Add tests and improve error handling
This commit is contained in:
parent
841b16986b
commit
fbb320507a
|
|
@ -23,6 +23,10 @@ sha2 = "0.10"
|
||||||
thiserror = "1.0"
|
thiserror = "1.0"
|
||||||
tokio = { version = "1", features = ["rt-multi-thread"]}
|
tokio = { version = "1", features = ["rt-multi-thread"]}
|
||||||
tokio-postgres = { version = "0.7", features = ["with-chrono-0_4"] }
|
tokio-postgres = { version = "0.7", features = ["with-chrono-0_4"] }
|
||||||
|
tower = { version = "0.4", features = ["util"] }
|
||||||
tower-http = { version = "0.5", features = ["fs", "trace"] }
|
tower-http = { version = "0.5", features = ["fs", "trace"] }
|
||||||
tracing = "0.1"
|
tracing = "0.1"
|
||||||
tracing-subscriber = { version = "0.3", default_features = false, features = ["std", "fmt", "ansi"] }
|
tracing-subscriber = { version = "0.3", default_features = false, features = ["std", "fmt", "ansi"] }
|
||||||
|
|
||||||
|
[dev-dependencies]
|
||||||
|
scraper = "0.18"
|
||||||
118
src/app/admin.rs
118
src/app/admin.rs
|
|
@ -10,7 +10,7 @@ use {
|
||||||
askama::Template,
|
askama::Template,
|
||||||
askama_axum::{IntoResponse, Response},
|
askama_axum::{IntoResponse, Response},
|
||||||
axum::{
|
axum::{
|
||||||
extract::State,
|
extract::{NestedPath, State},
|
||||||
response::Redirect,
|
response::Redirect,
|
||||||
routing::{get, post},
|
routing::{get, post},
|
||||||
Form, Router,
|
Form, Router,
|
||||||
|
|
@ -74,9 +74,10 @@ async fn check_jwt<D: Database>(
|
||||||
async fn root<D: Database>(
|
async fn root<D: Database>(
|
||||||
cookie_jar: CookieJar,
|
cookie_jar: CookieJar,
|
||||||
State(AppState { db, .. }): State<AppState<D>>,
|
State(AppState { db, .. }): State<AppState<D>>,
|
||||||
|
path: NestedPath,
|
||||||
) -> Result<Response, Error> {
|
) -> Result<Response, Error> {
|
||||||
Ok(if !db.has_admin_users().await? {
|
Ok(if !db.has_admin_users().await? {
|
||||||
Redirect::temporary("admin/create_first_admin_user").into_response()
|
Redirect::temporary(&format!("{}/create_first_admin_user", path.as_str())).into_response()
|
||||||
} else {
|
} else {
|
||||||
let admin_user = check_jwt(&db, &cookie_jar).await?;
|
let admin_user = check_jwt(&db, &cookie_jar).await?;
|
||||||
IndexTemplate {
|
IndexTemplate {
|
||||||
|
|
@ -122,3 +123,116 @@ async fn post_create_first_admin_user<D: Database>(
|
||||||
FirstLoginTemplate {},
|
FirstLoginTemplate {},
|
||||||
))
|
))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod tests {
|
||||||
|
use super::*;
|
||||||
|
use crate::{app::AppState, db::fake::FakeDatabase};
|
||||||
|
use {
|
||||||
|
axum::{
|
||||||
|
body,
|
||||||
|
body::Body,
|
||||||
|
http::{Request, StatusCode},
|
||||||
|
},
|
||||||
|
scraper::{Html, Selector},
|
||||||
|
tower::{Service, ServiceExt},
|
||||||
|
};
|
||||||
|
|
||||||
|
#[tokio::test]
|
||||||
|
async fn root_redirects_when_no_admin_users() {
|
||||||
|
let app = Router::new()
|
||||||
|
.nest("/test_admin", routes())
|
||||||
|
.with_state(AppState {
|
||||||
|
db: FakeDatabase::new_empty(),
|
||||||
|
});
|
||||||
|
|
||||||
|
let response = app
|
||||||
|
.oneshot(
|
||||||
|
Request::builder()
|
||||||
|
.method(http::Method::GET)
|
||||||
|
.uri("/test_admin")
|
||||||
|
.body(Body::empty())
|
||||||
|
.unwrap(),
|
||||||
|
)
|
||||||
|
.await
|
||||||
|
.unwrap();
|
||||||
|
|
||||||
|
assert_eq!(response.status(), StatusCode::TEMPORARY_REDIRECT);
|
||||||
|
assert!(response.headers().contains_key("location"));
|
||||||
|
assert_eq!(
|
||||||
|
"/test_admin/create_first_admin_user",
|
||||||
|
response.headers()["location"]
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[tokio::test]
|
||||||
|
async fn create_first_admin_user() {
|
||||||
|
let mut app = Router::new()
|
||||||
|
.nest("/test_admin", routes())
|
||||||
|
.with_state(AppState {
|
||||||
|
db: FakeDatabase::new_empty(),
|
||||||
|
})
|
||||||
|
.into_service();
|
||||||
|
|
||||||
|
let request = Request::get("/test_admin/create_first_admin_user")
|
||||||
|
.body(Body::empty())
|
||||||
|
.unwrap();
|
||||||
|
let response = ServiceExt::<Request<Body>>::ready(&mut app)
|
||||||
|
.await
|
||||||
|
.unwrap()
|
||||||
|
.call(request)
|
||||||
|
.await
|
||||||
|
.unwrap();
|
||||||
|
assert_eq!(response.status(), StatusCode::OK);
|
||||||
|
let body = body::to_bytes(response.into_body(), 10000).await.unwrap();
|
||||||
|
let html = Html::parse_document(&String::from_utf8(body.into()).unwrap());
|
||||||
|
let form_selector = Selector::parse("form").unwrap();
|
||||||
|
let mut form_elements = html.select(&form_selector);
|
||||||
|
let form_element = form_elements.next().unwrap();
|
||||||
|
assert_eq!(0, form_elements.count());
|
||||||
|
assert_eq!(Some("create_first_admin_user"), form_element.attr("action"));
|
||||||
|
assert_eq!(Some("post"), form_element.attr("method"));
|
||||||
|
let input_selector = Selector::parse("input").unwrap();
|
||||||
|
let inputs: Vec<_> = form_element.select(&input_selector).collect();
|
||||||
|
assert_eq!(
|
||||||
|
1,
|
||||||
|
inputs
|
||||||
|
.iter()
|
||||||
|
.filter(|elem| elem.attr("name") == Some("real_name"))
|
||||||
|
.count()
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
1,
|
||||||
|
inputs
|
||||||
|
.iter()
|
||||||
|
.filter(|elem| elem.attr("name") == Some("email"))
|
||||||
|
.count()
|
||||||
|
);
|
||||||
|
assert_eq!(
|
||||||
|
1,
|
||||||
|
inputs
|
||||||
|
.iter()
|
||||||
|
.filter(|elem| elem.attr("name") == Some("password"))
|
||||||
|
.filter(|elem| elem.attr("type") == Some("password"))
|
||||||
|
.count()
|
||||||
|
);
|
||||||
|
|
||||||
|
let request = Request::post("/test_admin/create_first_admin_user")
|
||||||
|
.header(
|
||||||
|
http::header::CONTENT_TYPE,
|
||||||
|
"application/x-www-form-urlencoded",
|
||||||
|
)
|
||||||
|
.body(Body::from(
|
||||||
|
"real_name=Joe%20User&email=joe%40user.com&password=abc123",
|
||||||
|
))
|
||||||
|
.unwrap();
|
||||||
|
let response = ServiceExt::<Request<Body>>::ready(&mut app)
|
||||||
|
.await
|
||||||
|
.unwrap()
|
||||||
|
.call(request)
|
||||||
|
.await
|
||||||
|
.unwrap();
|
||||||
|
|
||||||
|
assert_eq!(response.status(), StatusCode::OK);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -7,19 +7,51 @@ use {
|
||||||
Argon2,
|
Argon2,
|
||||||
},
|
},
|
||||||
std::ops::Deref,
|
std::ops::Deref,
|
||||||
|
tracing::{error, warn},
|
||||||
};
|
};
|
||||||
|
|
||||||
mod jwt;
|
mod jwt;
|
||||||
|
|
||||||
pub use jwt::{authenticate_user_with_jwt, create_jwt_for_user, Error as JwtError, ParsedJwt};
|
pub use jwt::{authenticate_user_with_jwt, create_jwt_for_user, Error as JwtError, ParsedJwt};
|
||||||
|
|
||||||
#[derive(thiserror::Error, Debug)]
|
#[derive(Debug)]
|
||||||
pub enum AuthenticationError {
|
pub enum AuthenticationError {
|
||||||
#[error("Could not get password hash from database: {}", .0.to_string())]
|
DatabaseError(db::Error),
|
||||||
DatabaseError(#[from] db::Error),
|
HashError(argon2::password_hash::Error),
|
||||||
|
}
|
||||||
|
|
||||||
#[error("{}", .0.to_string())]
|
impl std::fmt::Display for AuthenticationError {
|
||||||
HashError(#[from] argon2::password_hash::Error),
|
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||||
|
match self {
|
||||||
|
AuthenticationError::HashError(e) => write!(f, "{}", e),
|
||||||
|
AuthenticationError::DatabaseError(e) => {
|
||||||
|
write!(f, "Could not get password hash from database: {}", e)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl std::error::Error for AuthenticationError {
|
||||||
|
fn source(&self) -> Option<&(dyn std::error::Error + 'static)> {
|
||||||
|
match self {
|
||||||
|
AuthenticationError::HashError(_) => None,
|
||||||
|
AuthenticationError::DatabaseError(e) => Some(e),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl From<db::Error> for AuthenticationError {
|
||||||
|
fn from(value: db::Error) -> Self {
|
||||||
|
warn!(details = value.to_string(), "Database error");
|
||||||
|
AuthenticationError::DatabaseError(value)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl From<argon2::password_hash::Error> for AuthenticationError {
|
||||||
|
fn from(value: argon2::password_hash::Error) -> Self {
|
||||||
|
error!(details = value.to_string(), "Error hashing password.");
|
||||||
|
AuthenticationError::HashError(value)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone)]
|
#[derive(Debug, Clone)]
|
||||||
|
|
@ -81,6 +113,7 @@ impl From<Password> for db::PasswordHash {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[tracing::instrument]
|
||||||
pub async fn authenticate_user_with_password<D: Database>(
|
pub async fn authenticate_user_with_password<D: Database>(
|
||||||
db: &D,
|
db: &D,
|
||||||
user: db::User,
|
user: db::User,
|
||||||
|
|
@ -94,6 +127,7 @@ pub async fn authenticate_user_with_password<D: Database>(
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[tracing::instrument]
|
||||||
pub async fn check_if_user_is_admin<D: Database>(
|
pub async fn check_if_user_is_admin<D: Database>(
|
||||||
db: &D,
|
db: &D,
|
||||||
user: &AuthenticatedUser,
|
user: &AuthenticatedUser,
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,128 @@
|
||||||
|
use super::*;
|
||||||
|
use {
|
||||||
|
std::collections::HashSet,
|
||||||
|
std::sync::{Arc, Mutex},
|
||||||
|
};
|
||||||
|
|
||||||
|
#[derive(Debug)]
|
||||||
|
struct UserRow {
|
||||||
|
real_name: String,
|
||||||
|
email: String,
|
||||||
|
password_hash: String,
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Debug, Clone)]
|
||||||
|
pub struct FakeDatabase {
|
||||||
|
users: Arc<Mutex<Vec<UserRow>>>,
|
||||||
|
admin_users: Arc<Mutex<std::collections::HashSet<usize>>>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl FakeDatabase {
|
||||||
|
pub fn new_empty() -> Self {
|
||||||
|
FakeDatabase {
|
||||||
|
users: Arc::new(Mutex::new(Vec::new())),
|
||||||
|
admin_users: Arc::new(Mutex::new(HashSet::new())),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl Database for FakeDatabase {
|
||||||
|
async fn migrate_to_current_version(&self) -> Result<()> {
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn has_admin_users(&self) -> Result<bool> {
|
||||||
|
Ok(self.admin_users.lock().unwrap().len() > 0)
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn create_user(
|
||||||
|
&self,
|
||||||
|
real_name: &str,
|
||||||
|
email: &str,
|
||||||
|
password: &PasswordHash,
|
||||||
|
) -> Result<User> {
|
||||||
|
let mut users = self.users.lock().unwrap();
|
||||||
|
users.push(UserRow {
|
||||||
|
real_name: real_name.to_string(),
|
||||||
|
email: email.to_string(),
|
||||||
|
password_hash: password.to_string(),
|
||||||
|
});
|
||||||
|
Ok(User {
|
||||||
|
id: UserId((users.len() - 1) as i32),
|
||||||
|
real_name: real_name.to_string(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn get_password_for_user(&self, user: &User) -> Result<PasswordHash> {
|
||||||
|
let users = self.users.lock().unwrap();
|
||||||
|
if let Some(UserRow { password_hash, .. }) = users.get(user.id.0 as usize) {
|
||||||
|
Ok(PasswordHash(password_hash.clone()))
|
||||||
|
} else {
|
||||||
|
Err(Error::Database)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn create_first_admin_user(
|
||||||
|
&self,
|
||||||
|
real_name: &str,
|
||||||
|
email: &str,
|
||||||
|
password: &PasswordHash,
|
||||||
|
) -> Result<User> {
|
||||||
|
let user = self.create_user(real_name, email, password).await?;
|
||||||
|
let mut admin_users = self.admin_users.lock().unwrap();
|
||||||
|
admin_users.insert(user.id.0 as usize);
|
||||||
|
Ok(user)
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn is_user_admin(&self, user: &User) -> Result<bool> {
|
||||||
|
let admin_users = self.admin_users.lock().unwrap();
|
||||||
|
Ok(admin_users.contains(&(user.id.0 as usize)))
|
||||||
|
}
|
||||||
|
|
||||||
|
async fn get_user_with_id(&self, user_id: UserId) -> Result<Option<User>> {
|
||||||
|
let users = self.users.lock().unwrap();
|
||||||
|
Ok(users
|
||||||
|
.get(user_id.0 as usize)
|
||||||
|
.map(|UserRow { real_name, .. }| User {
|
||||||
|
id: user_id,
|
||||||
|
real_name: real_name.clone(),
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
mod tests {
|
||||||
|
use super::*;
|
||||||
|
|
||||||
|
#[tokio::test]
|
||||||
|
async fn store_user() {
|
||||||
|
let target = FakeDatabase::new_empty();
|
||||||
|
|
||||||
|
let user = target
|
||||||
|
.create_user(
|
||||||
|
"Jane Doe",
|
||||||
|
"jane.doe@example.com",
|
||||||
|
&PasswordHash("iamjane!".to_string()),
|
||||||
|
)
|
||||||
|
.await
|
||||||
|
.unwrap();
|
||||||
|
let saved_user = target.get_user_with_id(user.id).await.unwrap().unwrap();
|
||||||
|
assert_eq!(user.id, saved_user.id);
|
||||||
|
assert_eq!(user.real_name, saved_user.real_name);
|
||||||
|
}
|
||||||
|
|
||||||
|
#[tokio::test]
|
||||||
|
async fn store_user_password() {
|
||||||
|
let target = FakeDatabase::new_empty();
|
||||||
|
|
||||||
|
let user = target
|
||||||
|
.create_user(
|
||||||
|
"Jane Doe",
|
||||||
|
"jane.doe@example.com",
|
||||||
|
&PasswordHash("iamjane!".to_string()),
|
||||||
|
)
|
||||||
|
.await
|
||||||
|
.unwrap();
|
||||||
|
let saved_password = target.get_password_for_user(&user).await.unwrap();
|
||||||
|
assert_eq!("iamjane!", saved_password.0);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
@ -5,6 +5,9 @@
|
||||||
|
|
||||||
mod migrations;
|
mod migrations;
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
pub mod fake;
|
||||||
|
|
||||||
use {
|
use {
|
||||||
deadpool_postgres::{CreatePoolError, Pool, Runtime},
|
deadpool_postgres::{CreatePoolError, Pool, Runtime},
|
||||||
serde::{Deserialize, Serialize},
|
serde::{Deserialize, Serialize},
|
||||||
|
|
@ -43,7 +46,7 @@ pub type InitialisationResult<T> = std::result::Result<T, InitialisationError>;
|
||||||
#[derive(Debug)]
|
#[derive(Debug)]
|
||||||
pub enum Error {
|
pub enum Error {
|
||||||
Pool(deadpool_postgres::PoolError),
|
Pool(deadpool_postgres::PoolError),
|
||||||
Postgres(tokio_postgres::Error),
|
Database,
|
||||||
NotAllowed,
|
NotAllowed,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -51,7 +54,7 @@ impl std::fmt::Display for Error {
|
||||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||||
match self {
|
match self {
|
||||||
Error::Pool(e) => e.fmt(f),
|
Error::Pool(e) => e.fmt(f),
|
||||||
Error::Postgres(e) => e.fmt(f),
|
Error::Database => write!(f, "Database Error"),
|
||||||
Error::NotAllowed => write!(f, "Not Allowed"),
|
Error::NotAllowed => write!(f, "Not Allowed"),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
@ -78,7 +81,7 @@ impl From<tokio_postgres::Error> for Error {
|
||||||
.unwrap_or(&value.to_string()),
|
.unwrap_or(&value.to_string()),
|
||||||
"PostgreSQL error"
|
"PostgreSQL error"
|
||||||
);
|
);
|
||||||
Error::Postgres(value)
|
Error::Database
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -88,7 +91,6 @@ pub trait Database: std::fmt::Debug + Clone + Send + Sync + 'static {
|
||||||
/// Run migrations as needed to ensure the database schema version
|
/// Run migrations as needed to ensure the database schema version
|
||||||
/// match the one used by the current version of the application.
|
/// match the one used by the current version of the application.
|
||||||
fn migrate_to_current_version(&self) -> impl Future<Output = Result<()>> + Send;
|
fn migrate_to_current_version(&self) -> impl Future<Output = Result<()>> + Send;
|
||||||
fn get_client(&self) -> impl Future<Output = Result<deadpool_postgres::Client>> + Send;
|
|
||||||
fn has_admin_users(&self) -> impl Future<Output = Result<bool>> + Send;
|
fn has_admin_users(&self) -> impl Future<Output = Result<bool>> + Send;
|
||||||
fn create_user(
|
fn create_user(
|
||||||
&self,
|
&self,
|
||||||
|
|
@ -121,7 +123,7 @@ pub struct PostgresDatabase {
|
||||||
connection_pool: Pool,
|
connection_pool: Pool,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Copy, Serialize, Deserialize)]
|
#[derive(Debug, Clone, Copy, Serialize, Deserialize, PartialEq, Eq)]
|
||||||
pub struct UserId(i32);
|
pub struct UserId(i32);
|
||||||
|
|
||||||
#[derive(Debug, Clone)]
|
#[derive(Debug, Clone)]
|
||||||
|
|
@ -157,6 +159,10 @@ impl PostgresDatabase {
|
||||||
connection_pool: pg_pool,
|
connection_pool: pg_pool,
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
async fn get_client(&self) -> Result<deadpool_postgres::Client> {
|
||||||
|
Ok(self.connection_pool.get().await?)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl Database for PostgresDatabase {
|
impl Database for PostgresDatabase {
|
||||||
|
|
@ -166,10 +172,6 @@ impl Database for PostgresDatabase {
|
||||||
migrations::migrate_to_current_version(self).await
|
migrations::migrate_to_current_version(self).await
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn get_client(&self) -> Result<deadpool_postgres::Client> {
|
|
||||||
Ok(self.connection_pool.get().await?)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[tracing::instrument]
|
#[tracing::instrument]
|
||||||
async fn has_admin_users(&self) -> Result<bool> {
|
async fn has_admin_users(&self) -> Result<bool> {
|
||||||
let client = self.get_client().await?;
|
let client = self.get_client().await?;
|
||||||
|
|
|
||||||
11
src/error.rs
11
src/error.rs
|
|
@ -46,14 +46,17 @@ impl IntoResponse for Error {
|
||||||
.into_response()
|
.into_response()
|
||||||
}
|
}
|
||||||
Error::AuthenticationError(_) => {
|
Error::AuthenticationError(_) => {
|
||||||
todo!()
|
error!("Uncaught authentication error producing HTTP 500.");
|
||||||
|
(
|
||||||
|
StatusCode::INTERNAL_SERVER_ERROR,
|
||||||
|
ErrorTemplate { title: "Error" },
|
||||||
|
)
|
||||||
|
.into_response()
|
||||||
}
|
}
|
||||||
Error::Unexpected(_) => {
|
Error::Unexpected(_) => {
|
||||||
todo!()
|
todo!()
|
||||||
}
|
}
|
||||||
Error::Forbidden => {
|
Error::Forbidden => (StatusCode::UNAUTHORIZED, "User not authorized.").into_response(),
|
||||||
(StatusCode::UNAUTHORIZED, "User not authorized.").into_response()
|
|
||||||
}
|
|
||||||
Error::JwtExpired(_) => {
|
Error::JwtExpired(_) => {
|
||||||
todo!()
|
todo!()
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue