Merge pull request #1109 from nextcloud/add-more-secrets-to-password-reset-link

Use mail for encrypting the password reset token as well
This commit is contained in:
Morris Jobke 2016-11-03 22:11:43 +01:00 committed by GitHub
commit ac61f64190
3 changed files with 219 additions and 148 deletions

View file

@ -44,6 +44,7 @@ class Application extends App {
parent::__construct('core'); parent::__construct('core');
$container = $this->getContainer(); $container = $this->getContainer();
$container->registerService('defaultMailAddress', function() { $container->registerService('defaultMailAddress', function() {
return Util::getDefaultEmailAddress('lostpassword-noreply'); return Util::getDefaultEmailAddress('lostpassword-noreply');
}); });

View file

@ -40,6 +40,7 @@ use \OCP\IL10N;
use \OCP\IConfig; use \OCP\IConfig;
use OCP\IUserManager; use OCP\IUserManager;
use OCP\Mail\IMailer; use OCP\Mail\IMailer;
use OCP\Security\ICrypto;
use OCP\Security\ISecureRandom; use OCP\Security\ISecureRandom;
/** /**
@ -71,6 +72,8 @@ class LostController extends Controller {
protected $mailer; protected $mailer;
/** @var ITimeFactory */ /** @var ITimeFactory */
protected $timeFactory; protected $timeFactory;
/** @var ICrypto */
protected $crypto;
/** /**
* @param string $appName * @param string $appName
@ -85,6 +88,7 @@ class LostController extends Controller {
* @param IManager $encryptionManager * @param IManager $encryptionManager
* @param IMailer $mailer * @param IMailer $mailer
* @param ITimeFactory $timeFactory * @param ITimeFactory $timeFactory
* @param ICrypto $crypto
*/ */
public function __construct($appName, public function __construct($appName,
IRequest $request, IRequest $request,
@ -97,7 +101,8 @@ class LostController extends Controller {
$defaultMailAddress, $defaultMailAddress,
IManager $encryptionManager, IManager $encryptionManager,
IMailer $mailer, IMailer $mailer,
ITimeFactory $timeFactory) { ITimeFactory $timeFactory,
ICrypto $crypto) {
parent::__construct($appName, $request); parent::__construct($appName, $request);
$this->urlGenerator = $urlGenerator; $this->urlGenerator = $urlGenerator;
$this->userManager = $userManager; $this->userManager = $userManager;
@ -109,6 +114,7 @@ class LostController extends Controller {
$this->config = $config; $this->config = $config;
$this->mailer = $mailer; $this->mailer = $mailer;
$this->timeFactory = $timeFactory; $this->timeFactory = $timeFactory;
$this->crypto = $crypto;
} }
/** /**
@ -150,8 +156,19 @@ class LostController extends Controller {
*/ */
private function checkPasswordResetToken($token, $userId) { private function checkPasswordResetToken($token, $userId) {
$user = $this->userManager->get($userId); $user = $this->userManager->get($userId);
if($user === null) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
}
$splittedToken = explode(':', $this->config->getUserValue($userId, 'core', 'lostpassword', null)); try {
$encryptedToken = $this->config->getUserValue($userId, 'core', 'lostpassword', null);
$mailAddress = !is_null($user->getEMailAddress()) ? $user->getEMailAddress() : '';
$decryptedToken = $this->crypto->decrypt($encryptedToken, $mailAddress.$this->config->getSystemValue('secret'));
} catch (\Exception $e) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
}
$splittedToken = explode(':', $decryptedToken);
if(count($splittedToken) !== 2) { if(count($splittedToken) !== 2) {
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid')); throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
} }
@ -249,11 +266,20 @@ class LostController extends Controller {
); );
} }
$token = $this->secureRandom->generate(21, // Generate the token. It is stored encrypted in the database with the
// secret being the users' email address appended with the system secret.
// This makes the token automatically invalidate once the user changes
// their email address.
$token = $this->secureRandom->generate(
21,
ISecureRandom::CHAR_DIGITS. ISecureRandom::CHAR_DIGITS.
ISecureRandom::CHAR_LOWER. ISecureRandom::CHAR_LOWER.
ISecureRandom::CHAR_UPPER); ISecureRandom::CHAR_UPPER
$this->config->setUserValue($user, 'core', 'lostpassword', $this->timeFactory->getTime() .':'. $token); );
$tokenValue = $this->timeFactory->getTime() .':'. $token;
$mailAddress = !is_null($userObject->getEMailAddress()) ? $userObject->getEMailAddress() : '';
$encryptedValue = $this->crypto->encrypt($tokenValue, $mailAddress.$this->config->getSystemValue('secret'));
$this->config->setUserValue($user, 'core', 'lostpassword', $encryptedValue);
$link = $this->urlGenerator->linkToRouteAbsolute('core.lost.resetform', array('userId' => $user, 'token' => $token)); $link = $this->urlGenerator->linkToRouteAbsolute('core.lost.resetform', array('userId' => $user, 'token' => $token));

View file

@ -22,6 +22,7 @@
namespace Tests\Core\Controller; namespace Tests\Core\Controller;
use OC\Core\Controller\LostController; use OC\Core\Controller\LostController;
use OC\Mail\Message;
use OCP\AppFramework\Http\TemplateResponse; use OCP\AppFramework\Http\TemplateResponse;
use OCP\AppFramework\Utility\ITimeFactory; use OCP\AppFramework\Utility\ITimeFactory;
use OCP\Encryption\IManager; use OCP\Encryption\IManager;
@ -32,6 +33,7 @@ use OCP\IURLGenerator;
use OCP\IUser; use OCP\IUser;
use OCP\IUserManager; use OCP\IUserManager;
use OCP\Mail\IMailer; use OCP\Mail\IMailer;
use OCP\Security\ICrypto;
use OCP\Security\ISecureRandom; use OCP\Security\ISecureRandom;
use PHPUnit_Framework_MockObject_MockObject; use PHPUnit_Framework_MockObject_MockObject;
@ -66,22 +68,21 @@ class LostControllerTest extends \Test\TestCase {
private $timeFactory; private $timeFactory;
/** @var IRequest */ /** @var IRequest */
private $request; private $request;
/** @var ICrypto|\PHPUnit_Framework_MockObject_MockObject */
private $crypto;
protected function setUp() { protected function setUp() {
parent::setUp(); parent::setUp();
$this->existingUser = $this->getMockBuilder('OCP\IUser') $this->existingUser = $this->createMock(IUser::class);
->disableOriginalConstructor()->getMock(); $this->existingUser->method('getEMailAddress')
$this->existingUser
->expects($this->any())
->method('getEMailAddress')
->willReturn('test@example.com'); ->willReturn('test@example.com');
$this->config = $this->getMockBuilder('\OCP\IConfig') $this->config = $this->createMock(IConfig::class);
->disableOriginalConstructor()->getMock(); $this->config->method('getSystemValue')
$this->l10n = $this->getMockBuilder('\OCP\IL10N') ->with('secret', null)
->disableOriginalConstructor()->getMock(); ->willReturn('SECRET');
$this->l10n = $this->createMock(IL10N::class);
$this->l10n $this->l10n
->expects($this->any()) ->expects($this->any())
->method('t') ->method('t')
@ -107,6 +108,7 @@ class LostControllerTest extends \Test\TestCase {
$this->encryptionManager->expects($this->any()) $this->encryptionManager->expects($this->any())
->method('isEnabled') ->method('isEnabled')
->willReturn(true); ->willReturn(true);
$this->crypto = $this->createMock(ICrypto::class);
$this->lostController = new LostController( $this->lostController = new LostController(
'Core', 'Core',
$this->request, $this->request,
@ -119,45 +121,45 @@ class LostControllerTest extends \Test\TestCase {
'lostpassword-noreply@localhost', 'lostpassword-noreply@localhost',
$this->encryptionManager, $this->encryptionManager,
$this->mailer, $this->mailer,
$this->timeFactory $this->timeFactory,
$this->crypto
); );
} }
public function testResetFormInvalidToken() { public function testResetFormWithNotExistingUser() {
$userId = 'admin'; $this->userManager->method('get')
$token = 'MySecretToken'; ->with('NotExistingUser')
$response = $this->lostController->resetform($token, $userId); ->willReturn(null);
$expectedResponse = new TemplateResponse('core',
$expectedResponse = new TemplateResponse(
'core',
'error', 'error',
[ [
'errors' => [ 'errors' => [
['error' => 'Couldn\'t reset password because the token is invalid'], ['error' => 'Couldn\'t reset password because the token is invalid'],
] ]
], ],
'guest'); 'guest'
$this->assertEquals($expectedResponse, $response); );
$this->assertEquals($expectedResponse, $this->lostController->resetform('MySecretToken', 'NotExistingUser'));
} }
public function testResetFormInvalidTokenMatch() { public function testResetFormInvalidTokenMatch() {
$this->config $this->config->method('getUserValue')
->expects($this->once())
->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword')); ->willReturn('encryptedToken');
$user = $this->getMockBuilder('\OCP\IUser') $this->existingUser->method('getLastLogin')
->disableOriginalConstructor()->getMock();
$user
->expects($this->once())
->method('getLastLogin')
->will($this->returnValue(12344)); ->will($this->returnValue(12344));
$this->userManager $this->userManager->method('get')
->expects($this->once())
->method('get')
->with('ValidTokenUser') ->with('ValidTokenUser')
->will($this->returnValue($user)); ->willReturn($this->existingUser);
$userId = 'ValidTokenUser'; $this->crypto->method('decrypt')
$token = '12345:MySecretToken'; ->with(
$response = $this->lostController->resetform($token, $userId); $this->equalTo('encryptedToken'),
$this->equalTo('test@example.comSECRET')
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
$response = $this->lostController->resetform('12345:MySecretToken', 'ValidTokenUser');
$expectedResponse = new TemplateResponse('core', $expectedResponse = new TemplateResponse('core',
'error', 'error',
[ [
@ -171,25 +173,25 @@ class LostControllerTest extends \Test\TestCase {
public function testResetFormExpiredToken() { public function testResetFormExpiredToken() {
$user = $this->getMockBuilder('\OCP\IUser') $this->userManager->method('get')
->disableOriginalConstructor()->getMock();
$this->userManager
->expects($this->once())
->method('get')
->with('ValidTokenUser') ->with('ValidTokenUser')
->will($this->returnValue($user)); ->willReturn($this->existingUser);
$this->timeFactory
->expects($this->once())
->method('getTime')
->will($this->returnValue(12345*60*60*12));
$userId = 'ValidTokenUser';
$token = 'TheOnlyAndOnlyOneTokenToResetThePassword';
$this->config $this->config
->expects($this->once()) ->expects($this->once())
->method('getUserValue') ->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword')); ->will($this->returnValue('encryptedToken'));
$response = $this->lostController->resetform($token, $userId); $this->crypto->method('decrypt')
->with(
$this->equalTo('encryptedToken'),
$this->equalTo('test@example.comSECRET')
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
$this->timeFactory
->expects($this->once())
->method('getTime')
->willReturn(999999);
$response = $this->lostController->resetform('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser');
$expectedResponse = new TemplateResponse('core', $expectedResponse = new TemplateResponse('core',
'error', 'error',
[ [
@ -202,35 +204,32 @@ class LostControllerTest extends \Test\TestCase {
} }
public function testResetFormValidToken() { public function testResetFormValidToken() {
$user = $this->getMockBuilder('\OCP\IUser') $this->existingUser->method('getLastLogin')
->disableOriginalConstructor()->getMock(); ->willReturn(12344);
$user $this->userManager->method('get')
->expects($this->once())
->method('getLastLogin')
->will($this->returnValue(12344));
$this->userManager
->expects($this->once())
->method('get')
->with('ValidTokenUser') ->with('ValidTokenUser')
->will($this->returnValue($user)); ->willReturn($this->existingUser);
$this->timeFactory $this->timeFactory
->expects($this->once()) ->expects($this->once())
->method('getTime') ->method('getTime')
->will($this->returnValue(12348)); ->willReturn(12348);
$userId = 'ValidTokenUser';
$token = 'TheOnlyAndOnlyOneTokenToResetThePassword'; $this->config->method('getUserValue')
$this->config
->expects($this->once())
->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword')); ->willReturn('encryptedToken');
$this->crypto->method('decrypt')
->with(
$this->equalTo('encryptedToken'),
$this->equalTo('test@example.comSECRET')
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
$this->urlGenerator $this->urlGenerator
->expects($this->once()) ->expects($this->once())
->method('linkToRouteAbsolute') ->method('linkToRouteAbsolute')
->with('core.lost.setPassword', array('userId' => 'ValidTokenUser', 'token' => 'TheOnlyAndOnlyOneTokenToResetThePassword')) ->with('core.lost.setPassword', array('userId' => 'ValidTokenUser', 'token' => 'TheOnlyAndOnlyOneTokenToResetThePassword'))
->will($this->returnValue('https://example.tld/index.php/lostpassword/')); ->will($this->returnValue('https://example.tld/index.php/lostpassword/'));
$response = $this->lostController->resetform($token, $userId); $response = $this->lostController->resetform('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser');
$expectedResponse = new TemplateResponse('core', $expectedResponse = new TemplateResponse('core',
'lostpassword/resetpassword', 'lostpassword/resetpassword',
array( array(
@ -296,7 +295,7 @@ class LostControllerTest extends \Test\TestCase {
$this->config $this->config
->expects($this->once()) ->expects($this->once())
->method('setUserValue') ->method('setUserValue')
->with('ExistingUser', 'core', 'lostpassword', '12348:ThisIsMaybeANotSoSecretToken!'); ->with('ExistingUser', 'core', 'lostpassword', 'encryptedToken');
$this->urlGenerator $this->urlGenerator
->expects($this->once()) ->expects($this->once())
->method('linkToRouteAbsolute') ->method('linkToRouteAbsolute')
@ -329,6 +328,16 @@ class LostControllerTest extends \Test\TestCase {
->method('send') ->method('send')
->with($message); ->with($message);
$this->config->method('getSystemValue')
->with('secret', '')
->willReturn('SECRET');
$this->crypto->method('encrypt')
->with(
$this->equalTo('12348:ThisIsMaybeANotSoSecretToken!'),
$this->equalTo('test@example.comSECRET')
)->willReturn('encryptedToken');
$response = $this->lostController->email('ExistingUser'); $response = $this->lostController->email('ExistingUser');
$expectedResponse = array('status' => 'success'); $expectedResponse = array('status' => 'success');
$this->assertSame($expectedResponse, $response); $this->assertSame($expectedResponse, $response);
@ -353,7 +362,7 @@ class LostControllerTest extends \Test\TestCase {
$this->config $this->config
->expects($this->once()) ->expects($this->once())
->method('setUserValue') ->method('setUserValue')
->with('ExistingUser', 'core', 'lostpassword', '12348:ThisIsMaybeANotSoSecretToken!'); ->with('ExistingUser', 'core', 'lostpassword', 'encryptedToken');
$this->timeFactory $this->timeFactory
->expects($this->once()) ->expects($this->once())
->method('getTime') ->method('getTime')
@ -363,8 +372,7 @@ class LostControllerTest extends \Test\TestCase {
->method('linkToRouteAbsolute') ->method('linkToRouteAbsolute')
->with('core.lost.resetform', array('userId' => 'ExistingUser', 'token' => 'ThisIsMaybeANotSoSecretToken!')) ->with('core.lost.resetform', array('userId' => 'ExistingUser', 'token' => 'ThisIsMaybeANotSoSecretToken!'))
->will($this->returnValue('https://example.tld/index.php/lostpassword/')); ->will($this->returnValue('https://example.tld/index.php/lostpassword/'));
$message = $this->getMockBuilder('\OC\Mail\Message') $message = $this->createMock(Message::class);
->disableOriginalConstructor()->getMock();
$message $message
->expects($this->at(0)) ->expects($this->at(0))
->method('setTo') ->method('setTo')
@ -391,85 +399,95 @@ class LostControllerTest extends \Test\TestCase {
->with($message) ->with($message)
->will($this->throwException(new \Exception())); ->will($this->throwException(new \Exception()));
$this->config->method('getSystemValue')
->with('secret', '')
->willReturn('SECRET');
$this->crypto->method('encrypt')
->with(
$this->equalTo('12348:ThisIsMaybeANotSoSecretToken!'),
$this->equalTo('test@example.comSECRET')
)->willReturn('encryptedToken');
$response = $this->lostController->email('ExistingUser'); $response = $this->lostController->email('ExistingUser');
$expectedResponse = ['status' => 'error', 'msg' => 'Couldn\'t send reset email. Please contact your administrator.']; $expectedResponse = ['status' => 'error', 'msg' => 'Couldn\'t send reset email. Please contact your administrator.'];
$this->assertSame($expectedResponse, $response); $this->assertSame($expectedResponse, $response);
} }
public function testSetPasswordUnsuccessful() { public function testSetPasswordUnsuccessful() {
$this->config $this->config->method('getUserValue')
->expects($this->once()) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->method('getUserValue') ->willReturn('encryptedData');
->with('InvalidTokenUser', 'core', 'lostpassword', null) $this->existingUser->method('getLastLogin')
->will($this->returnValue('TheOnlyAndOnlyOneTokenToResetThePassword')); ->will($this->returnValue(12344));
$this->existingUser->expects($this->once())
->method('setPassword')
->with('NewPassword')
->willReturn(false);
$this->userManager->method('get')
->with('ValidTokenUser')
->willReturn($this->existingUser);
$this->config->expects($this->never())
->method('deleteUserValue');
$this->timeFactory->method('getTime')
->will($this->returnValue(12348));
// With an invalid token $this->crypto->method('decrypt')
$userName = 'InvalidTokenUser'; ->with(
$response = $this->lostController->setPassword('wrongToken', $userName, 'NewPassword', true); $this->equalTo('encryptedData'),
$expectedResponse = [ $this->equalTo('test@example.comSECRET')
'status' => 'error', )->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
'msg' => 'Couldn\'t reset password because the token is invalid'
];
$this->assertSame($expectedResponse, $response);
// With a valid token and no proceed $response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword!', $userName, 'NewPassword', false); $expectedResponse = array('status' => 'error', 'msg' => '');
$expectedResponse = ['status' => 'error', 'msg' => '', 'encryption' => true];
$this->assertSame($expectedResponse, $response); $this->assertSame($expectedResponse, $response);
} }
public function testSetPasswordSuccessful() { public function testSetPasswordSuccessful() {
$this->config $this->config->method('getUserValue')
->expects($this->once())
->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword')); ->willReturn('encryptedData');
$user = $this->getMockBuilder('\OCP\IUser') $this->existingUser->method('getLastLogin')
->disableOriginalConstructor()->getMock();
$user
->expects($this->once())
->method('getLastLogin')
->will($this->returnValue(12344)); ->will($this->returnValue(12344));
$user->expects($this->once()) $this->existingUser->expects($this->once())
->method('setPassword') ->method('setPassword')
->with('NewPassword') ->with('NewPassword')
->will($this->returnValue(true)); ->willReturn(true);
$this->userManager $this->userManager->method('get')
->expects($this->exactly(2))
->method('get')
->with('ValidTokenUser') ->with('ValidTokenUser')
->will($this->returnValue($user)); ->willReturn($this->existingUser);
$this->config $this->config->expects($this->once())
->expects($this->once())
->method('deleteUserValue') ->method('deleteUserValue')
->with('ValidTokenUser', 'core', 'lostpassword'); ->with('ValidTokenUser', 'core', 'lostpassword');
$this->timeFactory $this->timeFactory->method('getTime')
->expects($this->once())
->method('getTime')
->will($this->returnValue(12348)); ->will($this->returnValue(12348));
$this->crypto->method('decrypt')
->with(
$this->equalTo('encryptedData'),
$this->equalTo('test@example.comSECRET')
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true); $response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
$expectedResponse = array('status' => 'success'); $expectedResponse = array('status' => 'success');
$this->assertSame($expectedResponse, $response); $this->assertSame($expectedResponse, $response);
} }
public function testSetPasswordExpiredToken() { public function testSetPasswordExpiredToken() {
$this->config $this->config->method('getUserValue')
->expects($this->once())
->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword')); ->willReturn('encryptedData');
$user = $this->getMockBuilder('\OCP\IUser') $this->userManager->method('get')
->disableOriginalConstructor()->getMock();
$this->userManager
->expects($this->once())
->method('get')
->with('ValidTokenUser') ->with('ValidTokenUser')
->will($this->returnValue($user)); ->willReturn($this->existingUser);
$this->timeFactory $this->timeFactory->method('getTime')
->expects($this->once()) ->willReturn(55546);
->method('getTime')
->will($this->returnValue(55546)); $this->crypto->method('decrypt')
->with(
$this->equalTo('encryptedData'),
$this->equalTo('test@example.comSECRET')
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true); $response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
$expectedResponse = [ $expectedResponse = [
@ -480,18 +498,19 @@ class LostControllerTest extends \Test\TestCase {
} }
public function testSetPasswordInvalidDataInDb() { public function testSetPasswordInvalidDataInDb() {
$this->config $this->config->method('getUserValue')
->expects($this->once())
->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue('TheOnlyAndOnlyOneTokenToResetThePassword')); ->willReturn('invalidEncryptedData');
$user = $this->getMockBuilder('\OCP\IUser')
->disableOriginalConstructor()->getMock();
$this->userManager $this->userManager
->expects($this->once())
->method('get') ->method('get')
->with('ValidTokenUser') ->with('ValidTokenUser')
->will($this->returnValue($user)); ->willReturn($this->existingUser);
$this->crypto->method('decrypt')
->with(
$this->equalTo('invalidEncryptedData'),
$this->equalTo('test@example.comSECRET')
)->willReturn('TheOnlyAndOnlyOneTokenToResetThePassword');
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true); $response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
$expectedResponse = [ $expectedResponse = [
@ -502,27 +521,25 @@ class LostControllerTest extends \Test\TestCase {
} }
public function testSetPasswordExpiredTokenDueToLogin() { public function testSetPasswordExpiredTokenDueToLogin() {
$this->config $this->config->method('getUserValue')
->expects($this->once())
->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword')); ->willReturn('encryptedData');
$user = $this->getMockBuilder('\OCP\IUser') $this->existingUser->method('getLastLogin')
->disableOriginalConstructor()->getMock();
$user
->expects($this->once())
->method('getLastLogin')
->will($this->returnValue(12346)); ->will($this->returnValue(12346));
$this->userManager $this->userManager
->expects($this->once())
->method('get') ->method('get')
->with('ValidTokenUser') ->with('ValidTokenUser')
->will($this->returnValue($user)); ->willReturn($this->existingUser);
$this->timeFactory $this->timeFactory
->expects($this->once())
->method('getTime') ->method('getTime')
->will($this->returnValue(12345)); ->will($this->returnValue(12345));
$this->crypto->method('decrypt')
->with(
$this->equalTo('encryptedData'),
$this->equalTo('test@example.comSECRET')
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true); $response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
$expectedResponse = [ $expectedResponse = [
'status' => 'error', 'status' => 'error',
@ -532,11 +549,18 @@ class LostControllerTest extends \Test\TestCase {
} }
public function testIsSetPasswordWithoutTokenFailing() { public function testIsSetPasswordWithoutTokenFailing() {
$this->config $this->config->method('getUserValue')
->expects($this->once())
->method('getUserValue')
->with('ValidTokenUser', 'core', 'lostpassword', null) ->with('ValidTokenUser', 'core', 'lostpassword', null)
->will($this->returnValue(null)); ->will($this->returnValue(null));
$this->userManager->method('get')
->with('ValidTokenUser')
->willReturn($this->existingUser);
$this->crypto->method('decrypt')
->with(
$this->equalTo(''),
$this->equalTo('test@example.comSECRET')
)->willThrowException(new \Exception());
$response = $this->lostController->setPassword('', 'ValidTokenUser', 'NewPassword', true); $response = $this->lostController->setPassword('', 'ValidTokenUser', 'NewPassword', true);
$expectedResponse = [ $expectedResponse = [
@ -546,4 +570,24 @@ class LostControllerTest extends \Test\TestCase {
$this->assertSame($expectedResponse, $response); $this->assertSame($expectedResponse, $response);
} }
public function testSendEmailNoEmail() {
$user = $this->createMock(IUser::class);
$this->userManager->method('userExists')
->with('ExistingUser')
->willReturn(true);
$this->userManager->method('get')
->with('ExistingUser')
->willReturn($user);
$response = $this->lostController->email('ExistingUser');
$expectedResponse = ['status' => 'error', 'msg' => 'Could not send reset email because there is no email address for this username. Please contact your administrator.'];
$this->assertSame($expectedResponse, $response);
}
public function testSetPasswordEncryptionDontProceed() {
$response = $this->lostController->setPassword('myToken', 'user', 'newpass', false);
$expectedResponse = ['status' => 'error', 'msg' => '', 'encryption' => true];
$this->assertSame($expectedResponse, $response);
}
} }