_eB4uJjrNm64FhF8PGCCwxA-xMCZMaARKwhMB2_IOMkxUbWboL3gnhJ2rDO_QO0","e":"AQAB","kid":"8uHDw3M6rf8","kty":"RSA","n":"yaeEL0VKoPBXIAaWXsUgmu05lAvEIIdJn0FX9lHh4JE5UY9B83C5sCNdhs9iSWzpeP11EVjWp8i3Yv2CF7c7u50BXnVBGtxpZpFC-585UXacoJ0chUmarL9GRFJcM1nPHBTFu68aRrn1rIKNHUkNaaxFo0NFGl_4EDDTO8HwawTjwkPoQlRzeByhlvGPVvwgB3Fn93B8QJ_cZhXKxJvjjrC_8Pk76heC_ntEMru71Ix77BoC3j2TuyiN7m9RNBW8BU5q6lKoIdvIeZfTFLzi37iufyfvMrJTixp9zhNB1NxlLCeOZl2MXegtiGqd2H3cbAyqoOiv9ihUWTfXj7SxJw","p":"_Yylc9e07CKdqNRD2EosMC2mrhrEa9j5oY_l00Qyy4-jmCA59Q9viyqvveRo0U7cRvFA5BWgWN6GGLh1DG3X-QBqVr0dnk3uzbobb55RYUXyPLuBZI2q6w2oasbiDwPdY7KpkVv_H-bpITQlyDvO8hhucA6rUV7F6KTQVz8M3Ms","q":"y5p3hch-7jJ21TkAhp_Vk1fLCAuD4tbErwQs2of9ja8sB4iJOs5Wn6HD3P7Mc8Plye7qaLHvzc8I5g0tPKWvC0DPd_FLPXiWwMVAzee3NUX_oGeJNOQp11y1w_KqdO9qZqHSEPZ3NcFL_SZMFgggxhM1uzRiPzsVN0lnD_6prZU","qi":"2Grt6uXHm61ji3xSdkBWNtUnj19vS1-7rFJp5SoYztVQVThf_W52BAiXKBdYZDRVoItC_VS2NvAOjeJjhYO_xQ_q3hK7MdtuXfEPpLnyXKkmWo3lrJ26wbeF6l05LexCkI7ShsOuSt-dsyaTJTszuKDIA6YOfWvfo3aVZmlWRaI","use":"sig"}`
|
|
|
|
privateKey, _ := jwk.ParseKey([]byte(privateKeyString))
|
|
_ = s.jwtService.SetKey(privateKey)
|
|
}
|
|
|
|
// getCborPublicKey decodes a Base64 encoded public key and returns the CBOR encoded COSE key
|
|
func (s *TestService) getCborPublicKey(base64PublicKey string) ([]byte, error) {
|
|
decodedKey, err := base64.StdEncoding.DecodeString(base64PublicKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to decode base64 key: %w", err)
|
|
}
|
|
pubKey, err := x509.ParsePKIXPublicKey(decodedKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to parse public key: %w", err)
|
|
}
|
|
|
|
ecdsaPubKey, ok := pubKey.(*ecdsa.PublicKey)
|
|
if !ok {
|
|
return nil, fmt.Errorf("not an ECDSA public key")
|
|
}
|
|
|
|
coseKey := map[int]interface{}{
|
|
1: 2, // Key type: EC2
|
|
3: -7, // Algorithm: ECDSA with SHA-256
|
|
-1: 1, // Curve: P-256
|
|
-2: ecdsaPubKey.X.Bytes(), // X coordinate
|
|
-3: ecdsaPubKey.Y.Bytes(), // Y coordinate
|
|
}
|
|
|
|
cborPublicKey, err := cbor.Marshal(coseKey)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal COSE key: %w", err)
|
|
}
|
|
|
|
return cborPublicKey, nil
|
|
}
|
|
|
|
// SyncLdap triggers an LDAP synchronization
|
|
func (s *TestService) SyncLdap(ctx context.Context) error {
|
|
return s.ldapService.SyncAll(ctx)
|
|
}
|
|
|
|
// SetLdapTestConfig writes the test LDAP config variables directly to the database.
|
|
func (s *TestService) SetLdapTestConfig(ctx context.Context) error {
|
|
err := s.db.Transaction(func(tx *gorm.DB) error {
|
|
ldapConfigs := map[string]string{
|
|
"ldapUrl": "ldap://lldap:3890",
|
|
"ldapBindDn": "uid=admin,ou=people,dc=pocket-id,dc=org",
|
|
"ldapBindPassword": "admin_password",
|
|
"ldapBase": "dc=pocket-id,dc=org",
|
|
"ldapUserSearchFilter": "(objectClass=person)",
|
|
"ldapUserGroupSearchFilter": "(objectClass=groupOfNames)",
|
|
"ldapSkipCertVerify": "true",
|
|
"ldapAttributeUserUniqueIdentifier": "uuid",
|
|
"ldapAttributeUserUsername": "uid",
|
|
"ldapAttributeUserEmail": "mail",
|
|
"ldapAttributeUserFirstName": "givenName",
|
|
"ldapAttributeUserLastName": "sn",
|
|
"ldapAttributeGroupUniqueIdentifier": "uuid",
|
|
"ldapAttributeGroupName": "uid",
|
|
"ldapAttributeGroupMember": "member",
|
|
"ldapAttributeAdminGroup": "admin_group",
|
|
"ldapSoftDeleteUsers": "true",
|
|
"ldapEnabled": "true",
|
|
}
|
|
|
|
for key, value := range ldapConfigs {
|
|
configVar := model.AppConfigVariable{Key: key, Value: value}
|
|
if err := tx.Create(&configVar).Error; err != nil {
|
|
return fmt.Errorf("failed to create config variable '%s': %w", key, err)
|
|
}
|
|
}
|
|
return nil
|
|
})
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("failed to set LDAP test config: %w", err)
|
|
}
|
|
|
|
if err := s.appConfigService.LoadDbConfig(ctx); err != nil {
|
|
return fmt.Errorf("failed to load app config: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|