mirror of
https://github.com/coder/coder.git
synced 2025-07-06 15:41:45 +00:00
* DELETE license API endpoint Signed-off-by: Spike Curtis <spike@coder.com> * Fix new lint stuff Signed-off-by: Spike Curtis <spike@coder.com> Signed-off-by: Spike Curtis <spike@coder.com>
317 lines
9.4 KiB
Go
317 lines
9.4 KiB
Go
package coderd
|
|
|
|
import (
|
|
"context"
|
|
"crypto/ed25519"
|
|
"crypto/rand"
|
|
"encoding/json"
|
|
"net/http"
|
|
"testing"
|
|
"time"
|
|
|
|
"golang.org/x/xerrors"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/golang-jwt/jwt/v4"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/coder/coder/coderd/coderdtest"
|
|
"github.com/coder/coder/codersdk"
|
|
"github.com/coder/coder/testutil"
|
|
)
|
|
|
|
// these tests patch the map of license keys, so cannot be run in parallel
|
|
// nolint:paralleltest
|
|
func TestPostLicense(t *testing.T) {
|
|
pubKey, privKey, err := ed25519.GenerateKey(rand.Reader)
|
|
require.NoError(t, err)
|
|
keyID := "testing"
|
|
oldKeys := keys
|
|
defer func() {
|
|
t.Log("restoring keys")
|
|
keys = oldKeys
|
|
}()
|
|
keys = map[string]ed25519.PublicKey{keyID: pubKey}
|
|
|
|
t.Run("POST", func(t *testing.T) {
|
|
client := coderdtest.New(t, &coderdtest.Options{APIBuilder: NewEnterprise})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
defer cancel()
|
|
|
|
claims := &Claims{
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Issuer: "test@coder.test",
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(2 * time.Hour)),
|
|
},
|
|
LicenseExpires: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
AccountType: AccountTypeSalesforce,
|
|
AccountID: "testing",
|
|
Version: CurrentVersion,
|
|
Features: Features{
|
|
UserLimit: 0,
|
|
AuditLog: 1,
|
|
},
|
|
}
|
|
lic, err := makeLicense(claims, privKey, keyID)
|
|
require.NoError(t, err)
|
|
|
|
respLic, err := client.AddLicense(ctx, codersdk.AddLicenseRequest{
|
|
License: lic,
|
|
})
|
|
require.NoError(t, err)
|
|
assert.GreaterOrEqual(t, respLic.ID, int32(0))
|
|
// just a couple spot checks for sanity
|
|
assert.Equal(t, claims.AccountID, respLic.Claims["account_id"])
|
|
features, ok := respLic.Claims["features"].(map[string]interface{})
|
|
require.True(t, ok)
|
|
assert.Equal(t, json.Number("1"), features[codersdk.FeatureAuditLog])
|
|
})
|
|
|
|
t.Run("POST_unathorized", func(t *testing.T) {
|
|
client := coderdtest.New(t, &coderdtest.Options{APIBuilder: NewEnterprise})
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitShort)
|
|
defer cancel()
|
|
|
|
claims := &Claims{
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Issuer: "test@coder.test",
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(2 * time.Hour)),
|
|
},
|
|
LicenseExpires: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
AccountType: AccountTypeSalesforce,
|
|
AccountID: "testing",
|
|
Version: CurrentVersion,
|
|
Features: Features{
|
|
UserLimit: 0,
|
|
AuditLog: 1,
|
|
},
|
|
}
|
|
lic, err := makeLicense(claims, privKey, keyID)
|
|
require.NoError(t, err)
|
|
|
|
_, err = client.AddLicense(ctx, codersdk.AddLicenseRequest{
|
|
License: lic,
|
|
})
|
|
errResp := &codersdk.Error{}
|
|
if xerrors.As(err, &errResp) {
|
|
assert.Equal(t, 401, errResp.StatusCode())
|
|
} else {
|
|
t.Error("expected to get error status 401")
|
|
}
|
|
})
|
|
|
|
t.Run("POST_corrupted", func(t *testing.T) {
|
|
client := coderdtest.New(t, &coderdtest.Options{APIBuilder: NewEnterprise})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitShort)
|
|
defer cancel()
|
|
|
|
claims := &Claims{
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Issuer: "test@coder.test",
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(2 * time.Hour)),
|
|
},
|
|
LicenseExpires: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
AccountType: AccountTypeSalesforce,
|
|
AccountID: "testing",
|
|
Version: CurrentVersion,
|
|
Features: Features{
|
|
UserLimit: 0,
|
|
AuditLog: 1,
|
|
},
|
|
}
|
|
lic, err := makeLicense(claims, privKey, keyID)
|
|
require.NoError(t, err)
|
|
|
|
_, err = client.AddLicense(ctx, codersdk.AddLicenseRequest{
|
|
License: "h" + lic,
|
|
})
|
|
errResp := &codersdk.Error{}
|
|
if xerrors.As(err, &errResp) {
|
|
assert.Equal(t, 400, errResp.StatusCode())
|
|
} else {
|
|
t.Error("expected to get error status 400")
|
|
}
|
|
})
|
|
}
|
|
|
|
// these tests patch the map of license keys, so cannot be run in parallel
|
|
// nolint:paralleltest
|
|
func TestGetLicense(t *testing.T) {
|
|
pubKey, privKey, err := ed25519.GenerateKey(rand.Reader)
|
|
require.NoError(t, err)
|
|
keyID := "testing"
|
|
oldKeys := keys
|
|
defer func() {
|
|
t.Log("restoring keys")
|
|
keys = oldKeys
|
|
}()
|
|
keys = map[string]ed25519.PublicKey{keyID: pubKey}
|
|
|
|
t.Run("GET", func(t *testing.T) {
|
|
client := coderdtest.New(t, &coderdtest.Options{APIBuilder: NewEnterprise})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
defer cancel()
|
|
|
|
claims := &Claims{
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Issuer: "test@coder.test",
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(2 * time.Hour)),
|
|
},
|
|
LicenseExpires: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
AccountType: AccountTypeSalesforce,
|
|
AccountID: "testing",
|
|
Version: CurrentVersion,
|
|
Features: Features{
|
|
UserLimit: 0,
|
|
AuditLog: 1,
|
|
},
|
|
}
|
|
lic, err := makeLicense(claims, privKey, keyID)
|
|
require.NoError(t, err)
|
|
_, err = client.AddLicense(ctx, codersdk.AddLicenseRequest{
|
|
License: lic,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
// 2nd license
|
|
claims.AccountID = "testing2"
|
|
claims.Features.UserLimit = 200
|
|
lic2, err := makeLicense(claims, privKey, keyID)
|
|
require.NoError(t, err)
|
|
_, err = client.AddLicense(ctx, codersdk.AddLicenseRequest{
|
|
License: lic2,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
licenses, err := client.Licenses(ctx)
|
|
require.NoError(t, err)
|
|
require.Len(t, licenses, 2)
|
|
assert.Equal(t, int32(1), licenses[0].ID)
|
|
assert.Equal(t, "testing", licenses[0].Claims["account_id"])
|
|
assert.Equal(t, map[string]interface{}{
|
|
codersdk.FeatureUserLimit: json.Number("0"),
|
|
codersdk.FeatureAuditLog: json.Number("1"),
|
|
}, licenses[0].Claims["features"])
|
|
assert.Equal(t, int32(2), licenses[1].ID)
|
|
assert.Equal(t, "testing2", licenses[1].Claims["account_id"])
|
|
assert.Equal(t, map[string]interface{}{
|
|
codersdk.FeatureUserLimit: json.Number("200"),
|
|
codersdk.FeatureAuditLog: json.Number("1"),
|
|
}, licenses[1].Claims["features"])
|
|
})
|
|
}
|
|
|
|
// these tests patch the map of license keys, so cannot be run in parallel
|
|
// nolint:paralleltest
|
|
func TestDeleteLicense(t *testing.T) {
|
|
pubKey, privKey, err := ed25519.GenerateKey(rand.Reader)
|
|
require.NoError(t, err)
|
|
keyID := "testing"
|
|
oldKeys := keys
|
|
defer func() {
|
|
t.Log("restoring keys")
|
|
keys = oldKeys
|
|
}()
|
|
keys = map[string]ed25519.PublicKey{keyID: pubKey}
|
|
|
|
t.Run("DELETE_empty", func(t *testing.T) {
|
|
client := coderdtest.New(t, &coderdtest.Options{APIBuilder: NewEnterprise})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
defer cancel()
|
|
|
|
err := client.DeleteLicense(ctx, 1)
|
|
errResp := &codersdk.Error{}
|
|
if xerrors.As(err, &errResp) {
|
|
assert.Equal(t, 404, errResp.StatusCode())
|
|
} else {
|
|
t.Error("expected to get error status 404")
|
|
}
|
|
})
|
|
|
|
t.Run("DELETE_bad_id", func(t *testing.T) {
|
|
client := coderdtest.New(t, &coderdtest.Options{APIBuilder: NewEnterprise})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
defer cancel()
|
|
|
|
resp, err := client.Request(ctx, http.MethodDelete, "/api/v2/licenses/drivers", nil)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, http.StatusNotFound, resp.StatusCode)
|
|
require.NoError(t, resp.Body.Close())
|
|
})
|
|
|
|
t.Run("DELETE", func(t *testing.T) {
|
|
client := coderdtest.New(t, &coderdtest.Options{APIBuilder: NewEnterprise})
|
|
_ = coderdtest.CreateFirstUser(t, client)
|
|
ctx, cancel := context.WithTimeout(context.Background(), testutil.WaitLong)
|
|
defer cancel()
|
|
|
|
claims := &Claims{
|
|
RegisteredClaims: jwt.RegisteredClaims{
|
|
Issuer: "test@coder.test",
|
|
IssuedAt: jwt.NewNumericDate(time.Now()),
|
|
NotBefore: jwt.NewNumericDate(time.Now()),
|
|
ExpiresAt: jwt.NewNumericDate(time.Now().Add(2 * time.Hour)),
|
|
},
|
|
LicenseExpires: jwt.NewNumericDate(time.Now().Add(time.Hour)),
|
|
AccountType: AccountTypeSalesforce,
|
|
AccountID: "testing",
|
|
Version: CurrentVersion,
|
|
Features: Features{
|
|
UserLimit: 0,
|
|
AuditLog: 1,
|
|
},
|
|
}
|
|
lic, err := makeLicense(claims, privKey, keyID)
|
|
require.NoError(t, err)
|
|
_, err = client.AddLicense(ctx, codersdk.AddLicenseRequest{
|
|
License: lic,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
// 2nd license
|
|
claims.AccountID = "testing2"
|
|
claims.Features.UserLimit = 200
|
|
lic2, err := makeLicense(claims, privKey, keyID)
|
|
require.NoError(t, err)
|
|
_, err = client.AddLicense(ctx, codersdk.AddLicenseRequest{
|
|
License: lic2,
|
|
})
|
|
require.NoError(t, err)
|
|
|
|
licenses, err := client.Licenses(ctx)
|
|
require.NoError(t, err)
|
|
assert.Len(t, licenses, 2)
|
|
for _, l := range licenses {
|
|
err = client.DeleteLicense(ctx, l.ID)
|
|
require.NoError(t, err)
|
|
}
|
|
licenses, err = client.Licenses(ctx)
|
|
require.NoError(t, err)
|
|
assert.Len(t, licenses, 0)
|
|
})
|
|
}
|
|
|
|
func makeLicense(c *Claims, privateKey ed25519.PrivateKey, keyID string) (string, error) {
|
|
tok := jwt.NewWithClaims(jwt.SigningMethodEdDSA, c)
|
|
tok.Header[HeaderKeyID] = keyID
|
|
signedTok, err := tok.SignedString(privateKey)
|
|
if err != nil {
|
|
return "", xerrors.Errorf("sign license: %w", err)
|
|
}
|
|
return signedTok, nil
|
|
}
|