kong/spec/03-plugins/19-hmac-auth/02-api_spec.lua (455 lines of code) (raw):
local helpers = require "spec.helpers"
local cjson = require "cjson"
local utils = require "kong.tools.utils"
for _, strategy in helpers.each_strategy() do
describe("Plugin: hmac-auth (API) [#" .. strategy .. "]", function()
local admin_client
local consumer
local bp
local db
lazy_setup(function()
bp, db = helpers.get_db_utils(strategy, {
"routes",
"services",
"consumers",
"plugins",
"hmacauth_credentials",
})
assert(helpers.start_kong({
database = strategy,
}))
admin_client = helpers.admin_client()
end)
lazy_teardown(function()
if admin_client then
admin_client:close()
end
assert(helpers.stop_kong())
end)
describe("/consumers/:consumer/hmac-auth/", function()
describe("POST", function()
before_each(function()
assert(db:truncate("routes"))
assert(db:truncate("services"))
assert(db:truncate("consumers"))
db:truncate("plugins")
db:truncate("hmacauth_credentials")
consumer = bp.consumers:insert({
username = "bob",
custom_id = "1234"
}, { nulls = true })
end)
it("[SUCCESS] should create a hmac-auth credential", function()
local res = assert(admin_client:send {
method = "POST",
path = "/consumers/bob/hmac-auth/",
body = {
username = "bob",
secret = "1234"
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(201, res)
local cred = cjson.decode(body)
assert.equal(consumer.id, cred.consumer.id)
end)
it("[SUCCESS] should create a hmac-auth credential with a random secret", function()
local res = assert(admin_client:send {
method = "POST",
path = "/consumers/bob/hmac-auth/",
body = {
username = "bob",
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(201, res)
local cred = cjson.decode(body)
assert.is.not_nil(cred.secret)
end)
it("[SUCCESS] should create a hmac-auth credential with tags", function()
local res = assert(admin_client:send {
method = "POST",
path = "/consumers/bob/hmac-auth/",
body = {
username = "bobby",
tags = { "tag1", "tag2" },
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(201, res)
local json = cjson.decode(body)
assert.equal(consumer.id, json.consumer.id)
assert.equal("tag1", json.tags[1])
assert.equal("tag2", json.tags[2])
end)
it("[FAILURE] should return proper errors", function()
local res = assert(admin_client:send {
method = "POST",
path = "/consumers/bob/hmac-auth/",
body = {},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(400, res)
local json = cjson.decode(body)
assert.same({ username = "required field missing" }, json.fields)
end)
end)
describe("GET", function()
it("should retrieve all", function()
bp.hmacauth_credentials:insert{
consumer = { id = consumer.id },
}
local res = assert(admin_client:send {
method = "GET",
path = "/consumers/bob/hmac-auth",
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(200, res)
local json = cjson.decode(body)
assert.equal(1, #(json.data))
end)
end)
end)
describe("/consumers/:consumer/hmac-auth/:id", function()
local credential
before_each(function()
credential = bp.hmacauth_credentials:insert{
consumer = { id = consumer.id },
}
end)
describe("GET", function()
it("should retrieve by id", function()
local res = assert(admin_client:send {
method = "GET",
path = "/consumers/bob/hmac-auth/" .. credential.id,
body = {},
headers = {
["Content-Type"] = "application/json"
}
})
local body_json = assert.res_status(200, res)
local body = cjson.decode(body_json)
assert.equals(credential.id, body.id)
end)
it("should retrieve by username", function()
local res = assert(admin_client:send {
method = "GET",
path = "/consumers/bob/hmac-auth/" .. credential.username,
body = {},
headers = {
["Content-Type"] = "application/json"
}
})
local body_json = assert.res_status(200, res)
local body = cjson.decode(body_json)
assert.equals(credential.id, body.id)
end)
end)
describe("PATCH", function()
it("[SUCCESS] should update a credential by id", function()
local res = assert(admin_client:send {
method = "PATCH",
path = "/consumers/bob/hmac-auth/" .. credential.id,
body = {
username = "alice"
},
headers = {
["Content-Type"] = "application/json"
}
})
local body_json = assert.res_status(200, res)
local cred = cjson.decode(body_json)
assert.equals("alice", cred.username)
end)
it("[SUCCESS] should update a credential by username", function()
local res = assert(admin_client:send {
method = "PATCH",
path = "/consumers/bob/hmac-auth/" .. credential.username,
body = {
username = "aliceUPD"
},
headers = {
["Content-Type"] = "application/json"
}
})
local body_json = assert.res_status(200, res)
local cred = cjson.decode(body_json)
assert.equals("aliceUPD", cred.username)
end)
it("[FAILURE] should return proper errors", function()
local res = assert(admin_client:send {
method = "PATCH",
path = "/consumers/bob/hmac-auth/" .. credential.id,
body = {
username = ""
},
headers = {
["Content-Type"] = "application/json"
}
})
local response = assert.res_status(400, res)
local json = cjson.decode(response)
assert.same({ username = "length must be at least 1" }, json.fields)
end)
end)
describe("PUT", function()
it("[SUCCESS] should create and update", function()
local res = assert(admin_client:send {
method = "PUT",
path = "/consumers/bob/hmac-auth/foo",
body = {
secret = "1234"
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(200, res)
local cred = cjson.decode(body)
assert.equal("foo", cred.username)
assert.equal(consumer.id, cred.consumer.id)
end)
it("[FAILURE] should return proper errors", function()
local res = assert(admin_client:send {
method = "PUT",
path = "/consumers/bob/hmac-auth/foo",
body = {
secret = 123,
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(400, res)
local json = cjson.decode(body)
assert.same({ secret = "expected a string" }, json.fields)
end)
end)
describe("DELETE", function()
it("[FAILURE] should return proper errors", function()
local res = assert(admin_client:send {
method = "DELETE",
path = "/consumers/bob/hmac-auth/aliceasd",
body = {},
headers = {
["Content-Type"] = "application/json"
}
})
assert.res_status(404, res)
local res = assert(admin_client:send {
method = "DELETE",
path = "/consumers/bob/hmac-auth/00000000-0000-0000-0000-000000000000",
body = {},
headers = {
["Content-Type"] = "application/json"
}
})
assert.res_status(404, res)
end)
it("[SUCCESS] should delete a credential", function()
local res = assert(admin_client:send {
method = "DELETE",
path = "/consumers/bob/hmac-auth/" .. credential.id,
body = {},
headers = {
["Content-Type"] = "application/json"
}
})
assert.res_status(204, res)
end)
end)
end)
describe("/hmac-auths", function()
local consumer2
describe("GET", function()
lazy_setup(function()
db:truncate("hmacauth_credentials")
bp.hmacauth_credentials:insert {
consumer = { id = consumer.id },
username = "bob"
}
consumer2 = bp.consumers:insert {
username = "bob-the-buidler"
}
bp.hmacauth_credentials:insert {
consumer = { id = consumer2.id },
username = "bob-the-buidler"
}
end)
it("retrieves all the hmac-auths with trailing slash", function()
local res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths/"
})
local body = assert.res_status(200, res)
local json = cjson.decode(body)
assert.is_table(json.data)
assert.equal(2, #json.data)
end)
it("retrieves all the hmac-auths without trailing slash", function()
local res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths"
})
local body = assert.res_status(200, res)
local json = cjson.decode(body)
assert.is_table(json.data)
assert.equal(2, #json.data)
end)
it("paginates through the hmac-auths", function()
local res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths?size=1",
})
local body = assert.res_status(200, res)
local json_1 = cjson.decode(body)
assert.is_table(json_1.data)
assert.equal(1, #json_1.data)
res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths",
query = {
size = 1,
offset = json_1.offset,
}
})
body = assert.res_status(200, res)
local json_2 = cjson.decode(body)
assert.is_table(json_2.data)
assert.equal(1, #json_2.data)
assert.not_same(json_1.data, json_2.data)
-- Disabled: on Cassandra, the last page still returns a
-- next_page token, and thus, an offset proprty in the
-- response of the Admin API.
--assert.is_nil(json_2.offset) -- last page
end)
end)
describe("POST", function()
lazy_setup(function()
db:truncate("hmacauth_credentials")
end)
it("does not create hmac-auth credential when missing consumer", function()
local res = assert(admin_client:send {
method = "POST",
path = "/hmac-auths",
body = {
username = "bob",
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(400, res)
local json = cjson.decode(body)
assert.same("schema violation (consumer: required field missing)", json.message)
end)
it("creates hmac-auth credential", function()
local res = assert(admin_client:send {
method = "POST",
path = "/hmac-auths",
body = {
username = "bob",
consumer = {
id = consumer.id
}
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(201, res)
local json = cjson.decode(body)
assert.equal("bob", json.username)
end)
end)
end)
describe("/hmac-auths/:username_or_id", function()
describe("PUT", function()
lazy_setup(function()
db:truncate("hmacauth_credentials")
end)
it("does not create hmac-auth credential when missing consumer", function()
local res = assert(admin_client:send {
method = "PUT",
path = "/hmac-auths/bob",
body = {
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(400, res)
local json = cjson.decode(body)
assert.same("schema violation (consumer: required field missing)", json.message)
end)
it("creates hmac-auth credential", function()
local res = assert(admin_client:send {
method = "PUT",
path = "/hmac-auths/bob",
body = {
consumer = {
id = consumer.id
}
},
headers = {
["Content-Type"] = "application/json"
}
})
local body = assert.res_status(200, res)
local json = cjson.decode(body)
assert.equal("bob", json.username)
end)
end)
end)
describe("/hmac-auths/:hmac_username_or_id/consumer", function()
describe("GET", function()
local credential
lazy_setup(function()
db:truncate("hmacauth_credentials")
credential = bp.hmacauth_credentials:insert({
consumer = { id = consumer.id },
username = "bob"
})
end)
it("retrieve consumer from a hmac-auth id", function()
local res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths/" .. credential.id .. "/consumer"
})
local body = assert.res_status(200, res)
local json = cjson.decode(body)
assert.same(consumer,json)
end)
it("retrieve consumer from a hmac-auth username", function()
local res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths/" .. credential.username .. "/consumer"
})
local body = assert.res_status(200, res)
local json = cjson.decode(body)
assert.same(consumer,json)
end)
it("returns 404 for a random non-existing hmac-auth id", function()
local res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths/" .. utils.uuid() .. "/consumer"
})
assert.res_status(404, res)
end)
it("returns 404 for a random non-existing hmac-auth username", function()
local res = assert(admin_client:send {
method = "GET",
path = "/hmac-auths/" .. utils.random_string() .. "/consumer"
})
assert.res_status(404, res)
end)
end)
end)
end)
end