mirror of
https://github.com/danbulant/Portfolio
synced 2026-05-20 21:08:35 +00:00
Merge pull request #54 from EETagent/rework_api_tests
This commit is contained in:
commit
c4092c3d29
12 changed files with 340 additions and 48 deletions
2
Cargo.lock
generated
2
Cargo.lock
generated
|
|
@ -1981,9 +1981,11 @@ version = "0.1.0"
|
|||
dependencies = [
|
||||
"async-stream",
|
||||
"async-trait",
|
||||
"chrono",
|
||||
"dotenv",
|
||||
"futures",
|
||||
"futures-util",
|
||||
"once_cell",
|
||||
"portfolio-core",
|
||||
"portfolio-entity",
|
||||
"portfolio-migration",
|
||||
|
|
|
|||
|
|
@ -20,9 +20,15 @@ dotenv = "^0.15"
|
|||
|
||||
serde_json = { version = "^1.0" }
|
||||
|
||||
chrono = "^0.4"
|
||||
|
||||
portfolio-entity = { path = "../entity" }
|
||||
portfolio-migration = { path = "../migration" }
|
||||
portfolio-core = { path = "../core" }
|
||||
|
||||
[dependencies.sea-orm-rocket]
|
||||
version = "^0.5"
|
||||
|
||||
|
||||
[dev-dependencies]
|
||||
once_cell = "1.9.0"
|
||||
|
|
@ -12,6 +12,7 @@ mod guards;
|
|||
mod pool;
|
||||
mod requests;
|
||||
mod routes;
|
||||
pub mod test;
|
||||
|
||||
use pool::Db;
|
||||
|
||||
|
|
@ -29,8 +30,7 @@ async fn run_migrations(rocket: Rocket<Build>) -> fairing::Result {
|
|||
Ok(rocket)
|
||||
}
|
||||
|
||||
#[tokio::main]
|
||||
async fn start() -> Result<(), rocket::Error> {
|
||||
pub fn rocket() -> Rocket<Build>{
|
||||
rocket::build()
|
||||
.attach(Db::init())
|
||||
.attach(AdHoc::try_on_ignite("Migrations", run_migrations))
|
||||
|
|
@ -81,6 +81,11 @@ async fn start() -> Result<(), rocket::Error> {
|
|||
routes::admin::list_candidates,
|
||||
])
|
||||
.register("/", catchers![])
|
||||
}
|
||||
|
||||
#[tokio::main]
|
||||
async fn start() -> Result<(), rocket::Error> {
|
||||
rocket()
|
||||
.launch()
|
||||
.await
|
||||
.map(|_| ())
|
||||
|
|
|
|||
|
|
@ -1,8 +1,9 @@
|
|||
use portfolio_core::sea_orm;
|
||||
|
||||
use portfolio_core::{sea_orm::{self}};
|
||||
use async_trait::async_trait;
|
||||
#[cfg(not(test))]
|
||||
use sea_orm::ConnectOptions;
|
||||
use sea_orm_rocket::{rocket::figment::Figment, Database};
|
||||
#[cfg(not(test))]
|
||||
use std::time::Duration;
|
||||
|
||||
#[derive(Database, Debug)]
|
||||
|
|
@ -20,22 +21,32 @@ impl sea_orm_rocket::Pool for SeaOrmPool {
|
|||
|
||||
type Connection = sea_orm::DatabaseConnection;
|
||||
|
||||
#[cfg(test)]
|
||||
async fn init(_figment: &Figment) -> Result<Self, Self::Error> {
|
||||
let conn = portfolio_core::util::get_memory_sqlite_connection().await;
|
||||
crate::test::tests::run_test_migrations(&conn).await;
|
||||
return Ok(Self { conn });
|
||||
}
|
||||
|
||||
#[cfg(not(test))]
|
||||
async fn init(_figment: &Figment) -> Result<Self, Self::Error> {
|
||||
dotenv::dotenv().ok();
|
||||
|
||||
let database_url = std::env::var("DATABASE_URL").unwrap();
|
||||
let mut options: ConnectOptions = database_url.into();
|
||||
options
|
||||
.max_connections(1024)
|
||||
.min_connections(0)
|
||||
.connect_timeout(Duration::from_secs(3));
|
||||
|
||||
/* options
|
||||
|
||||
/* options
|
||||
.max_connections(config.max_connections as u32)
|
||||
.min_connections(config.min_connections.unwrap_or_default())
|
||||
.connect_timeout(Duration::from_secs(config.connect_timeout));
|
||||
if let Some(idle_timeout) = config.idle_timeout {
|
||||
options.idle_timeout(Duration::from_secs(idle_timeout));
|
||||
} */
|
||||
if let Some(idle_timeout) = config.idle_timeout {
|
||||
options.idle_timeout(Duration::from_secs(idle_timeout));
|
||||
} */
|
||||
|
||||
let conn = sea_orm::Database::connect(options).await?;
|
||||
|
||||
Ok(SeaOrmPool { conn })
|
||||
|
|
@ -44,4 +55,4 @@ impl sea_orm_rocket::Pool for SeaOrmPool {
|
|||
fn borrow(&self) -> &Self::Connection {
|
||||
&self.conn
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -1,4 +1,4 @@
|
|||
use std::net::SocketAddr;
|
||||
use std::net::{SocketAddr, IpAddr, Ipv4Addr};
|
||||
|
||||
use portfolio_core::{
|
||||
crypto::random_8_char_string,
|
||||
|
|
@ -17,9 +17,10 @@ use crate::{guards::request::auth::AdminAuth, pool::Db, requests};
|
|||
pub async fn login(
|
||||
conn: Connection<'_, Db>,
|
||||
login_form: Json<AdminLoginRequest>,
|
||||
ip_addr: SocketAddr,
|
||||
// ip_addr: SocketAddr, // TODO uncomment in production
|
||||
cookies: &CookieJar<'_>,
|
||||
) -> Result<String, Custom<String>> {
|
||||
let ip_addr: SocketAddr = SocketAddr::new(IpAddr::V4(Ipv4Addr::new(127, 0, 0, 1)), 0);
|
||||
let db = conn.into_inner();
|
||||
let session_token_key = AdminService::login(
|
||||
db,
|
||||
|
|
@ -155,4 +156,63 @@ pub async fn get_candidate_portfolio(
|
|||
.map_err(|e| Custom(Status::from_code(e.code()).unwrap(), e.to_string()))?;
|
||||
|
||||
Ok(portfolio)
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
pub mod tests {
|
||||
use rocket::{local::blocking::Client, http::{Cookie, Status}};
|
||||
|
||||
use crate::test::tests::{test_client, ADMIN_PASSWORD, ADMIN_ID};
|
||||
|
||||
pub fn admin_login(client: &Client) -> (Cookie, Cookie) {
|
||||
let response = client
|
||||
.post("/admin/login")
|
||||
.body(format!(
|
||||
"{{
|
||||
\"admin_id\": {},
|
||||
\"password\": \"{}\"
|
||||
}}",
|
||||
ADMIN_ID, ADMIN_PASSWORD
|
||||
))
|
||||
.dispatch();
|
||||
|
||||
println!("{:?}", response);
|
||||
(
|
||||
response.cookies().get("id").unwrap().to_owned(),
|
||||
response.cookies().get("key").unwrap().to_owned(),
|
||||
)
|
||||
}
|
||||
|
||||
fn create_candidate(
|
||||
client: &Client,
|
||||
cookies: (Cookie, Cookie),
|
||||
id: i32,
|
||||
pid: String,
|
||||
) -> String {
|
||||
let response = client
|
||||
.post("/admin/create")
|
||||
.body(format!(
|
||||
"{{
|
||||
\"application_id\": {},
|
||||
\"personal_id_number\": \"{}\"
|
||||
}}",
|
||||
id, pid
|
||||
))
|
||||
.cookie(cookies.0)
|
||||
.cookie(cookies.1)
|
||||
.dispatch();
|
||||
|
||||
assert_eq!(response.status(), Status::Ok);
|
||||
|
||||
response.into_string().unwrap()
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_create_candidate() {
|
||||
let client = test_client().lock().unwrap();
|
||||
let cookies = admin_login(&client);
|
||||
let password = create_candidate(&client, cookies, 1031511, "0".to_string());
|
||||
|
||||
assert_eq!(password.len(), 8);
|
||||
}
|
||||
}
|
||||
|
|
@ -1,4 +1,4 @@
|
|||
use std::net::SocketAddr;
|
||||
use std::net::{IpAddr, Ipv4Addr, SocketAddr};
|
||||
|
||||
use portfolio_core::candidate_details::ApplicationDetails;
|
||||
use portfolio_core::services::application_service::ApplicationService;
|
||||
|
|
@ -19,9 +19,10 @@ use crate::{guards::request::auth::CandidateAuth, pool::Db, requests};
|
|||
pub async fn login(
|
||||
conn: Connection<'_, Db>,
|
||||
login_form: Json<LoginRequest>,
|
||||
ip_addr: SocketAddr,
|
||||
// ip_addr: SocketAddr, // TODO uncomment in production
|
||||
cookies: &CookieJar<'_>,
|
||||
) -> Result<String, Custom<String>> {
|
||||
let ip_addr: SocketAddr = SocketAddr::new(IpAddr::V4(Ipv4Addr::new(127, 0, 0, 1)), 0);
|
||||
let db = conn.into_inner();
|
||||
let session_token_key = CandidateService::login(
|
||||
db,
|
||||
|
|
@ -84,18 +85,14 @@ pub async fn add_details(
|
|||
#[post("/get_details")]
|
||||
pub async fn get_details(
|
||||
conn: Connection<'_, Db>,
|
||||
session: CandidateAuth
|
||||
session: CandidateAuth,
|
||||
) -> Result<Json<ApplicationDetails>, Custom<String>> {
|
||||
let db = conn.into_inner();
|
||||
let private_key = session.get_private_key();
|
||||
let candidate: entity::candidate::Model = session.into();
|
||||
|
||||
|
||||
// let handle = tokio::spawn(async move {
|
||||
let details = ApplicationService::decrypt_all_details(private_key,
|
||||
db,
|
||||
candidate.application
|
||||
)
|
||||
let details = ApplicationService::decrypt_all_details(private_key, db, candidate.application)
|
||||
.await
|
||||
.map_err(|e| {
|
||||
Custom(
|
||||
|
|
@ -302,4 +299,158 @@ pub async fn download_portfolio(session: CandidateAuth) -> Result<Vec<u8>, Custo
|
|||
}
|
||||
|
||||
Ok(file.unwrap())
|
||||
}
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use portfolio_core::{candidate_details::ApplicationDetails, crypto, sea_orm::prelude::Uuid};
|
||||
use rocket::{
|
||||
http::{Cookie, Status},
|
||||
local::blocking::Client,
|
||||
};
|
||||
|
||||
use crate::{test::tests::{test_client, APPLICATION_ID, CANDIDATE_PASSWORD}, routes::admin::tests::admin_login};
|
||||
|
||||
fn candidate_login(client: &Client) -> (Cookie, Cookie) {
|
||||
let response = client
|
||||
.post("/candidate/login")
|
||||
.body(format!(
|
||||
"{{
|
||||
\"application_id\": {},
|
||||
\"password\": \"{}\"
|
||||
}}",
|
||||
APPLICATION_ID, CANDIDATE_PASSWORD
|
||||
))
|
||||
.dispatch();
|
||||
|
||||
(
|
||||
response.cookies().get("id").unwrap().to_owned(),
|
||||
response.cookies().get("key").unwrap().to_owned(),
|
||||
)
|
||||
}
|
||||
|
||||
const CANDIDATE_DETAILS: &'static str = "{
|
||||
\"name\": \"idk\",
|
||||
\"surname\": \"idk\",
|
||||
\"birthplace\": \"Praha 1\",
|
||||
\"birthdate\": \"2015-09-18\",
|
||||
\"address\": \"Stefanikova jidelna\",
|
||||
\"telephone\": \"000111222333\",
|
||||
\"citizenship\": \"Czech Republic\",
|
||||
\"email\": \"magor@magor.cz\",
|
||||
\"sex\": \"MALE\",
|
||||
\"study\": \"KB\",
|
||||
\"parent_name\": \"maminka\",
|
||||
\"parent_surname\": \"chad\",
|
||||
\"parent_telephone\": \"420111222333\",
|
||||
\"parent_email\": \"maminka@centrum.cz\"
|
||||
}";
|
||||
|
||||
#[test]
|
||||
fn test_login_valid_credentials() {
|
||||
let client = test_client().lock().unwrap();
|
||||
let _response = candidate_login(&client);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_auth_candidate() {
|
||||
let client = test_client().lock().unwrap();
|
||||
let cookies = candidate_login(&client);
|
||||
let response = client
|
||||
.get("/candidate/whoami")
|
||||
.cookie(cookies.0)
|
||||
.cookie(cookies.1)
|
||||
.dispatch();
|
||||
|
||||
assert_eq!(response.status(), Status::Ok);
|
||||
assert_eq!(response.into_string().unwrap(), APPLICATION_ID.to_string());
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_add_get_candidate_details() {
|
||||
let client = test_client().lock().unwrap();
|
||||
let cookies = candidate_login(&client);
|
||||
|
||||
let details_orig: ApplicationDetails = serde_json::from_str(CANDIDATE_DETAILS).unwrap();
|
||||
|
||||
let response = client
|
||||
.post("/candidate/add/details")
|
||||
.cookie(cookies.0.clone())
|
||||
.cookie(cookies.1.clone())
|
||||
.body(CANDIDATE_DETAILS.to_string())
|
||||
.dispatch();
|
||||
|
||||
assert_eq!(response.status(), Status::Ok);
|
||||
|
||||
let response = client
|
||||
.post("/candidate/get_details")
|
||||
.cookie(cookies.0)
|
||||
.cookie(cookies.1)
|
||||
.dispatch();
|
||||
|
||||
assert_eq!(response.status(), Status::Ok);
|
||||
|
||||
let details_resp: ApplicationDetails =
|
||||
serde_json::from_str(&response.into_string().unwrap()).unwrap();
|
||||
assert_eq!(details_orig, details_resp);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_invalid_token_every_secured_endpoint() {
|
||||
let client = test_client().lock().unwrap();
|
||||
|
||||
let id = Cookie::new("id", Uuid::new_v4().to_string());
|
||||
let (private_key, _) = crypto::create_identity();
|
||||
let key = Cookie::new("key", private_key);
|
||||
|
||||
let response = client
|
||||
.post("/candidate/add/details")
|
||||
.cookie(id.clone())
|
||||
.cookie(key.clone())
|
||||
.body(CANDIDATE_DETAILS.to_string())
|
||||
.dispatch();
|
||||
assert_eq!(response.status(), Status::Unauthorized);
|
||||
|
||||
let response = client
|
||||
.post("/candidate/get_details")
|
||||
.cookie(id.clone())
|
||||
.cookie(key.clone())
|
||||
.dispatch();
|
||||
assert_eq!(response.status(), Status::Unauthorized);
|
||||
|
||||
let response = client
|
||||
.get("/candidate/whoami")
|
||||
.cookie(id.clone())
|
||||
.cookie(key.clone())
|
||||
.dispatch();
|
||||
assert_eq!(response.status(), Status::Unauthorized);
|
||||
}
|
||||
|
||||
#[test]
|
||||
fn test_admin_token_on_secured_candidate_endpoints() {
|
||||
let client = test_client().lock().unwrap();
|
||||
let cookies = admin_login(&client);
|
||||
|
||||
let response = client
|
||||
.post("/candidate/add/details")
|
||||
.cookie(cookies.0.clone())
|
||||
.cookie(cookies.1.clone())
|
||||
.body(CANDIDATE_DETAILS.to_string())
|
||||
.dispatch();
|
||||
assert_eq!(response.status(), Status::Unauthorized);
|
||||
|
||||
let response = client
|
||||
.post("/candidate/get_details")
|
||||
.cookie(cookies.0.clone())
|
||||
.cookie(cookies.1.clone())
|
||||
.dispatch();
|
||||
assert_eq!(response.status(), Status::Unauthorized);
|
||||
|
||||
let response = client
|
||||
.get("/candidate/whoami")
|
||||
.cookie(cookies.0.clone())
|
||||
.cookie(cookies.1.clone())
|
||||
.dispatch();
|
||||
assert_eq!(response.status(), Status::Unauthorized);
|
||||
}
|
||||
}
|
||||
|
|
|
|||
62
api/src/test.rs
Normal file
62
api/src/test.rs
Normal file
|
|
@ -0,0 +1,62 @@
|
|||
#[cfg(test)]
|
||||
pub mod tests {
|
||||
use crate::rocket;
|
||||
use entity::admin;
|
||||
use once_cell::sync::OnceCell;
|
||||
use portfolio_core::{
|
||||
crypto,
|
||||
sea_orm::{ActiveModelTrait, DbConn, Set},
|
||||
services::application_service::ApplicationService,
|
||||
};
|
||||
use rocket::{
|
||||
local::blocking::Client,
|
||||
};
|
||||
use std::sync::Mutex;
|
||||
|
||||
pub const ADMIN_ID: i32 = 1;
|
||||
pub const ADMIN_PASSWORD: &'static str = "test";
|
||||
|
||||
pub const APPLICATION_ID: i32 = 103151;
|
||||
pub const CANDIDATE_PASSWORD: &'static str = "test";
|
||||
pub const PERSONAL_ID_NUMBER: &'static str = "0101010000";
|
||||
|
||||
pub async fn run_test_migrations(db: &DbConn) {
|
||||
let (pubkey, priv_key) = crypto::create_identity();
|
||||
let priv_key = crypto::encrypt_password(priv_key, ADMIN_PASSWORD.to_string())
|
||||
.await
|
||||
.unwrap();
|
||||
let password_hash = crypto::hash_password(ADMIN_PASSWORD.to_string())
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
admin::ActiveModel {
|
||||
id: Set(ADMIN_ID),
|
||||
name: Set("admin pepa".to_string()),
|
||||
public_key: Set(pubkey),
|
||||
private_key: Set(priv_key),
|
||||
password: Set(password_hash),
|
||||
created_at: Set(chrono::Utc::now().naive_utc()),
|
||||
updated_at: Set(chrono::Utc::now().naive_utc()),
|
||||
}
|
||||
.insert(db)
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
ApplicationService::create_candidate_with_parent(
|
||||
db,
|
||||
APPLICATION_ID,
|
||||
&CANDIDATE_PASSWORD.to_string(),
|
||||
PERSONAL_ID_NUMBER.to_string(),
|
||||
)
|
||||
.await
|
||||
.unwrap();
|
||||
}
|
||||
|
||||
pub fn test_client() -> &'static Mutex<Client> {
|
||||
static INSTANCE: OnceCell<Mutex<Client>> = OnceCell::new();
|
||||
INSTANCE.get_or_init(|| {
|
||||
let rocket = rocket();
|
||||
Mutex::from(Client::tracked(rocket).expect("valid rocket instance"))
|
||||
})
|
||||
}
|
||||
}
|
||||
|
|
@ -185,7 +185,7 @@ impl TryFrom<(candidate::Model, parent::Model)> for EncryptedApplicationDetails
|
|||
}
|
||||
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize)]
|
||||
#[derive(Debug, Serialize, Deserialize, PartialEq, Eq)]
|
||||
pub struct ApplicationDetails {
|
||||
// Candidate
|
||||
pub name: String,
|
||||
|
|
|
|||
|
|
@ -8,6 +8,8 @@ pub enum ServiceError {
|
|||
InvalidApplicationId,
|
||||
#[error("Invalid credentials")]
|
||||
InvalidCredentials,
|
||||
#[error("Unauthorized")]
|
||||
Unauthorized,
|
||||
#[error("Forbidden")]
|
||||
Forbidden,
|
||||
#[error("Session expired, please login agai")]
|
||||
|
|
@ -65,6 +67,7 @@ impl ServiceError {
|
|||
match self {
|
||||
ServiceError::InvalidApplicationId => 400,
|
||||
ServiceError::InvalidCredentials => 401,
|
||||
ServiceError::Unauthorized => 401,
|
||||
ServiceError::Forbidden => 403,
|
||||
ServiceError::ExpiredSession => 401,
|
||||
ServiceError::JwtError => 500,
|
||||
|
|
|
|||
|
|
@ -41,7 +41,7 @@ impl AdminService {
|
|||
pub async fn auth(db: &DbConn, session_uuid: Uuid) -> Result<admin::Model, ServiceError> {
|
||||
match SessionService::auth_user_session(db, session_uuid).await? {
|
||||
AdminUser::Admin(admin) => Ok(admin),
|
||||
AdminUser::Candidate(_) => unreachable!(),
|
||||
AdminUser::Candidate(_) => Err(ServiceError::Unauthorized),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -215,7 +215,7 @@ impl CandidateService {
|
|||
match SessionService::auth_user_session(db, session_uuid).await {
|
||||
Ok(user) => match user {
|
||||
AdminUser::Candidate(candidate) => Ok(candidate),
|
||||
AdminUser::Admin(_) => unreachable!(),
|
||||
AdminUser::Admin(_) => Err(ServiceError::Unauthorized),
|
||||
},
|
||||
Err(e) => Err(e),
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,30 +1,22 @@
|
|||
#[cfg(test)]
|
||||
use entity::{admin, candidate, parent, session};
|
||||
use sea_orm::{Schema, Database, DbConn};
|
||||
use sea_orm::{sea_query::TableCreateStatement, ConnectionTrait, DbBackend};
|
||||
|
||||
|
||||
pub async fn get_memory_sqlite_connection() -> sea_orm::DbConn {
|
||||
use entity::{admin, candidate, parent, session};
|
||||
use sea_orm::{Schema, Database, DbConn};
|
||||
use sea_orm::{sea_query::TableCreateStatement, ConnectionTrait, DbBackend};
|
||||
|
||||
let base_url = "sqlite::memory:";
|
||||
let db: DbConn = Database::connect(base_url).await.unwrap();
|
||||
let db: DbConn = Database::connect(base_url).await.unwrap();
|
||||
|
||||
let schema = Schema::new(DbBackend::Sqlite);
|
||||
let stmt: TableCreateStatement = schema.create_table_from_entity(candidate::Entity);
|
||||
let stmt2: TableCreateStatement = schema.create_table_from_entity(admin::Entity);
|
||||
let stmt3: TableCreateStatement = schema.create_table_from_entity(session::Entity);
|
||||
let stmt4: TableCreateStatement = schema.create_table_from_entity(parent::Entity);
|
||||
db.execute(db.get_database_backend().build(&stmt))
|
||||
.await
|
||||
.unwrap();
|
||||
db.execute(db.get_database_backend().build(&stmt2))
|
||||
.await
|
||||
.unwrap();
|
||||
db.execute(db.get_database_backend().build(&stmt3))
|
||||
.await
|
||||
.unwrap();
|
||||
db.execute(db.get_database_backend().build(&stmt4))
|
||||
.await
|
||||
.unwrap();
|
||||
db
|
||||
let schema = Schema::new(DbBackend::Sqlite);
|
||||
let stmt: TableCreateStatement = schema.create_table_from_entity(candidate::Entity);
|
||||
let stmt2: TableCreateStatement = schema.create_table_from_entity(admin::Entity);
|
||||
let stmt3: TableCreateStatement = schema.create_table_from_entity(session::Entity);
|
||||
let stmt4: TableCreateStatement = schema.create_table_from_entity(parent::Entity);
|
||||
db.execute(db.get_database_backend().build(&stmt)).await.unwrap();
|
||||
db.execute(db.get_database_backend().build(&stmt2)).await.unwrap();
|
||||
db.execute(db.get_database_backend().build(&stmt3)).await.unwrap();
|
||||
db.execute(db.get_database_backend().build(&stmt4)).await.unwrap();
|
||||
db
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
|
|
|
|||
Loading…
Reference in a new issue