Mainflux.mainflux/users/service_test.go

593 lines
15 KiB
Go

// Copyright (c) Mainflux
// SPDX-License-Identifier: Apache-2.0
package users_test
import (
"context"
"fmt"
"regexp"
"testing"
"github.com/mainflux/mainflux"
"github.com/mainflux/mainflux/pkg/errors"
"github.com/mainflux/mainflux/pkg/uuid"
"github.com/mainflux/mainflux/users"
"github.com/mainflux/mainflux/users/mocks"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
const wrong string = "wrong-value"
var (
user = users.User{Email: "user@example.com", Password: "password", Metadata: map[string]interface{}{"role": "user"}}
nonExistingUser = users.User{Email: "non-ex-user@example.com", Password: "password", Metadata: map[string]interface{}{"role": "user"}}
host = "example.com"
idProvider = uuid.New()
passRegex = regexp.MustCompile("^.{8,}$")
unauthzToken = "unauthorizedtoken"
)
func newService() users.Service {
userRepo := mocks.NewUserRepository()
hasher := mocks.NewHasher()
mockAuthzDB := map[string][]mocks.SubjectSet{}
mockAuthzDB[user.Email] = append(mockAuthzDB[user.Email], mocks.SubjectSet{Object: "authorities", Relation: "member"})
mockAuthzDB[unauthzToken] = append(mockAuthzDB[unauthzToken], mocks.SubjectSet{Object: "nothing", Relation: "do"})
mockUsers := map[string]string{user.Email: user.Email, unauthzToken: unauthzToken}
authSvc := mocks.NewAuthService(mockUsers, mockAuthzDB)
e := mocks.NewEmailer()
return users.New(userRepo, hasher, authSvc, e, idProvider, passRegex)
}
func TestRegister(t *testing.T) {
svc := newService()
cases := []struct {
desc string
user users.User
token string
err error
}{
{
desc: "register new user",
user: user,
token: user.Email,
err: nil,
},
{
desc: "register existing user",
user: user,
token: user.Email,
err: errors.ErrConflict,
},
{
desc: "register new user with weak password",
user: users.User{
Email: user.Email,
Password: "weak",
},
token: user.Email,
err: users.ErrPasswordFormat,
},
{
desc: "register a new user with unauthorized access",
user: users.User{Email: "newuser@example.com", Password: "12345678"},
err: errors.ErrAuthorization,
token: unauthzToken,
},
}
for _, tc := range cases {
_, err := svc.Register(context.Background(), tc.token, tc.user)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestLogin(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
noAuthUser := users.User{
Email: "email@test.com",
Password: "12345678",
}
cases := []struct {
desc string
user users.User
response string
err error
}{
{
desc: "login with good credentials",
user: user,
response: user.Email,
err: nil,
},
{
desc: "login with wrong e-mail",
user: users.User{
Email: wrong,
Password: user.Password,
},
response: "",
err: errors.ErrAuthentication,
},
{
desc: "login with wrong password",
user: users.User{
Email: user.Email,
Password: wrong,
},
response: "",
err: errors.ErrAuthentication,
},
{
desc: "login failed auth",
user: noAuthUser,
response: "",
err: errors.ErrAuthentication,
},
}
for _, tc := range cases {
email, err := svc.Login(context.Background(), tc.user)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
assert.Equal(t, tc.response, email, fmt.Sprintf("%s: expected %s but got %s", tc.desc, tc.response, email))
}
}
func TestViewUser(t *testing.T) {
svc := newService()
id, err := svc.Register(context.Background(), user.Email, user)
assert.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
token, err := svc.Login(context.Background(), user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
u := user
u.Password = ""
cases := []struct {
desc string
user users.User
token string
userID string
err error
}{
{
desc: "view user with authorized token",
user: u,
token: token,
userID: id,
err: nil,
},
{
desc: "view user with empty token",
user: users.User{},
token: "",
userID: id,
err: errors.ErrAuthentication,
},
{
desc: "view user with valid token and invalid user id",
user: users.User{},
token: token,
userID: "",
err: errors.ErrNotFound,
},
}
for _, tc := range cases {
_, err := svc.ViewUser(context.Background(), tc.token, tc.userID)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestViewProfile(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
token, err := svc.Login(context.Background(), user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
u := user
u.Password = ""
cases := []struct {
desc string
user users.User
token string
err error
}{
{
desc: "valid token's user info",
user: u,
token: token,
err: nil,
},
{
desc: "invalid token's user info",
user: users.User{},
token: "",
err: errors.ErrAuthentication,
},
}
for _, tc := range cases {
_, err := svc.ViewProfile(context.Background(), tc.token)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestListUsers(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
token, err := svc.Login(context.Background(), user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
var nUsers = uint64(10)
for i := uint64(1); i < nUsers; i++ {
email := fmt.Sprintf("TestListUsers%d@example.com", i)
user := users.User{
Email: email,
Password: "passpass",
}
_, err := svc.Register(context.Background(), token, user)
assert.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
}
cases := []struct {
desc string
token string
offset uint64
limit uint64
email string
size uint64
err error
}{
{
desc: "list users with authorized token",
token: token,
size: 0,
err: nil,
},
{
desc: "list users with unauthorized token",
token: unauthzToken,
size: 0,
err: errors.ErrAuthorization,
},
{
desc: "list user with empty token",
token: "",
size: 0,
err: errors.ErrAuthentication,
},
{
desc: "list users with offset and limit",
token: token,
offset: 6,
limit: nUsers,
size: nUsers - 6,
},
{
desc: "list using non-existent user",
token: token,
email: nonExistingUser.Email,
err: errors.ErrNotFound,
},
}
for _, tc := range cases {
pm := users.PageMetadata{
Offset: tc.offset,
Limit: tc.limit,
Email: tc.email,
Metadata: nil,
Status: "all",
}
page, err := svc.ListUsers(context.Background(), tc.token, pm)
size := uint64(len(page.Users))
assert.Equal(t, tc.size, size, fmt.Sprintf("%s: expected size %d got %d\n", tc.desc, tc.size, size))
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestUpdateUser(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
token, err := svc.Login(context.Background(), user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
user.Metadata = map[string]interface{}{"role": "test"}
cases := []struct {
desc string
user users.User
token string
err error
}{
{
desc: "update user with valid token",
user: user,
token: token,
err: nil,
},
{
desc: "update user with invalid token",
user: user,
token: "non-existent",
err: errors.ErrAuthentication,
},
}
for _, tc := range cases {
err := svc.UpdateUser(context.Background(), tc.token, tc.user)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestGenerateResetToken(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
cases := []struct {
desc string
email string
err error
}{
{
desc: "valid user reset token",
email: user.Email,
err: nil,
},
{
desc: "invalid user rest token",
email: nonExistingUser.Email,
err: errors.ErrNotFound,
},
}
for _, tc := range cases {
err := svc.GenerateResetToken(context.Background(), tc.email, host)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestChangePassword(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("register user error: %s", err))
token, _ := svc.Login(context.Background(), user)
cases := []struct {
desc string
token string
password string
oldPassword string
err error
}{
{
desc: "valid user change password ",
token: token,
password: "newpassword",
oldPassword: user.Password,
err: nil,
},
{
desc: "valid user change password with wrong password",
token: token,
password: "newpassword",
oldPassword: "wrongpassword",
err: errors.ErrAuthentication,
},
{
desc: "valid user change password invalid token",
token: "",
password: "newpassword",
oldPassword: user.Password,
err: errors.ErrAuthentication,
},
}
for _, tc := range cases {
err := svc.ChangePassword(context.Background(), tc.token, tc.password, tc.oldPassword)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestResetPassword(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
mockAuthzDB := map[string][]mocks.SubjectSet{}
mockAuthzDB[user.Email] = append(mockAuthzDB[user.Email], mocks.SubjectSet{Object: "authorities", Relation: "member"})
authSvc := mocks.NewAuthService(map[string]string{user.Email: user.Email}, mockAuthzDB)
resetToken, err := authSvc.Issue(context.Background(), &mainflux.IssueReq{Id: user.ID, Email: user.Email, Type: 2})
require.Nil(t, err, fmt.Sprintf("Generating reset token expected to succeed: %s", err))
cases := []struct {
desc string
token string
password string
err error
}{
{
desc: "reset user password with valid resetToken",
token: resetToken.GetValue(),
password: password,
err: nil,
},
{
desc: "reset user password with invalid resetToken",
token: unauthzToken,
password: password,
err: errors.ErrNotFound,
},
{
desc: "reset user password with empty resetToken",
token: unauthzToken,
password: password,
err: errors.ErrNotFound,
},
}
for _, tc := range cases {
err := svc.ResetPassword(context.Background(), tc.token, tc.password)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestSendPasswordReset(t *testing.T) {
svc := newService()
_, err := svc.Register(context.Background(), user.Email, user)
require.Nil(t, err, fmt.Sprintf("register user error: %s", err))
token, _ := svc.Login(context.Background(), user)
cases := []struct {
desc string
token string
email string
err error
}{
{
desc: "send password reset",
token: token,
email: user.Email,
err: nil,
},
}
for _, tc := range cases {
err := svc.SendPasswordReset(context.Background(), host, tc.email, tc.token)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
}
func TestDisableUser(t *testing.T) {
enabledUser1 := users.User{Email: "user1@example.com", Password: "password"}
enabledUser2 := users.User{Email: "user2@example.com", Password: "password", Status: "enabled"}
disabledUser1 := users.User{Email: "user3@example.com", Password: "password", Status: "disabled"}
svc := newService()
id, err := svc.Register(context.Background(), user.Email, user)
assert.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
user.ID = id
user.Status = "enabled"
token, err := svc.Login(context.Background(), user)
require.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
id, err = svc.Register(context.Background(), token, enabledUser1)
assert.Nil(t, err, fmt.Sprintf("register enabledUser1 error: %s", err))
enabledUser1.ID = id
enabledUser1.Status = "enabled"
id, err = svc.Register(context.Background(), token, enabledUser2)
require.Nil(t, err, fmt.Sprintf("register enabledUser2 error: %s", err))
enabledUser2.ID = id
enabledUser2.Status = "disabled"
id, err = svc.Register(context.Background(), token, disabledUser1)
require.Nil(t, err, fmt.Sprintf("register disabledUser1 error: %s", err))
disabledUser1.ID = id
disabledUser1.Status = "disabled"
cases := []struct {
desc string
id string
token string
err error
}{
{
desc: "disable user with wrong credentials",
id: enabledUser2.ID,
token: "",
err: errors.ErrAuthentication,
},
{
desc: "disable existing user",
id: enabledUser2.ID,
token: token,
err: nil,
},
{
desc: "disable disabled user",
id: enabledUser2.ID,
token: token,
err: users.ErrAlreadyDisabledUser,
},
{
desc: "disable non-existing user",
id: "",
token: token,
err: errors.ErrNotFound,
},
}
for _, tc := range cases {
err := svc.DisableUser(context.Background(), tc.token, tc.id)
assert.True(t, errors.Contains(err, tc.err), fmt.Sprintf("%s: expected %s got %s\n", tc.desc, tc.err, err))
}
_, err = svc.Login(context.Background(), enabledUser2)
assert.True(t, errors.Contains(err, errors.ErrNotFound), fmt.Sprintf("Login disabled user: expected %s got %s\n", errors.ErrNotFound, err))
cases2 := map[string]struct {
status string
size uint64
response []users.User
}{
"list enabled users": {
status: "enabled",
size: 2,
response: []users.User{enabledUser1, user},
},
"list disabled users": {
status: "disabled",
size: 2,
response: []users.User{enabledUser2, disabledUser1},
},
"list enabled and disabled users": {
status: "all",
size: 4,
response: []users.User{enabledUser1, enabledUser2, disabledUser1, user},
},
}
for desc, tc := range cases2 {
pm := users.PageMetadata{
Offset: 0,
Limit: 100,
Status: tc.status,
}
page, err := svc.ListUsers(context.Background(), token, pm)
assert.Nil(t, err, fmt.Sprintf("unexpected error: %s", err))
size := uint64(len(page.Users))
assert.Equal(t, tc.size, size, fmt.Sprintf("%s: expected size %d got %d\n", desc, tc.size, size))
assert.ElementsMatch(t, tc.response, page.Users, fmt.Sprintf("%s: expected %s got %s\n", desc, tc.response, page.Users))
}
}