Pull request 2383: AGDNS-2743-aghuser
Merge in DNS/adguard-home from AGDNS-2743-aghuser to master
Squashed commit of the following:
commit e3920df62be1625a3cfcc314a4aab3d1a378ca53
Merge: 70ce647f4 106785aab
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Mon Apr 7 19:44:15 2025 +0300
Merge branch 'master' into AGDNS-2743-aghuser
commit 70ce647f47921f2bb34a561d63de2041f31e6bce
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Fri Apr 4 18:17:09 2025 +0300
aghuser: imp docs
commit 87f6984248189de4a3dc0f2a245775141ea974d0
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Wed Apr 2 19:03:03 2025 +0300
aghuser: imp code
commit 636ecae85d1fce1657b5699a29451a9079d40222
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Tue Apr 1 17:30:54 2025 +0300
all: add tests
commit 5c842e94111123cf988332ccd1eb6754fa45585d
Author: Stanislav Chzhen <s.chzhen@adguard.com>
Date: Thu Mar 27 21:44:25 2025 +0300
all: aghuser
This commit is contained in:
58
internal/aghuser/aghuser.go
Normal file
58
internal/aghuser/aghuser.go
Normal file
@@ -0,0 +1,58 @@
|
|||||||
|
package aghuser
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
|
||||||
|
"github.com/AdguardTeam/golibs/errors"
|
||||||
|
"golang.org/x/crypto/bcrypt"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Login is the type for web user logins.
|
||||||
|
type Login string
|
||||||
|
|
||||||
|
// NewLogin returns a web user login.
|
||||||
|
//
|
||||||
|
// TODO(s.chzhen): Add more constraints as needed.
|
||||||
|
func NewLogin(s string) (l Login, err error) {
|
||||||
|
if s == "" {
|
||||||
|
return "", errors.ErrEmptyValue
|
||||||
|
}
|
||||||
|
|
||||||
|
return Login(s), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Password is an interface that defines methods for handling web user
|
||||||
|
// passwords.
|
||||||
|
type Password interface {
|
||||||
|
// Authenticate returns true if the provided password is allowed.
|
||||||
|
Authenticate(ctx context.Context, password string) (ok bool)
|
||||||
|
|
||||||
|
// Hash returns a hashed representation of the web user password.
|
||||||
|
Hash() (b []byte)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DefaultPassword is the default bcrypt implementation of the [Password]
|
||||||
|
// interface.
|
||||||
|
type DefaultPassword struct {
|
||||||
|
hash []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDefaultPassword returns the new properly initialized *DefaultPassword.
|
||||||
|
func NewDefaultPassword(hash string) (p *DefaultPassword) {
|
||||||
|
return &DefaultPassword{
|
||||||
|
hash: []byte(hash),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// type check
|
||||||
|
var _ Password = (*DefaultPassword)(nil)
|
||||||
|
|
||||||
|
// Authenticate implements the [Password] interface for *DefaultPassword.
|
||||||
|
func (p *DefaultPassword) Authenticate(ctx context.Context, passwd string) (ok bool) {
|
||||||
|
return bcrypt.CompareHashAndPassword([]byte(p.hash), []byte(passwd)) == nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Hash implements the [Password] interface for *DefaultPassword.
|
||||||
|
func (p *DefaultPassword) Hash() (b []byte) {
|
||||||
|
return p.hash
|
||||||
|
}
|
||||||
6
internal/aghuser/aghuser_test.go
Normal file
6
internal/aghuser/aghuser_test.go
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
package aghuser_test
|
||||||
|
|
||||||
|
import "time"
|
||||||
|
|
||||||
|
// testTimeout is the common timeout for tests.
|
||||||
|
const testTimeout = 1 * time.Second
|
||||||
149
internal/aghuser/db.go
Normal file
149
internal/aghuser/db.go
Normal file
@@ -0,0 +1,149 @@
|
|||||||
|
package aghuser
|
||||||
|
|
||||||
|
import (
|
||||||
|
"cmp"
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"maps"
|
||||||
|
"slices"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"github.com/AdguardTeam/golibs/errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DB is an interface that defines methods for interacting with user
|
||||||
|
// information. All methods must be safe for concurrent use.
|
||||||
|
//
|
||||||
|
// TODO(s.chzhen): Use this.
|
||||||
|
//
|
||||||
|
// TODO(s.chzhen): Consider updating methods to return a clone.
|
||||||
|
type DB interface {
|
||||||
|
// All retrieves all users from the database, sorted by login.
|
||||||
|
//
|
||||||
|
// TODO(s.chzhen): Consider function signature change to reflect the
|
||||||
|
// in-memory implementation, as it currently always returns nil for error.
|
||||||
|
All(ctx context.Context) (users []*User, err error)
|
||||||
|
|
||||||
|
// ByLogin retrieves a user by their login. u must not be modified.
|
||||||
|
//
|
||||||
|
// TODO(s.chzhen): Remove this once user sessions support [UserID].
|
||||||
|
ByLogin(ctx context.Context, login Login) (u *User, err error)
|
||||||
|
|
||||||
|
// ByUUID retrieves a user by their unique identifier. u must not be
|
||||||
|
// modified.
|
||||||
|
//
|
||||||
|
// TODO(s.chzhen): Use this.
|
||||||
|
ByUUID(ctx context.Context, id UserID) (u *User, err error)
|
||||||
|
|
||||||
|
// Create adds a new user to the database. If the credentials already
|
||||||
|
// exist, it returns the [errors.ErrDuplicated] error. It also can return
|
||||||
|
// an error from the cryptographic randomness reader. u must not be
|
||||||
|
// modified.
|
||||||
|
Create(ctx context.Context, u *User) (err error)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DefaultDB is the default in-memory implementation of the [DB] interface.
|
||||||
|
type DefaultDB struct {
|
||||||
|
// mu protects all properties below.
|
||||||
|
mu *sync.Mutex
|
||||||
|
|
||||||
|
// loginToUserID maps a web user login to their UserID. The values must not
|
||||||
|
// be empty.
|
||||||
|
//
|
||||||
|
// TODO(s.chzhen): Remove this once user sessions support [UserID].
|
||||||
|
loginToUserID map[Login]UserID
|
||||||
|
|
||||||
|
// userIDToUser maps a UserID to a web user. The values must not be nil.
|
||||||
|
// It must be synchronized with loginToUserID, meaning all UserIDs stored in
|
||||||
|
// loginToUserID must also be stored in this map.
|
||||||
|
userIDToUser map[UserID]*User
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDefaultDB returns the new properly initialized *DefaultDB.
|
||||||
|
func NewDefaultDB() (db *DefaultDB) {
|
||||||
|
return &DefaultDB{
|
||||||
|
mu: &sync.Mutex{},
|
||||||
|
loginToUserID: map[Login]UserID{},
|
||||||
|
userIDToUser: map[UserID]*User{},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// type check
|
||||||
|
var _ DB = (*DefaultDB)(nil)
|
||||||
|
|
||||||
|
// All implements the [DB] interface for *DefaultDB.
|
||||||
|
func (db *DefaultDB) All(ctx context.Context) (users []*User, err error) {
|
||||||
|
db.mu.Lock()
|
||||||
|
defer db.mu.Unlock()
|
||||||
|
|
||||||
|
if len(db.userIDToUser) == 0 {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
users = slices.SortedStableFunc(
|
||||||
|
maps.Values(db.userIDToUser),
|
||||||
|
func(a, b *User) (res int) {
|
||||||
|
// TODO(s.chzhen): Consider adding a custom comparer.
|
||||||
|
return cmp.Compare(a.Login, b.Login)
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
return users, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ByLogin implements the [DB] interface for *DefaultDB.
|
||||||
|
func (db *DefaultDB) ByLogin(ctx context.Context, login Login) (u *User, err error) {
|
||||||
|
db.mu.Lock()
|
||||||
|
defer db.mu.Unlock()
|
||||||
|
|
||||||
|
id, ok := db.loginToUserID[login]
|
||||||
|
if !ok {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
u, ok = db.userIDToUser[id]
|
||||||
|
if !ok {
|
||||||
|
// Should not happen.
|
||||||
|
panic(fmt.Errorf("no web user present with login %q", login))
|
||||||
|
}
|
||||||
|
|
||||||
|
return u, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ByUUID implements the [DB] interface for *DefaultDB.
|
||||||
|
func (db *DefaultDB) ByUUID(ctx context.Context, id UserID) (u *User, err error) {
|
||||||
|
db.mu.Lock()
|
||||||
|
defer db.mu.Unlock()
|
||||||
|
|
||||||
|
u, ok := db.userIDToUser[id]
|
||||||
|
if !ok {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return u, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create implements the [DB] interface for *DefaultDB.
|
||||||
|
func (db *DefaultDB) Create(ctx context.Context, u *User) (err error) {
|
||||||
|
db.mu.Lock()
|
||||||
|
defer db.mu.Unlock()
|
||||||
|
|
||||||
|
if u.ID == (UserID{}) {
|
||||||
|
return fmt.Errorf("userid: %w", errors.ErrEmptyValue)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, ok := db.userIDToUser[u.ID]
|
||||||
|
if ok {
|
||||||
|
return fmt.Errorf("userid: %w", errors.ErrDuplicated)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, ok = db.loginToUserID[u.Login]
|
||||||
|
if ok {
|
||||||
|
return fmt.Errorf("login: %w", errors.ErrDuplicated)
|
||||||
|
}
|
||||||
|
|
||||||
|
db.userIDToUser[u.ID] = u
|
||||||
|
db.loginToUserID[u.Login] = u.ID
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
83
internal/aghuser/db_test.go
Normal file
83
internal/aghuser/db_test.go
Normal file
@@ -0,0 +1,83 @@
|
|||||||
|
package aghuser_test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/AdguardTeam/AdGuardHome/internal/aghuser"
|
||||||
|
"github.com/AdguardTeam/golibs/errors"
|
||||||
|
"github.com/AdguardTeam/golibs/testutil"
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
"golang.org/x/crypto/bcrypt"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestDB(t *testing.T) {
|
||||||
|
db := aghuser.NewDefaultDB()
|
||||||
|
|
||||||
|
const (
|
||||||
|
userWithIDPassRaw = "user_with_id_password"
|
||||||
|
userSecondPassRaw = "user_second_password"
|
||||||
|
)
|
||||||
|
|
||||||
|
userWithIDPassHash, err := bcrypt.GenerateFromPassword(
|
||||||
|
[]byte(userWithIDPassRaw),
|
||||||
|
bcrypt.DefaultCost,
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
userSecondPassHash, err := bcrypt.GenerateFromPassword(
|
||||||
|
[]byte(userSecondPassRaw),
|
||||||
|
bcrypt.DefaultCost,
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
userWithIDPass := aghuser.NewDefaultPassword(string(userWithIDPassHash))
|
||||||
|
userSecondPass := aghuser.NewDefaultPassword(string(userSecondPassHash))
|
||||||
|
|
||||||
|
var (
|
||||||
|
userWithID = &aghuser.User{
|
||||||
|
ID: aghuser.MustNewUserID(),
|
||||||
|
Login: "user_with_id",
|
||||||
|
Password: userWithIDPass,
|
||||||
|
}
|
||||||
|
userSecond = &aghuser.User{
|
||||||
|
ID: aghuser.MustNewUserID(),
|
||||||
|
Login: "user_second",
|
||||||
|
Password: userSecondPass,
|
||||||
|
}
|
||||||
|
userDuplicateLogin = &aghuser.User{
|
||||||
|
ID: aghuser.MustNewUserID(),
|
||||||
|
Login: userWithID.Login,
|
||||||
|
Password: userWithIDPass,
|
||||||
|
}
|
||||||
|
)
|
||||||
|
|
||||||
|
ctx := testutil.ContextWithTimeout(t, testTimeout)
|
||||||
|
|
||||||
|
err = db.Create(ctx, userWithID)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = db.Create(ctx, userSecond)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = db.Create(ctx, userDuplicateLogin)
|
||||||
|
assert.ErrorIs(t, err, errors.ErrDuplicated)
|
||||||
|
|
||||||
|
got, err := db.ByUUID(ctx, userWithID.ID)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, userWithID, got)
|
||||||
|
assert.True(t, got.Password.Authenticate(ctx, userWithIDPassRaw))
|
||||||
|
|
||||||
|
got, err = db.ByLogin(ctx, userSecond.Login)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Equal(t, userSecond, got)
|
||||||
|
assert.True(t, got.Password.Authenticate(ctx, userSecondPassRaw))
|
||||||
|
|
||||||
|
users, err := db.All(ctx)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
assert.Len(t, users, 2)
|
||||||
|
assert.Equal(t, []*aghuser.User{userSecond, userWithID}, users)
|
||||||
|
}
|
||||||
44
internal/aghuser/user.go
Normal file
44
internal/aghuser/user.go
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
// Package aghuser contains types and logic for dealing with AdGuard Home's web
|
||||||
|
// users.
|
||||||
|
package aghuser
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/google/uuid"
|
||||||
|
)
|
||||||
|
|
||||||
|
// UserID is the type for the unique IDs of web users.
|
||||||
|
type UserID uuid.UUID
|
||||||
|
|
||||||
|
// NewUserID returns a new web user unique identifier. Any error returned is an
|
||||||
|
// error from the cryptographic randomness reader.
|
||||||
|
func NewUserID() (uid UserID, err error) {
|
||||||
|
uuidv7, err := uuid.NewV7()
|
||||||
|
|
||||||
|
return UserID(uuidv7), err
|
||||||
|
}
|
||||||
|
|
||||||
|
// MustNewUserID is a wrapper around [NewUserID] that panics if there is an
|
||||||
|
// error. It is currently only used in tests.
|
||||||
|
func MustNewUserID() (uid UserID) {
|
||||||
|
uid, err := NewUserID()
|
||||||
|
if err != nil {
|
||||||
|
panic(fmt.Errorf("unexpected uuidv7 error: %w", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
return uid
|
||||||
|
}
|
||||||
|
|
||||||
|
// User represents a web user.
|
||||||
|
type User struct {
|
||||||
|
// ID is the unique identifier for the web user. It must not be empty.
|
||||||
|
ID UserID
|
||||||
|
|
||||||
|
// Login is the login name of the web user. It must not be empty.
|
||||||
|
Login Login
|
||||||
|
|
||||||
|
// Password stores the password information for the web user. It must not
|
||||||
|
// be nil.
|
||||||
|
Password Password
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user