refactor/Username is not unique in OBP -- changed all Lock endpoints

This commit is contained in:
hongwei 2023-01-25 21:59:14 +01:00
parent f8c7f17ffe
commit fd11153302
2 changed files with 302 additions and 1 deletions

View File

@ -6,13 +6,15 @@ import code.api.util.APIUtil._
import code.api.util.ApiRole._
import code.api.util.ApiTag._
import code.api.util.ErrorMessages.{$UserNotLoggedIn, BankNotFound, ConsentNotFound, InvalidJsonFormat, UnknownError, UserNotFoundByUserId, UserNotLoggedIn, _}
import code.api.util.NewStyle
import code.api.util.{ApiRole, NewStyle}
import code.api.util.NewStyle.HttpCode
import code.api.v3_1_0.ConsentJsonV310
import code.api.v3_1_0.JSONFactory310.createBadLoginStatusJson
import code.api.v4_0_0.{JSONFactory400, PostApiCollectionJson400}
import code.consent.Consents
import code.loginattempts.LoginAttempt
import code.transactionrequests.TransactionRequests.TransactionRequestTypes.{apply => _}
import code.userlocks.UserLocksProvider
import code.users.Users
import code.util.Helper
import com.github.dwickern.macros.NameOf.nameOf
@ -209,6 +211,119 @@ trait APIMethods510 {
}
}
resourceDocs += ResourceDoc(
getBadLoginStatus,
implementedInApiVersion,
nameOf(getBadLoginStatus),
"GET",
"/users/PROVIDER/USERNAME/lock-status",
"Get User Lock Status",
s"""
|Get User Login Status.
|${authenticationRequiredMessage(true)}
|
|""".stripMargin,
EmptyBody,
badLoginStatusJson,
List(UserNotLoggedIn, UserNotFoundByProviderAndUsername, UserHasMissingRoles, UnknownError),
List(apiTagUser, apiTagNewStyle),
Some(List(canReadUserLockedStatus))
)
lazy val getBadLoginStatus: OBPEndpoint = {
//get private accounts for all banks
case "users" ::provider :: username :: "lock-status" :: Nil JsonGet req => {
cc =>
for {
(Full(u), callContext) <- SS.user
_ <- NewStyle.function.hasEntitlement("", u.userId, ApiRole.canReadUserLockedStatus, callContext)
badLoginStatus <- Future {
LoginAttempt.getBadLoginStatus(provider, username)
} map {
unboxFullOrFail(_, callContext, s"$UserNotFoundByProviderAndUsername provider($provider), username($username)", 404)
}
} yield {
(createBadLoginStatusJson(badLoginStatus), HttpCode.`200`(callContext))
}
}
}
resourceDocs += ResourceDoc(
unlockUser,
implementedInApiVersion,
nameOf(unlockUser),
"PUT",
"/users/PROVIDER/USERNAME/lock-status",
"UnLock the user",
s"""
|Unlock a User.
|
|(Perhaps the user was locked due to multiple failed login attempts)
|
|${authenticationRequiredMessage(true)}
|
|""".stripMargin,
EmptyBody,
badLoginStatusJson,
List(UserNotLoggedIn, UserNotFoundByProviderAndUsername, UserHasMissingRoles, UnknownError),
List(apiTagUser, apiTagNewStyle),
Some(List(canUnlockUser)))
lazy val unlockUser: OBPEndpoint = {
//get private accounts for all banks
case "users" :: provider :: username :: "lock-status" :: Nil JsonPut req => {
cc =>
for {
(Full(u), callContext) <- SS.user
_ <- NewStyle.function.hasEntitlement("", u.userId, ApiRole.canUnlockUser, callContext)
_ <- Future {
LoginAttempt.resetBadLoginAttempts(provider, username)
}
_ <- Future {
UserLocksProvider.unlockUser(provider, username)
}
badLoginStatus <- Future {
LoginAttempt.getBadLoginStatus(provider, username)
} map {
unboxFullOrFail(_, callContext, s"$UserNotFoundByProviderAndUsername provider($provider), username($username)", 404)
}
} yield {
(createBadLoginStatusJson(badLoginStatus), HttpCode.`200`(callContext))
}
}
}
staticResourceDocs += ResourceDoc(
lockUser,
implementedInApiVersion,
nameOf(lockUser),
"POST",
"/users/PROVIDER/USERNAME/locks",
"Lock the user",
s"""
|Lock a User.
|
|${authenticationRequiredMessage(true)}
|
|""".stripMargin,
EmptyBody,
userLockStatusJson,
List($UserNotLoggedIn, UserNotFoundByProviderAndUsername, UserHasMissingRoles, UnknownError),
List(apiTagUser, apiTagNewStyle),
Some(List(canLockUser)))
lazy val lockUser: OBPEndpoint = {
case "users" :: provider :: username :: "locks" :: Nil JsonPost req => {
cc =>
for {
(Full(u), callContext) <- SS.user
userLocks <- Future {
UserLocksProvider.lockUser(provider, username)
} map {
unboxFullOrFail(_, callContext, s"$UserNotFoundByProviderAndUsername provider($provider), username($username)", 404)
}
} yield {
(JSONFactory400.createUserLockStatusJson(userLocks), HttpCode.`200`(callContext))
}
}
}
}
}

View File

@ -0,0 +1,186 @@
package code.api.v5_1_0
import code.api.Constant.localIdentityProvider
import code.api.util.APIUtil.OAuth
import code.api.util.APIUtil.OAuth._
import code.api.util.ApiRole.{CanLockUser, CanReadUserLockedStatus, CanUnlockUser}
import code.api.util.ErrorMessages.{UserHasMissingRoles, UserNotFoundByProviderAndUsername, UserNotLoggedIn, UsernameHasBeenLocked}
import code.api.v3_0_0.UserJsonV300
import code.api.v3_1_0.BadLoginStatusJson
import code.api.v5_1_0.OBPAPI5_1_0.Implementations5_1_0
import code.entitlement.Entitlement
import code.loginattempts.LoginAttempt
import com.github.dwickern.macros.NameOf.nameOf
import com.openbankproject.commons.model.ErrorMessage
import com.openbankproject.commons.util.ApiVersion
import org.scalatest.Tag
class LockUserTest extends V510ServerSetup {
/**
* Test tags
* Example: To run tests with tag "getPermissions":
* mvn test -D tagsToInclude
*
* This is made possible by the scalatest maven plugin
*/
object VersionOfApi extends Tag(ApiVersion.v5_1_0.toString)
object ApiEndpoint1 extends Tag(nameOf(Implementations5_1_0.lockUser))
object ApiEndpoint2 extends Tag(nameOf(Implementations5_1_0.getBadLoginStatus))
object ApiEndpoint3 extends Tag(nameOf(Implementations5_1_0.unlockUser))
feature(s"test $ApiEndpoint1,$ApiEndpoint2, $ApiEndpoint3, version $VersionOfApi - Unauthorized access") {
scenario(s"We will call the $ApiEndpoint1 without user credentials", ApiEndpoint1, VersionOfApi) {
When("We make a request v5.1.0")
val request = (v5_1_0_Request / "users"/"PROVIDER" / "USERNAME" / "locks").POST
val response = makePostRequest(request, "")
Then("We should get a 401")
response.code should equal(401)
response.body.extract[ErrorMessage].message should equal(UserNotLoggedIn)
}
scenario(s"We will call the $ApiEndpoint2 without user credentials", ApiEndpoint2, VersionOfApi) {
When("We make a request v5.1.0")
val request = (v5_1_0_Request / "users" / "PROVIDER" / "USERNAME" / "lock-status").GET
val response = makeGetRequest(request)
Then("We should get a 401")
response.code should equal(401)
response.body.extract[ErrorMessage].message should equal(UserNotLoggedIn)
}
scenario(s"We will call the $ApiEndpoint3 without user credentials", ApiEndpoint3, VersionOfApi) {
When("We make a request v5.1.0")
val request = (v5_1_0_Request / "users" / "PROVIDER" / "USERNAME" / "lock-status").PUT
val response = makePutRequest(request, "")
Then("We should get a 401")
response.code should equal(401)
response.body.extract[ErrorMessage].message should equal(UserNotLoggedIn)
}
}
feature(s"test $ApiEndpoint1,$ApiEndpoint2, $ApiEndpoint3, version $VersionOfApi - Missing roles") {
scenario(s"We will call the $ApiEndpoint1 without user credentials", ApiEndpoint1, VersionOfApi) {
When("We make a request v5.1.0")
val request = (v5_1_0_Request / "users" / "USERNAME" / "locks").POST <@(user1)
val response = makePostRequest(request, "")
Then("error should be " + UserHasMissingRoles + CanLockUser)
response.code should equal(403)
response.body.extract[ErrorMessage].message should be (UserHasMissingRoles + CanLockUser)
}
scenario(s"We will call the $ApiEndpoint2 without user credentials", ApiEndpoint2, VersionOfApi) {
When("We make a request v5.1.0")
val request = (v5_1_0_Request / "users" /"PROVIDER" / "USERNAME" / "lock-status").GET <@(user1)
val response = makeGetRequest(request)
Then("error should be " + UserHasMissingRoles + CanReadUserLockedStatus)
response.code should equal(403)
response.body.extract[ErrorMessage].message should be (UserHasMissingRoles + CanReadUserLockedStatus)
}
scenario(s"We will call the $ApiEndpoint3 without user credentials", ApiEndpoint3, VersionOfApi) {
When("We make a request v5.1.0")
val request = (v5_1_0_Request / "users" /"PROVIDER" / "USERNAME" / "lock-status").PUT <@(user1)
val response = makePutRequest(request, "")
Then("error should be " + UserHasMissingRoles + CanUnlockUser)
response.code should equal(403)
response.body.extract[ErrorMessage].message should be (UserHasMissingRoles + CanUnlockUser)
}
}
feature(s"test $ApiEndpoint1,$ApiEndpoint2, $ApiEndpoint3, version $VersionOfApi - Wrong username") {
scenario(s"We will call the $ApiEndpoint1 without user credentials", ApiEndpoint1, VersionOfApi) {
val username = "USERNAME"
Entitlement.entitlement.vend.addEntitlement("", resourceUser1.userId, CanLockUser.toString)
When("We make a request v5.1.0")
val request = (v5_1_0_Request /"users" / localIdentityProvider / username / "locks").POST <@(user1)
val response = makePostRequest(request, "")
Then("We should get a 404")
response.code should equal(404)
response.body.extract[ErrorMessage].message contains s"$UserNotFoundByProviderAndUsername" shouldBe(true)
}
scenario(s"We will call the $ApiEndpoint2 without user credentials", ApiEndpoint2, VersionOfApi) {
val username = "USERNAME"
Entitlement.entitlement.vend.addEntitlement("", resourceUser1.userId, CanReadUserLockedStatus.toString)
When("We make a request v5.1.0")
val request = (v5_1_0_Request /"users" / localIdentityProvider / username / "lock-status").GET <@(user1)
val response = makeGetRequest(request)
Then("We should get a 404")
response.code should equal(404)
response.body.extract[ErrorMessage].message contains s"$UserNotFoundByProviderAndUsername" shouldBe(true)
}
scenario(s"We will call the $ApiEndpoint3 without user credentials", ApiEndpoint3, VersionOfApi) {
val username = "USERNAME"
Entitlement.entitlement.vend.addEntitlement("", resourceUser1.userId, CanUnlockUser.toString)
When("We make a request v5.1.0")
val request = (v5_1_0_Request /"users" / localIdentityProvider / username / "lock-status").PUT <@(user1)
val response = makePutRequest(request, "")
Then("We should get a 404")
response.code should equal(404)
response.body.extract[ErrorMessage].message contains s"$UserNotFoundByProviderAndUsername" shouldBe(true)
}
}
feature(s"test $ApiEndpoint1,$ApiEndpoint2, $ApiEndpoint3, version $VersionOfApi - Proper values") {
val resource2Username = resourceUser2.name
val resource2Provider = resourceUser2.provider
scenario(s"We will call the $ApiEndpoint1 without user credentials", ApiEndpoint1, VersionOfApi) {
Entitlement.entitlement.vend.addEntitlement("", resourceUser1.userId, CanLockUser.toString)
When("We make a request v5.1.0")
val request = (v5_1_0_Request /"users" / resource2Provider / resource2Username / "locks").POST <@(user1)
val response = makePostRequest(request, "")
Then("We should get a 200")
response.code should equal(200)
{
Then("We try endpoint with user2")
val request = (v5_1_0_Request / "users" / "current").GET <@ (user2)
val response = makeGetRequest(request)
Then("We should get a 401")
response.body.extract[ErrorMessage].message contains s"$UsernameHasBeenLocked" shouldBe (true)
response.code should equal (401)
response
}
}
scenario(s"we fake failed login 10 times, cause lock the user, and check login status and unlock it ", ApiEndpoint1, ApiEndpoint2, ApiEndpoint3, VersionOfApi) {
Entitlement.entitlement.vend.addEntitlement("", resourceUser1.userId, CanReadUserLockedStatus.toString)
Entitlement.entitlement.vend.addEntitlement("", resourceUser1.userId, CanUnlockUser.toString)
Entitlement.entitlement.vend.addEntitlement("", resourceUser1.userId, CanLockUser.toString)
// Lock the user in order to test functionality
for (i <- 1 to 10) LoginAttempt.incrementBadLoginAttempts(resource2Provider, resource2Username)
When("We make a request v5.1.0")
val request = (v5_1_0_Request / "users" / "current").GET <@ (user2)
val response = makeGetRequest(request)
Then("We should get a 401")
response.code should equal(401)
response.body.extract[ErrorMessage].message contains s"$UsernameHasBeenLocked" shouldBe(true)
{
Then("We make check the lock status")
val request = (v5_1_0_Request / "users" / resource2Provider / resource2Username / "lock-status").GET <@ (user1)
val response = makeGetRequest(request)
Then("We should get a 200")
response.code should equal(200)
response.body.extract[BadLoginStatusJson].bad_attempts_since_last_success_or_reset shouldBe (10)
}
{
Then("We unlock the user")
val request = (v5_1_0_Request / "users" / resource2Provider / resource2Username / "lock-status").PUT <@ (user1)
val response = makePutRequest(request, "")
Then("We should get a 200")
response.code should equal(200)
}
{
Then("We try endpoint with user2")
val request = (v5_1_0_Request / "users" / "current").GET <@ (user2)
val response = makeGetRequest(request)
Then("We should get a 200")
response.code should equal(200)
response.body.extract[UserJsonV300].username shouldBe(resource2Username)
}
}
}
}