Move AuthenticatedRegistrarAccessor to request/auth/

It is starting to be used in more places than just ur/server/registrar. Even now it's used in the RDAP, and we are going to start using it for the registrar-xhr endpoint meaning it will be used in EPP flows as well.

Also logically - this is part of the request authentication.

While moving - we also refactor it to make it easier to use in tests. Instead of mocking, we will be able to create instances with arbitrary roles.

-------------
Created by MOE: https://github.com/google/moe
MOE_MIGRATED_REVID=221645055
This commit is contained in:
guyben 2018-11-15 10:19:02 -08:00 committed by jianglai
parent b317aab22f
commit 6586460f3e
15 changed files with 173 additions and 159 deletions

View file

@ -47,8 +47,8 @@ import google.registry.request.RequestMethod;
import google.registry.request.RequestPath; import google.registry.request.RequestPath;
import google.registry.request.Response; import google.registry.request.Response;
import google.registry.request.auth.AuthResult; import google.registry.request.auth.AuthResult;
import google.registry.request.auth.AuthenticatedRegistrarAccessor;
import google.registry.request.auth.UserAuthInfo; import google.registry.request.auth.UserAuthInfo;
import google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor;
import google.registry.util.Clock; import google.registry.util.Clock;
import java.io.IOException; import java.io.IOException;
import java.net.URI; import java.net.URI;

View file

@ -115,6 +115,10 @@ public abstract class HttpException extends RuntimeException {
super(HttpServletResponse.SC_FORBIDDEN, message, null); super(HttpServletResponse.SC_FORBIDDEN, message, null);
} }
public ForbiddenException(String message, Exception cause) {
super(HttpServletResponse.SC_FORBIDDEN, message, cause);
}
@Override @Override
public String getResponseCodeString() { public String getResponseCodeString() {
return "Forbidden"; return "Forbidden";

View file

@ -12,8 +12,10 @@
// See the License for the specific language governing permissions and // See the License for the specific language governing permissions and
// limitations under the License. // limitations under the License.
package google.registry.ui.server.registrar; package google.registry.request.auth;
import static com.google.common.base.MoreObjects.toStringHelper;
import static com.google.common.base.Preconditions.checkNotNull;
import static google.registry.model.ofy.ObjectifyService.ofy; import static google.registry.model.ofy.ObjectifyService.ofy;
import com.google.appengine.api.users.User; import com.google.appengine.api.users.User;
@ -27,19 +29,16 @@ import google.registry.config.RegistryConfig.Config;
import google.registry.groups.GroupsConnection; import google.registry.groups.GroupsConnection;
import google.registry.model.registrar.Registrar; import google.registry.model.registrar.Registrar;
import google.registry.model.registrar.RegistrarContact; import google.registry.model.registrar.RegistrarContact;
import google.registry.request.HttpException.ForbiddenException;
import google.registry.request.auth.AuthResult;
import google.registry.request.auth.UserAuthInfo;
import javax.annotation.concurrent.Immutable; import javax.annotation.concurrent.Immutable;
import javax.inject.Inject; import javax.inject.Inject;
/** /**
* Allows access only to {@link Registrar}s the current user has access to. * Allows access only to {@link Registrar}s the current user has access to.
* *
* <p>A user has OWNER role on a Registrar if there exists a {@link RegistrarContact} with * <p>A user has OWNER role on a Registrar if there exists a {@link RegistrarContact} with that
* that user's gaeId and the registrar as a parent. * user's gaeId and the registrar as a parent.
* *
* <p>An admin has in addition OWNER role on {@link #registryAdminClientId}. * <p>An admin has in addition OWNER role on {@code #registryAdminClientId}.
* *
* <p>An admin also has ADMIN role on ALL registrars. * <p>An admin also has ADMIN role on ALL registrars.
*/ */
@ -54,13 +53,14 @@ public class AuthenticatedRegistrarAccessor {
ADMIN ADMIN
} }
AuthResult authResult; private final String userIdForLogging;
String registryAdminClientId;
/** /**
* Gives all roles a user has for a given clientId. * Gives all roles a user has for a given clientId.
* *
* <p>The order is significant, with "more specific to this user" coming first. * <p>The order is significant, with "more specific to this user" coming first.
*
* <p>Logged out users have an empty roleMap.
*/ */
private final ImmutableSetMultimap<String, Role> roleMap; private final ImmutableSetMultimap<String, Role> roleMap;
@ -89,28 +89,42 @@ public class AuthenticatedRegistrarAccessor {
overrideGroupsConnection != null ? overrideGroupsConnection : groupsConnection.get()); overrideGroupsConnection != null ? overrideGroupsConnection : groupsConnection.get());
} }
@VisibleForTesting
AuthenticatedRegistrarAccessor( AuthenticatedRegistrarAccessor(
AuthResult authResult, AuthResult authResult,
@Config("registryAdminClientId") String registryAdminClientId, String registryAdminClientId,
@Config("gSuiteSupportGroupEmailAddress") String gSuiteSupportGroupEmailAddress, String gSuiteSupportGroupEmailAddress,
GroupsConnection groupsConnection) { GroupsConnection groupsConnection) {
this.authResult = authResult; this(
this.registryAdminClientId = registryAdminClientId; authResult.userIdForLogging(),
this.roleMap =
createRoleMap( createRoleMap(
authResult, authResult, registryAdminClientId, groupsConnection, gSuiteSupportGroupEmailAddress));
registryAdminClientId,
groupsConnection,
gSuiteSupportGroupEmailAddress);
logger.atInfo().log( logger.atInfo().log(
"%s has the following roles: %s", authResult.userIdForLogging(), roleMap); "%s has the following roles: %s", authResult.userIdForLogging(), roleMap);
} }
private AuthenticatedRegistrarAccessor(
String userIdForLogging, ImmutableSetMultimap<String, Role> roleMap) {
this.userIdForLogging = checkNotNull(userIdForLogging);
this.roleMap = checkNotNull(roleMap);
}
/**
* Creates a "logged-in user" accessor with a given role map, used for tests.
*
* <p>The user's "name" in logs and exception messages is "TestUserId".
*/
@VisibleForTesting
public static AuthenticatedRegistrarAccessor createForTesting(
ImmutableSetMultimap<String, Role> roleMap) {
return new AuthenticatedRegistrarAccessor("TestUserId", roleMap);
}
/** /**
* A map that gives all roles a user has for a given clientId. * A map that gives all roles a user has for a given clientId.
* *
* <p>Throws a {@link ForbiddenException} if the user is not logged in. * <p>Throws a {@link RegistrarAccessDeniedException} if the user is not logged in.
* *
* <p>The result is ordered starting from "most specific to this user". * <p>The result is ordered starting from "most specific to this user".
* *
@ -129,7 +143,7 @@ public class AuthenticatedRegistrarAccessor {
/** /**
* "Guesses" which client ID the user wants from all those they have access to. * "Guesses" which client ID the user wants from all those they have access to.
* *
* <p>If no such ClientIds exist, throws a ForbiddenException. * <p>If no such ClientIds exist, throws a RegistrarAccessDeniedException.
* *
* <p>This should be the ClientId "most likely wanted by the user". * <p>This should be the ClientId "most likely wanted by the user".
* *
@ -141,56 +155,59 @@ public class AuthenticatedRegistrarAccessor {
* other clue as to the requested {@code clientId}. It is perfectly OK to get a {@code clientId} * other clue as to the requested {@code clientId}. It is perfectly OK to get a {@code clientId}
* from any other source, as long as the registrar is then loaded using {@link #getRegistrar}. * from any other source, as long as the registrar is then loaded using {@link #getRegistrar}.
*/ */
public String guessClientId() { public String guessClientId() throws RegistrarAccessDeniedException {
verifyLoggedIn();
return getAllClientIdWithRoles().keySet().stream() return getAllClientIdWithRoles().keySet().stream()
.findFirst() .findFirst()
.orElseThrow( .orElseThrow(
() -> () ->
new ForbiddenException( new RegistrarAccessDeniedException(
String.format( String.format("%s isn't associated with any registrar", userIdForLogging)));
"%s isn't associated with any registrar",
authResult.userIdForLogging())));
} }
/** /**
* Loads a Registrar IFF the user is authorized. * Loads a Registrar IFF the user is authorized.
* *
* <p>Throws a {@link ForbiddenException} if the user is not logged in, or not authorized to * <p>Throws a {@link RegistrarAccessDeniedException} if the user is not logged in, or not
* access the requested registrar. * authorized to access the requested registrar.
* *
* @param clientId ID of the registrar we request * @param clientId ID of the registrar we request
*/ */
public Registrar getRegistrar(String clientId) { public Registrar getRegistrar(String clientId) throws RegistrarAccessDeniedException {
verifyLoggedIn(); verifyAccess(clientId);
ImmutableSet<Role> roles = getAllClientIdWithRoles().get(clientId);
if (roles.isEmpty()) {
throw new ForbiddenException(
String.format(
"%s doesn't have access to registrar %s",
authResult.userIdForLogging(), clientId));
}
Registrar registrar = Registrar registrar =
Registrar.loadByClientId(clientId) Registrar.loadByClientId(clientId)
.orElseThrow( .orElseThrow(
() -> new ForbiddenException(String.format("Registrar %s not found", clientId))); () ->
new RegistrarAccessDeniedException(
String.format("Registrar %s not found", clientId)));
if (!clientId.equals(registrar.getClientId())) { if (!clientId.equals(registrar.getClientId())) {
logger.atSevere().log( logger.atSevere().log(
"registrarLoader.apply(clientId) returned a Registrar with a different clientId. " "registrarLoader.apply(clientId) returned a Registrar with a different clientId. "
+ "Requested: %s, returned: %s.", + "Requested: %s, returned: %s.",
clientId, registrar.getClientId()); clientId, registrar.getClientId());
throw new ForbiddenException("Internal error - please check logs"); throw new RegistrarAccessDeniedException("Internal error - please check logs");
} }
logger.atInfo().log(
"%s has %s access to registrar %s.", authResult.userIdForLogging(), roles, clientId);
return registrar; return registrar;
} }
public void verifyAccess(String clientId) throws RegistrarAccessDeniedException {
ImmutableSet<Role> roles = getAllClientIdWithRoles().get(clientId);
if (roles.isEmpty()) {
throw new RegistrarAccessDeniedException(
String.format("%s doesn't have access to registrar %s", userIdForLogging, clientId));
}
logger.atInfo().log("%s has %s access to registrar %s.", userIdForLogging, roles, clientId);
}
@Override
public String toString() {
return toStringHelper(getClass()).add("authResult", userIdForLogging).toString();
}
private static boolean checkIsSupport( private static boolean checkIsSupport(
GroupsConnection groupsConnection, String userEmail, String supportEmail) { GroupsConnection groupsConnection, String userEmail, String supportEmail) {
if (Strings.isNullOrEmpty(supportEmail)) { if (Strings.isNullOrEmpty(supportEmail)) {
@ -246,9 +263,10 @@ public class AuthenticatedRegistrarAccessor {
return builder.build(); return builder.build();
} }
private void verifyLoggedIn() { /** Exception thrown when the current user doesn't have access to the requested Registrar. */
if (!authResult.userAuthInfo().isPresent()) { public static class RegistrarAccessDeniedException extends Exception {
throw new ForbiddenException("Not logged in"); RegistrarAccessDeniedException(String message) {
super(message);
} }
} }
} }

View file

@ -9,6 +9,8 @@ java_library(
srcs = glob(["*.java"]), srcs = glob(["*.java"]),
deps = [ deps = [
"//java/google/registry/config", "//java/google/registry/config",
"//java/google/registry/groups",
"//java/google/registry/model",
"//java/google/registry/security", "//java/google/registry/security",
"@com_google_appengine_api_1_0_sdk", "@com_google_appengine_api_1_0_sdk",
"@com_google_auto_value", "@com_google_auto_value",

View file

@ -15,7 +15,6 @@ java_library(
"//java/google/registry/config", "//java/google/registry/config",
"//java/google/registry/export/sheet", "//java/google/registry/export/sheet",
"//java/google/registry/flows", "//java/google/registry/flows",
"//java/google/registry/groups",
"//java/google/registry/model", "//java/google/registry/model",
"//java/google/registry/request", "//java/google/registry/request",
"//java/google/registry/request/auth", "//java/google/registry/request/auth",

View file

@ -16,7 +16,7 @@ package google.registry.ui.server.registrar;
import static com.google.common.net.HttpHeaders.LOCATION; import static com.google.common.net.HttpHeaders.LOCATION;
import static com.google.common.net.HttpHeaders.X_FRAME_OPTIONS; import static com.google.common.net.HttpHeaders.X_FRAME_OPTIONS;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.ADMIN; import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.ADMIN;
import static google.registry.ui.server.registrar.RegistrarConsoleModule.PARAM_CLIENT_ID; import static google.registry.ui.server.registrar.RegistrarConsoleModule.PARAM_CLIENT_ID;
import static javax.servlet.http.HttpServletResponse.SC_FORBIDDEN; import static javax.servlet.http.HttpServletResponse.SC_FORBIDDEN;
import static javax.servlet.http.HttpServletResponse.SC_MOVED_TEMPORARILY; import static javax.servlet.http.HttpServletResponse.SC_MOVED_TEMPORARILY;
@ -36,14 +36,15 @@ import com.google.template.soy.tofu.SoyTofu;
import google.registry.config.RegistryConfig.Config; import google.registry.config.RegistryConfig.Config;
import google.registry.model.registrar.Registrar; import google.registry.model.registrar.Registrar;
import google.registry.request.Action; import google.registry.request.Action;
import google.registry.request.HttpException.ForbiddenException;
import google.registry.request.Parameter; import google.registry.request.Parameter;
import google.registry.request.Response; import google.registry.request.Response;
import google.registry.request.auth.Auth; import google.registry.request.auth.Auth;
import google.registry.request.auth.AuthResult; import google.registry.request.auth.AuthResult;
import google.registry.request.auth.AuthenticatedRegistrarAccessor;
import google.registry.request.auth.AuthenticatedRegistrarAccessor.RegistrarAccessDeniedException;
import google.registry.request.auth.AuthenticatedRegistrarAccessor.Role;
import google.registry.security.XsrfTokenManager; import google.registry.security.XsrfTokenManager;
import google.registry.ui.server.SoyTemplateUtils; import google.registry.ui.server.SoyTemplateUtils;
import google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role;
import google.registry.ui.soy.registrar.ConsoleSoyInfo; import google.registry.ui.soy.registrar.ConsoleSoyInfo;
import java.util.Optional; import java.util.Optional;
import javax.inject.Inject; import javax.inject.Inject;
@ -151,7 +152,7 @@ public final class ConsoleUiAction implements Runnable {
// because the requests come from the browser, and can easily be faked) // because the requests come from the browser, and can easily be faked)
Registrar registrar = registrarAccessor.getRegistrar(clientId); Registrar registrar = registrarAccessor.getRegistrar(clientId);
data.put("requireFeeExtension", registrar.getPremiumPriceAckRequired()); data.put("requireFeeExtension", registrar.getPremiumPriceAckRequired());
} catch (ForbiddenException e) { } catch (RegistrarAccessDeniedException e) {
logger.atWarning().withCause(e).log( logger.atWarning().withCause(e).log(
"User %s doesn't have access to registrar console.", authResult.userIdForLogging()); "User %s doesn't have access to registrar console.", authResult.userIdForLogging());
response.setStatus(SC_FORBIDDEN); response.setStatus(SC_FORBIDDEN);

View file

@ -18,7 +18,7 @@ import com.google.common.collect.ImmutableSet;
import com.google.monitoring.metrics.IncrementableMetric; import com.google.monitoring.metrics.IncrementableMetric;
import com.google.monitoring.metrics.LabelDescriptor; import com.google.monitoring.metrics.LabelDescriptor;
import com.google.monitoring.metrics.MetricRegistryImpl; import com.google.monitoring.metrics.MetricRegistryImpl;
import google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role; import google.registry.request.auth.AuthenticatedRegistrarAccessor.Role;
import javax.inject.Inject; import javax.inject.Inject;
final class RegistrarConsoleMetrics { final class RegistrarConsoleMetrics {

View file

@ -42,11 +42,13 @@ import google.registry.request.HttpException.ForbiddenException;
import google.registry.request.JsonActionRunner; import google.registry.request.JsonActionRunner;
import google.registry.request.auth.Auth; import google.registry.request.auth.Auth;
import google.registry.request.auth.AuthResult; import google.registry.request.auth.AuthResult;
import google.registry.request.auth.AuthenticatedRegistrarAccessor;
import google.registry.request.auth.AuthenticatedRegistrarAccessor.RegistrarAccessDeniedException;
import google.registry.request.auth.AuthenticatedRegistrarAccessor.Role;
import google.registry.security.JsonResponseHelper; import google.registry.security.JsonResponseHelper;
import google.registry.ui.forms.FormException; import google.registry.ui.forms.FormException;
import google.registry.ui.forms.FormFieldException; import google.registry.ui.forms.FormFieldException;
import google.registry.ui.server.RegistrarFormFields; import google.registry.ui.server.RegistrarFormFields;
import google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role;
import google.registry.util.AppEngineServiceUtils; import google.registry.util.AppEngineServiceUtils;
import google.registry.util.CollectionUtils; import google.registry.util.CollectionUtils;
import google.registry.util.DiffUtils; import google.registry.util.DiffUtils;
@ -161,7 +163,11 @@ public class RegistrarSettingsAction implements Runnable, JsonActionRunner.JsonA
} }
private RegistrarResult read(String clientId) { private RegistrarResult read(String clientId) {
try {
return RegistrarResult.create("Success", registrarAccessor.getRegistrar(clientId)); return RegistrarResult.create("Success", registrarAccessor.getRegistrar(clientId));
} catch (RegistrarAccessDeniedException e) {
throw new ForbiddenException(e.getMessage(), e);
}
} }
private RegistrarResult update(final Map<String, ?> args, String clientId) { private RegistrarResult update(final Map<String, ?> args, String clientId) {
@ -171,7 +177,12 @@ public class RegistrarSettingsAction implements Runnable, JsonActionRunner.JsonA
// We load the registrar here rather than outside of the transaction - to make // We load the registrar here rather than outside of the transaction - to make
// sure we have the latest version. This one is loaded inside the transaction, so it's // sure we have the latest version. This one is loaded inside the transaction, so it's
// guaranteed to not change before we update it. // guaranteed to not change before we update it.
Registrar registrar = registrarAccessor.getRegistrar(clientId); Registrar registrar;
try {
registrar = registrarAccessor.getRegistrar(clientId);
} catch (RegistrarAccessDeniedException e) {
throw new ForbiddenException(e.getMessage(), e);
}
// Verify that the registrar hasn't been changed. // Verify that the registrar hasn't been changed.
// To do that - we find the latest update time (or null if the registrar has been // To do that - we find the latest update time (or null if the registrar has been
// deleted) and compare to the update time from the args. The update time in the args // deleted) and compare to the update time from the args. The update time in the args

View file

@ -19,7 +19,7 @@ import static google.registry.rdap.RdapAuthorization.Role.PUBLIC;
import static google.registry.rdap.RdapAuthorization.Role.REGISTRAR; import static google.registry.rdap.RdapAuthorization.Role.REGISTRAR;
import static google.registry.request.Action.Method.GET; import static google.registry.request.Action.Method.GET;
import static google.registry.request.Action.Method.HEAD; import static google.registry.request.Action.Method.HEAD;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.OWNER; import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.OWNER;
import static org.mockito.Mockito.mock; import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when; import static org.mockito.Mockito.when;
@ -29,12 +29,12 @@ import google.registry.model.ofy.Ofy;
import google.registry.request.Action; import google.registry.request.Action;
import google.registry.request.auth.AuthLevel; import google.registry.request.auth.AuthLevel;
import google.registry.request.auth.AuthResult; import google.registry.request.auth.AuthResult;
import google.registry.request.auth.AuthenticatedRegistrarAccessor;
import google.registry.request.auth.UserAuthInfo; import google.registry.request.auth.UserAuthInfo;
import google.registry.testing.AppEngineRule; import google.registry.testing.AppEngineRule;
import google.registry.testing.FakeClock; import google.registry.testing.FakeClock;
import google.registry.testing.FakeResponse; import google.registry.testing.FakeResponse;
import google.registry.testing.InjectRule; import google.registry.testing.InjectRule;
import google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor;
import google.registry.util.TypeUtils; import google.registry.util.TypeUtils;
import java.util.Optional; import java.util.Optional;
import org.joda.time.DateTime; import org.joda.time.DateTime;

View file

@ -12,16 +12,16 @@
// See the License for the specific language governing permissions and // See the License for the specific language governing permissions and
// limitations under the License. // limitations under the License.
package google.registry.ui.server.registrar; package google.registry.request.auth;
import static com.google.common.truth.Truth.assertThat; import static com.google.common.truth.Truth.assertThat;
import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.ADMIN;
import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.OWNER;
import static google.registry.testing.AppEngineRule.THE_REGISTRAR_GAE_USER_ID; import static google.registry.testing.AppEngineRule.THE_REGISTRAR_GAE_USER_ID;
import static google.registry.testing.DatastoreHelper.loadRegistrar; import static google.registry.testing.DatastoreHelper.loadRegistrar;
import static google.registry.testing.DatastoreHelper.persistResource; import static google.registry.testing.DatastoreHelper.persistResource;
import static google.registry.testing.JUnitBackports.assertThrows; import static google.registry.testing.JUnitBackports.assertThrows;
import static google.registry.testing.LogsSubject.assertAboutLogs; import static google.registry.testing.LogsSubject.assertAboutLogs;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.ADMIN;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.OWNER;
import static org.mockito.Matchers.any; import static org.mockito.Matchers.any;
import static org.mockito.Mockito.mock; import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.verify; import static org.mockito.Mockito.verify;
@ -33,10 +33,7 @@ import com.google.common.flogger.LoggerConfig;
import com.google.common.testing.NullPointerTester; import com.google.common.testing.NullPointerTester;
import com.google.common.testing.TestLogHandler; import com.google.common.testing.TestLogHandler;
import google.registry.groups.GroupsConnection; import google.registry.groups.GroupsConnection;
import google.registry.request.HttpException.ForbiddenException; import google.registry.request.auth.AuthenticatedRegistrarAccessor.RegistrarAccessDeniedException;
import google.registry.request.auth.AuthLevel;
import google.registry.request.auth.AuthResult;
import google.registry.request.auth.UserAuthInfo;
import google.registry.testing.AppEngineRule; import google.registry.testing.AppEngineRule;
import google.registry.testing.InjectRule; import google.registry.testing.InjectRule;
import java.util.logging.Level; import java.util.logging.Level;
@ -76,7 +73,8 @@ public class AuthenticatedRegistrarAccessorTest {
UserAuthInfo.create( UserAuthInfo.create(
new User( new User(
String.format( String.format(
"%s_%s@gmail.com", isAuthorized ? "good" : "evil", isAdmin ? "admin" : "user"), "%s_%s@gmail.com",
isAuthorized ? "auth" : "unauth", isAdmin ? "admin" : "user"),
"gmail.com", "gmail.com",
isAuthorized ? THE_REGISTRAR_GAE_USER_ID : "badGaeUserId"), isAuthorized ? THE_REGISTRAR_GAE_USER_ID : "badGaeUserId"),
isAdmin)); isAdmin));
@ -94,12 +92,6 @@ public class AuthenticatedRegistrarAccessorTest {
LoggerConfig.getConfig(AuthenticatedRegistrarAccessor.class).removeHandler(testLogHandler); LoggerConfig.getConfig(AuthenticatedRegistrarAccessor.class).removeHandler(testLogHandler);
} }
private String formatMessage(String message, AuthResult authResult, String clientId) {
return message
.replace("{user}", authResult.userIdForLogging())
.replace("{clientId}", String.valueOf(clientId));
}
/** Users only have access to the registrars they are a contact for. */ /** Users only have access to the registrars they are a contact for. */
@Test @Test
public void getAllClientIdWithAccess_authorizedUser() { public void getAllClientIdWithAccess_authorizedUser() {
@ -114,7 +106,7 @@ public class AuthenticatedRegistrarAccessorTest {
/** Users in support group have admin access to everything. */ /** Users in support group have admin access to everything. */
@Test @Test
public void getAllClientIdWithAccess_authorizedUser_isSupportGroup() { public void getAllClientIdWithAccess_authorizedUser_isSupportGroup() {
when(groupsConnection.isMemberOfGroup("good_user@gmail.com", SUPPORT_GROUP)).thenReturn(true); when(groupsConnection.isMemberOfGroup("auth_user@gmail.com", SUPPORT_GROUP)).thenReturn(true);
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
AUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); AUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
@ -149,7 +141,7 @@ public class AuthenticatedRegistrarAccessorTest {
/** Unauthorized users who are in support group have admin access. */ /** Unauthorized users who are in support group have admin access. */
@Test @Test
public void getAllClientIdWithAccess_unauthorizedUser_inSupportGroup() { public void getAllClientIdWithAccess_unauthorizedUser_inSupportGroup() {
when(groupsConnection.isMemberOfGroup("evil_user@gmail.com", SUPPORT_GROUP)).thenReturn(true); when(groupsConnection.isMemberOfGroup("unauth_user@gmail.com", SUPPORT_GROUP)).thenReturn(true);
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
UNAUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); UNAUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
@ -179,7 +171,7 @@ public class AuthenticatedRegistrarAccessorTest {
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
AUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); AUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
verify(groupsConnection).isMemberOfGroup("good_user@gmail.com", SUPPORT_GROUP); verify(groupsConnection).isMemberOfGroup("auth_user@gmail.com", SUPPORT_GROUP);
assertThat(registrarAccessor.getAllClientIdWithRoles()) assertThat(registrarAccessor.getAllClientIdWithRoles())
.containsExactly(DEFAULT_CLIENT_ID, OWNER); .containsExactly(DEFAULT_CLIENT_ID, OWNER);
} }
@ -223,34 +215,39 @@ public class AuthenticatedRegistrarAccessorTest {
expectGetRegistrarFailure( expectGetRegistrarFailure(
DEFAULT_CLIENT_ID, DEFAULT_CLIENT_ID,
UNAUTHORIZED_USER, UNAUTHORIZED_USER,
"{user} doesn't have access to registrar {clientId}"); "user unauth_user@gmail.com doesn't have access to registrar TheRegistrar");
} }
/** Fail loading registrar if there's no user associated with the request. */ /** Fail loading registrar if there's no user associated with the request. */
@Test @Test
public void testGetRegistrarForUser_noUser() { public void testGetRegistrarForUser_noUser() {
expectGetRegistrarFailure(DEFAULT_CLIENT_ID, NO_USER, "Not logged in"); expectGetRegistrarFailure(
DEFAULT_CLIENT_ID,
NO_USER,
"<logged-out user> doesn't have access to registrar TheRegistrar");
} }
/** Succeed loading registrar if user has access to it. */ /** Succeed loading registrar if user has access to it. */
@Test @Test
public void testGetRegistrarForUser_hasAccess_isNotAdmin() { public void testGetRegistrarForUser_hasAccess_isNotAdmin() throws Exception {
expectGetRegistrarSuccess( expectGetRegistrarSuccess(
AUTHORIZED_USER, "{user} has [OWNER] access to registrar {clientId}"); AUTHORIZED_USER, "user auth_user@gmail.com has [OWNER] access to registrar TheRegistrar");
} }
/** Succeed loading registrar if admin with access. */ /** Succeed loading registrar if admin with access. */
@Test @Test
public void testGetRegistrarForUser_hasAccess_isAdmin() { public void testGetRegistrarForUser_hasAccess_isAdmin() throws Exception {
expectGetRegistrarSuccess( expectGetRegistrarSuccess(
AUTHORIZED_ADMIN, "{user} has [OWNER, ADMIN] access to registrar {clientId}"); AUTHORIZED_ADMIN,
"admin auth_admin@gmail.com has [OWNER, ADMIN] access to registrar TheRegistrar");
} }
/** Succeed loading registrar for admin even if they aren't on the approved contacts list. */ /** Succeed loading registrar for admin even if they aren't on the approved contacts list. */
@Test @Test
public void testGetRegistrarForUser_noAccess_isAdmin() { public void testGetRegistrarForUser_noAccess_isAdmin() throws Exception {
expectGetRegistrarSuccess( expectGetRegistrarSuccess(
UNAUTHORIZED_ADMIN, "{user} has [ADMIN] access to registrar {clientId}."); UNAUTHORIZED_ADMIN,
"admin unauth_admin@gmail.com has [ADMIN] access to registrar TheRegistrar.");
} }
/** Fail loading registrar even if admin, if registrar doesn't exist. */ /** Fail loading registrar even if admin, if registrar doesn't exist. */
@ -259,20 +256,17 @@ public class AuthenticatedRegistrarAccessorTest {
expectGetRegistrarFailure( expectGetRegistrarFailure(
"BadClientId", "BadClientId",
AUTHORIZED_ADMIN, AUTHORIZED_ADMIN,
"{user} doesn't have access to registrar {clientId}"); "admin auth_admin@gmail.com doesn't have access to registrar BadClientId");
} }
private void expectGetRegistrarSuccess( private void expectGetRegistrarSuccess(AuthResult authResult, String message) throws Exception {
AuthResult authResult, String message) {
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
authResult, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); authResult, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
// make sure loading the registrar succeeds and returns a value
assertThat(registrarAccessor.getRegistrar(DEFAULT_CLIENT_ID)).isNotNull(); assertThat(registrarAccessor.getRegistrar(DEFAULT_CLIENT_ID)).isNotNull();
assertAboutLogs() assertAboutLogs().that(testLogHandler).hasLogAtLevelWithMessage(Level.INFO, message);
.that(testLogHandler)
.hasLogAtLevelWithMessage(
Level.INFO, formatMessage(message, authResult, DEFAULT_CLIENT_ID));
} }
private void expectGetRegistrarFailure( private void expectGetRegistrarFailure(
@ -281,16 +275,17 @@ public class AuthenticatedRegistrarAccessorTest {
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
authResult, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); authResult, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
ForbiddenException exception = // make sure getRegistrar fails
RegistrarAccessDeniedException exception =
assertThrows( assertThrows(
ForbiddenException.class, () -> registrarAccessor.getRegistrar(clientId)); RegistrarAccessDeniedException.class, () -> registrarAccessor.getRegistrar(clientId));
assertThat(exception).hasMessageThat().contains(formatMessage(message, authResult, clientId)); assertThat(exception).hasMessageThat().contains(message);
} }
/** If a user has access to a registrar, we should guess that registrar. */ /** If a user has access to a registrar, we should guess that registrar. */
@Test @Test
public void testGuessClientIdForUser_hasAccess_isNotAdmin() { public void testGuessClientIdForUser_hasAccess_isNotAdmin() throws Exception {
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
AUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); AUTHORIZED_USER, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
@ -301,7 +296,8 @@ public class AuthenticatedRegistrarAccessorTest {
/** If a user doesn't have access to any registrars, guess returns nothing. */ /** If a user doesn't have access to any registrars, guess returns nothing. */
@Test @Test
public void testGuessClientIdForUser_noAccess_isNotAdmin() { public void testGuessClientIdForUser_noAccess_isNotAdmin() {
expectGuessRegistrarFailure(UNAUTHORIZED_USER, "{user} isn't associated with any registrar"); expectGuessRegistrarFailure(
UNAUTHORIZED_USER, "user unauth_user@gmail.com isn't associated with any registrar");
} }
/** /**
@ -309,7 +305,7 @@ public class AuthenticatedRegistrarAccessorTest {
* ADMIN_CLIENT_ID). * ADMIN_CLIENT_ID).
*/ */
@Test @Test
public void testGuessClientIdForUser_hasAccess_isAdmin() { public void testGuessClientIdForUser_hasAccess_isAdmin() throws Exception {
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
AUTHORIZED_ADMIN, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); AUTHORIZED_ADMIN, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
@ -319,7 +315,7 @@ public class AuthenticatedRegistrarAccessorTest {
/** If an admin doesn't have access to a registrar, we should guess the ADMIN_CLIENT_ID. */ /** If an admin doesn't have access to a registrar, we should guess the ADMIN_CLIENT_ID. */
@Test @Test
public void testGuessClientIdForUser_noAccess_isAdmin() { public void testGuessClientIdForUser_noAccess_isAdmin() throws Exception {
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
UNAUTHORIZED_ADMIN, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); UNAUTHORIZED_ADMIN, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
@ -333,7 +329,7 @@ public class AuthenticatedRegistrarAccessorTest {
* registrars. * registrars.
*/ */
@Test @Test
public void testGuessClientIdForUser_noAccess_isAdmin_adminClientIdEmpty() { public void testGuessClientIdForUser_noAccess_isAdmin_adminClientIdEmpty() throws Exception {
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor(UNAUTHORIZED_ADMIN, "", SUPPORT_GROUP, groupsConnection); new AuthenticatedRegistrarAccessor(UNAUTHORIZED_ADMIN, "", SUPPORT_GROUP, groupsConnection);
@ -345,7 +341,7 @@ public class AuthenticatedRegistrarAccessorTest {
* non-existent registrar, we still guess it (we will later fail loading the registrar). * non-existent registrar, we still guess it (we will later fail loading the registrar).
*/ */
@Test @Test
public void testGuessClientIdForUser_noAccess_isAdmin_adminClientIdInvalid() { public void testGuessClientIdForUser_noAccess_isAdmin_adminClientIdInvalid() throws Exception {
AuthenticatedRegistrarAccessor registrarAccessor = AuthenticatedRegistrarAccessor registrarAccessor =
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
UNAUTHORIZED_ADMIN, "NonexistentRegistrar", SUPPORT_GROUP, groupsConnection); UNAUTHORIZED_ADMIN, "NonexistentRegistrar", SUPPORT_GROUP, groupsConnection);
@ -358,11 +354,9 @@ public class AuthenticatedRegistrarAccessorTest {
new AuthenticatedRegistrarAccessor( new AuthenticatedRegistrarAccessor(
authResult, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection); authResult, ADMIN_CLIENT_ID, SUPPORT_GROUP, groupsConnection);
ForbiddenException exception = RegistrarAccessDeniedException exception =
assertThrows(ForbiddenException.class, () -> registrarAccessor.guessClientId()); assertThrows(RegistrarAccessDeniedException.class, () -> registrarAccessor.guessClientId());
assertThat(exception) assertThat(exception).hasMessageThat().contains(message);
.hasMessageThat()
.contains(formatMessage(message, authResult, null));
} }
@Test @Test

View file

@ -12,6 +12,7 @@ java_library(
srcs = glob(["*.java"]), srcs = glob(["*.java"]),
resources = glob(["testdata/*"]), resources = glob(["testdata/*"]),
deps = [ deps = [
"//java/google/registry/groups",
"//java/google/registry/request/auth", "//java/google/registry/request/auth",
"//java/google/registry/security", "//java/google/registry/security",
"//javatests/google/registry/testing", "//javatests/google/registry/testing",
@ -19,7 +20,10 @@ java_library(
"@com_google_appengine_api_1_0_sdk", "@com_google_appengine_api_1_0_sdk",
"@com_google_appengine_tools_appengine_gcs_client", "@com_google_appengine_tools_appengine_gcs_client",
"@com_google_appengine_tools_sdk", "@com_google_appengine_tools_sdk",
"@com_google_flogger",
"@com_google_flogger_system_backend",
"@com_google_guava", "@com_google_guava",
"@com_google_guava_testlib",
"@com_google_truth", "@com_google_truth",
"@com_google_truth_extensions_truth_java8_extension", "@com_google_truth_extensions_truth_java8_extension",
"@javax_servlet_api", "@javax_servlet_api",

View file

@ -14,6 +14,7 @@ java_library(
"//java/google/registry/ui/forms", "//java/google/registry/ui/forms",
"//java/google/registry/ui/server", "//java/google/registry/ui/server",
"//javatests/google/registry/testing", "//javatests/google/registry/testing",
"@com_google_guava",
"@com_google_truth", "@com_google_truth",
"@com_google_truth_extensions_truth_java8_extension", "@com_google_truth_extensions_truth_java8_extension",
"@junit", "@junit",

View file

@ -17,9 +17,8 @@ package google.registry.ui.server.registrar;
import static com.google.common.net.HttpHeaders.LOCATION; import static com.google.common.net.HttpHeaders.LOCATION;
import static com.google.common.truth.Truth.assertThat; import static com.google.common.truth.Truth.assertThat;
import static com.google.monitoring.metrics.contrib.LongMetricSubject.assertThat; import static com.google.monitoring.metrics.contrib.LongMetricSubject.assertThat;
import static google.registry.testing.DatastoreHelper.loadRegistrar; import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.ADMIN;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.ADMIN; import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.OWNER;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.OWNER;
import static javax.servlet.http.HttpServletResponse.SC_MOVED_TEMPORARILY; import static javax.servlet.http.HttpServletResponse.SC_MOVED_TEMPORARILY;
import static org.mockito.Mockito.mock; import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when; import static org.mockito.Mockito.when;
@ -28,9 +27,9 @@ import com.google.appengine.api.users.User;
import com.google.appengine.api.users.UserServiceFactory; import com.google.appengine.api.users.UserServiceFactory;
import com.google.common.collect.ImmutableSetMultimap; import com.google.common.collect.ImmutableSetMultimap;
import com.google.common.net.MediaType; import com.google.common.net.MediaType;
import google.registry.request.HttpException.ForbiddenException;
import google.registry.request.auth.AuthLevel; import google.registry.request.auth.AuthLevel;
import google.registry.request.auth.AuthResult; import google.registry.request.auth.AuthResult;
import google.registry.request.auth.AuthenticatedRegistrarAccessor;
import google.registry.request.auth.UserAuthInfo; import google.registry.request.auth.UserAuthInfo;
import google.registry.security.XsrfTokenManager; import google.registry.security.XsrfTokenManager;
import google.registry.testing.AppEngineRule; import google.registry.testing.AppEngineRule;
@ -56,8 +55,6 @@ public class ConsoleUiActionTest {
.withUserService(UserInfo.create("marla.singer@example.com", "12345")) .withUserService(UserInfo.create("marla.singer@example.com", "12345"))
.build(); .build();
private final AuthenticatedRegistrarAccessor registrarAccessor =
mock(AuthenticatedRegistrarAccessor.class);
private final HttpServletRequest request = mock(HttpServletRequest.class); private final HttpServletRequest request = mock(HttpServletRequest.class);
private final FakeResponse response = new FakeResponse(); private final FakeResponse response = new FakeResponse();
private final ConsoleUiAction action = new ConsoleUiAction(); private final ConsoleUiAction action = new ConsoleUiAction();
@ -76,24 +73,19 @@ public class ConsoleUiActionTest {
action.req = request; action.req = request;
action.response = response; action.response = response;
action.registrarConsoleMetrics = new RegistrarConsoleMetrics(); action.registrarConsoleMetrics = new RegistrarConsoleMetrics();
action.registrarAccessor = registrarAccessor;
action.userService = UserServiceFactory.getUserService(); action.userService = UserServiceFactory.getUserService();
action.xsrfTokenManager = new XsrfTokenManager(new FakeClock(), action.userService); action.xsrfTokenManager = new XsrfTokenManager(new FakeClock(), action.userService);
action.paramClientId = Optional.empty(); action.paramClientId = Optional.empty();
AuthResult authResult = AuthResult.create(AuthLevel.USER, UserAuthInfo.create(user, false)); AuthResult authResult = AuthResult.create(AuthLevel.USER, UserAuthInfo.create(user, false));
action.authResult = authResult; action.authResult = authResult;
when(registrarAccessor.getRegistrar("TheRegistrar"))
.thenReturn(loadRegistrar("TheRegistrar")); action.registrarAccessor =
when(registrarAccessor.getAllClientIdWithRoles()) AuthenticatedRegistrarAccessor.createForTesting(
.thenReturn(
ImmutableSetMultimap.of( ImmutableSetMultimap.of(
"TheRegistrar", OWNER, "TheRegistrar", OWNER,
"OtherRegistrar", OWNER, "NewRegistrar", OWNER,
"OtherRegistrar", ADMIN, "NewRegistrar", ADMIN,
"AdminRegistrar", ADMIN)); "AdminRegistrar", ADMIN));
when(registrarAccessor.guessClientId()).thenCallRealMethod();
// Used for error message in guessClientId
registrarAccessor.authResult = authResult;
RegistrarConsoleMetrics.consoleRequestMetric.reset(); RegistrarConsoleMetrics.consoleRequestMetric.reset();
} }
@ -146,7 +138,8 @@ public class ConsoleUiActionTest {
@Test @Test
public void testUserDoesntHaveAccessToAnyRegistrar_showsWhoAreYouPage() { public void testUserDoesntHaveAccessToAnyRegistrar_showsWhoAreYouPage() {
when(registrarAccessor.getAllClientIdWithRoles()).thenReturn(ImmutableSetMultimap.of()); action.registrarAccessor =
AuthenticatedRegistrarAccessor.createForTesting(ImmutableSetMultimap.of());
action.run(); action.run();
assertThat(response.getPayload()).contains("<h1>You need permission</h1>"); assertThat(response.getPayload()).contains("<h1>You need permission</h1>");
assertThat(response.getPayload()).contains("not associated with Nomulus."); assertThat(response.getPayload()).contains("not associated with Nomulus.");
@ -175,8 +168,6 @@ public class ConsoleUiActionTest {
public void testSettingClientId_notAllowed_showsNeedPermissionPage() { public void testSettingClientId_notAllowed_showsNeedPermissionPage() {
// Behaves the same way if fakeRegistrar exists, but we don't have access to it // Behaves the same way if fakeRegistrar exists, but we don't have access to it
action.paramClientId = Optional.of("fakeRegistrar"); action.paramClientId = Optional.of("fakeRegistrar");
when(registrarAccessor.getRegistrar("fakeRegistrar"))
.thenThrow(new ForbiddenException("forbidden"));
action.run(); action.run();
assertThat(response.getPayload()).contains("<h1>You need permission</h1>"); assertThat(response.getPayload()).contains("<h1>You need permission</h1>");
assertThat(response.getPayload()).contains("not associated with the registrar fakeRegistrar."); assertThat(response.getPayload()).contains("not associated with the registrar fakeRegistrar.");
@ -185,20 +176,18 @@ public class ConsoleUiActionTest {
@Test @Test
public void testSettingClientId_allowed_showsRegistrarConsole() { public void testSettingClientId_allowed_showsRegistrarConsole() {
action.paramClientId = Optional.of("OtherRegistrar"); action.paramClientId = Optional.of("NewRegistrar");
when(registrarAccessor.getRegistrar("OtherRegistrar"))
.thenReturn(loadRegistrar("TheRegistrar"));
action.run(); action.run();
assertThat(response.getPayload()).contains("Registrar Console"); assertThat(response.getPayload()).contains("Registrar Console");
assertThat(response.getPayload()).contains("reg-content-and-footer"); assertThat(response.getPayload()).contains("reg-content-and-footer");
assertMetric("OtherRegistrar", "true", "[OWNER, ADMIN]", "SUCCESS"); assertMetric("NewRegistrar", "true", "[OWNER, ADMIN]", "SUCCESS");
} }
@Test @Test
public void testUserHasAccessAsTheRegistrar_showsClientIdChooser() { public void testUserHasAccessAsTheRegistrar_showsClientIdChooser() {
action.run(); action.run();
assertThat(response.getPayload()).contains("<option value=\"TheRegistrar\" selected>"); assertThat(response.getPayload()).contains("<option value=\"TheRegistrar\" selected>");
assertThat(response.getPayload()).contains("<option value=\"OtherRegistrar\">"); assertThat(response.getPayload()).contains("<option value=\"NewRegistrar\">");
assertThat(response.getPayload()).contains("<option value=\"AdminRegistrar\">"); assertThat(response.getPayload()).contains("<option value=\"AdminRegistrar\">");
assertMetric("TheRegistrar", "false", "[OWNER]", "SUCCESS"); assertMetric("TheRegistrar", "false", "[OWNER]", "SUCCESS");
} }

View file

@ -86,10 +86,11 @@ public class RegistrarSettingsActionTest extends RegistrarSettingsActionTestCase
public void testFailure_readRegistrarInfo_notAuthorized() { public void testFailure_readRegistrarInfo_notAuthorized() {
setUserWithoutAccess(); setUserWithoutAccess();
Map<String, Object> response = action.handleJsonRequest(ImmutableMap.of("id", CLIENT_ID)); Map<String, Object> response = action.handleJsonRequest(ImmutableMap.of("id", CLIENT_ID));
assertThat(response).containsExactly( assertThat(response)
.containsExactly(
"status", "ERROR", "status", "ERROR",
"results", ImmutableList.of(), "results", ImmutableList.of(),
"message", "forbidden test error"); "message", "TestUserId doesn't have access to registrar TheRegistrar");
assertNoTasksEnqueued("sheet"); assertNoTasksEnqueued("sheet");
assertMetric(CLIENT_ID, "read", "[]", "ERROR: ForbiddenException"); assertMetric(CLIENT_ID, "read", "[]", "ERROR: ForbiddenException");
} }
@ -160,10 +161,11 @@ public class RegistrarSettingsActionTest extends RegistrarSettingsActionTestCase
"op", "update", "op", "update",
"id", CLIENT_ID, "id", CLIENT_ID,
"args", ImmutableMap.of("lastUpdateTime", getLastUpdateTime()))); "args", ImmutableMap.of("lastUpdateTime", getLastUpdateTime())));
assertThat(response).containsExactly( assertThat(response)
.containsExactly(
"status", "ERROR", "status", "ERROR",
"results", ImmutableList.of(), "results", ImmutableList.of(),
"message", "forbidden test error"); "message", "TestUserId doesn't have access to registrar TheRegistrar");
assertNoTasksEnqueued("sheet"); assertNoTasksEnqueued("sheet");
assertMetric(CLIENT_ID, "update", "[]", "ERROR: ForbiddenException"); assertMetric(CLIENT_ID, "update", "[]", "ERROR: ForbiddenException");
} }

View file

@ -17,13 +17,11 @@ package google.registry.ui.server.registrar;
import static com.google.monitoring.metrics.contrib.LongMetricSubject.assertThat; import static com.google.monitoring.metrics.contrib.LongMetricSubject.assertThat;
import static google.registry.config.RegistryConfig.getGSuiteOutgoingEmailAddress; import static google.registry.config.RegistryConfig.getGSuiteOutgoingEmailAddress;
import static google.registry.config.RegistryConfig.getGSuiteOutgoingEmailDisplayName; import static google.registry.config.RegistryConfig.getGSuiteOutgoingEmailDisplayName;
import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.ADMIN;
import static google.registry.request.auth.AuthenticatedRegistrarAccessor.Role.OWNER;
import static google.registry.security.JsonHttpTestUtils.createJsonPayload; import static google.registry.security.JsonHttpTestUtils.createJsonPayload;
import static google.registry.testing.DatastoreHelper.createTlds; import static google.registry.testing.DatastoreHelper.createTlds;
import static google.registry.testing.DatastoreHelper.disallowRegistrarAccess; import static google.registry.testing.DatastoreHelper.disallowRegistrarAccess;
import static google.registry.testing.DatastoreHelper.loadRegistrar;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.ADMIN;
import static google.registry.ui.server.registrar.AuthenticatedRegistrarAccessor.Role.OWNER;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when; import static org.mockito.Mockito.when;
import com.google.appengine.api.users.User; import com.google.appengine.api.users.User;
@ -32,12 +30,12 @@ import com.google.common.collect.ImmutableMap;
import com.google.common.collect.ImmutableSetMultimap; import com.google.common.collect.ImmutableSetMultimap;
import google.registry.config.RegistryEnvironment; import google.registry.config.RegistryEnvironment;
import google.registry.model.ofy.Ofy; import google.registry.model.ofy.Ofy;
import google.registry.request.HttpException.ForbiddenException;
import google.registry.request.JsonActionRunner; import google.registry.request.JsonActionRunner;
import google.registry.request.JsonResponse; import google.registry.request.JsonResponse;
import google.registry.request.ResponseImpl; import google.registry.request.ResponseImpl;
import google.registry.request.auth.AuthLevel; import google.registry.request.auth.AuthLevel;
import google.registry.request.auth.AuthResult; import google.registry.request.auth.AuthResult;
import google.registry.request.auth.AuthenticatedRegistrarAccessor;
import google.registry.request.auth.UserAuthInfo; import google.registry.request.auth.UserAuthInfo;
import google.registry.testing.AppEngineRule; import google.registry.testing.AppEngineRule;
import google.registry.testing.FakeClock; import google.registry.testing.FakeClock;
@ -134,34 +132,25 @@ public class RegistrarSettingsActionTestCase {
RegistrarConsoleMetrics.settingsRequestMetric.reset(clientId, op, roles, status); RegistrarConsoleMetrics.settingsRequestMetric.reset(clientId, op, roles, status);
} }
/** Sets registrarAccessor.getRegistrar to succeed for all AccessTypes. */ /** Sets registrarAccessor.getRegistrar to succeed for CLIENT_ID only. */
protected void setUserWithAccess() { protected void setUserWithAccess() {
action.registrarAccessor = mock(AuthenticatedRegistrarAccessor.class); action.registrarAccessor =
AuthenticatedRegistrarAccessor.createForTesting(
when(action.registrarAccessor.getAllClientIdWithRoles()) ImmutableSetMultimap.of(CLIENT_ID, OWNER));
.thenReturn(ImmutableSetMultimap.of(CLIENT_ID, OWNER));
when(action.registrarAccessor.getRegistrar(CLIENT_ID))
.thenAnswer(x -> loadRegistrar(CLIENT_ID));
} }
/** Sets registrarAccessor.getRegistrar to always fail. */ /** Sets registrarAccessor.getRegistrar to always fail. */
protected void setUserWithoutAccess() { protected void setUserWithoutAccess() {
action.registrarAccessor = mock(AuthenticatedRegistrarAccessor.class); action.registrarAccessor =
AuthenticatedRegistrarAccessor.createForTesting(ImmutableSetMultimap.of());
when(action.registrarAccessor.getAllClientIdWithRoles()).thenReturn(ImmutableSetMultimap.of());
when(action.registrarAccessor.getRegistrar(CLIENT_ID))
.thenThrow(new ForbiddenException("forbidden test error"));
} }
/** /**
* Sets registrarAccessor.getAllClientIdWithRoles to return a map with admin role for CLIENT_ID * Sets registrarAccessor.getAllClientIdWithRoles to return a map with admin role for CLIENT_ID
*/ */
protected void setUserAdmin() { protected void setUserAdmin() {
action.registrarAccessor = mock(AuthenticatedRegistrarAccessor.class); action.registrarAccessor =
AuthenticatedRegistrarAccessor.createForTesting(
when(action.registrarAccessor.getAllClientIdWithRoles()) ImmutableSetMultimap.of(CLIENT_ID, ADMIN));
.thenReturn(ImmutableSetMultimap.of(CLIENT_ID, ADMIN));
when(action.registrarAccessor.getRegistrar(CLIENT_ID))
.thenAnswer(x -> loadRegistrar(CLIENT_ID));
} }
} }