315 lines
8.9 KiB
PHP
315 lines
8.9 KiB
PHP
<?php
|
|
|
|
/**
|
|
* @author Christoph Wurst <christoph@owncloud.com>
|
|
*
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
* @license AGPL-3.0
|
|
*
|
|
* This code is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
* as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*
|
|
*/
|
|
|
|
namespace Test\Authentication\TwoFactorAuth;
|
|
|
|
use Exception;
|
|
use OC;
|
|
use OC\App\AppManager;
|
|
use OC\Authentication\TwoFactorAuth\Manager;
|
|
use OCA\TwoFactor_BackupCodes\Provider\BackupCodesProvider;
|
|
use OCP\Authentication\TwoFactorAuth\IProvider;
|
|
use OCP\IConfig;
|
|
use OCP\ISession;
|
|
use OCP\IUser;
|
|
use Test\TestCase;
|
|
|
|
class ManagerTest extends TestCase {
|
|
|
|
/** @var IUser|PHPUnit_Framework_MockObject_MockObject */
|
|
private $user;
|
|
|
|
/** @var AppManager|PHPUnit_Framework_MockObject_MockObject */
|
|
private $appManager;
|
|
|
|
/** @var ISession|PHPUnit_Framework_MockObject_MockObject */
|
|
private $session;
|
|
|
|
/** @var Manager */
|
|
private $manager;
|
|
|
|
/** @var IConfig|PHPUnit_Framework_MockObject_MockObject */
|
|
private $config;
|
|
|
|
/** @var IProvider|PHPUnit_Framework_MockObject_MockObject */
|
|
private $fakeProvider;
|
|
|
|
/** @var IProvider|PHPUnit_Framework_MockObject_MockObject */
|
|
private $backupProvider;
|
|
|
|
protected function setUp() {
|
|
parent::setUp();
|
|
|
|
$this->user = $this->createMock(IUser::class);
|
|
$this->appManager = $this->getMockBuilder('\OC\App\AppManager')
|
|
->disableOriginalConstructor()
|
|
->getMock();
|
|
$this->session = $this->createMock(ISession::class);
|
|
$this->config = $this->createMock(IConfig::class);
|
|
|
|
$this->manager = $this->getMockBuilder('\OC\Authentication\TwoFactorAuth\Manager')
|
|
->setConstructorArgs([$this->appManager, $this->session, $this->config])
|
|
->setMethods(['loadTwoFactorApp']) // Do not actually load the apps
|
|
->getMock();
|
|
|
|
$this->fakeProvider = $this->createMock(IProvider::class);
|
|
$this->fakeProvider->expects($this->any())
|
|
->method('getId')
|
|
->will($this->returnValue('email'));
|
|
$this->fakeProvider->expects($this->any())
|
|
->method('isTwoFactorAuthEnabledForUser')
|
|
->will($this->returnValue(true));
|
|
OC::$server->registerService('\OCA\MyCustom2faApp\FakeProvider', function() {
|
|
return $this->fakeProvider;
|
|
});
|
|
|
|
$this->backupProvider = $this->getMockBuilder('\OCP\Authentication\TwoFactorAuth\IProvider')->getMock();
|
|
$this->backupProvider->expects($this->any())
|
|
->method('getId')
|
|
->will($this->returnValue('backup_codes'));
|
|
$this->backupProvider->expects($this->any())
|
|
->method('isTwoFactorAuthEnabledForUser')
|
|
->will($this->returnValue(true));
|
|
OC::$server->registerService('\OCA\TwoFactor_BackupCodes\Provider\FakeBackupCodesProvider', function () {
|
|
return $this->backupProvider;
|
|
});
|
|
}
|
|
|
|
private function prepareNoProviders() {
|
|
$this->appManager->expects($this->any())
|
|
->method('getEnabledAppsForUser')
|
|
->with($this->user)
|
|
->will($this->returnValue([]));
|
|
|
|
$this->appManager->expects($this->never())
|
|
->method('getAppInfo');
|
|
|
|
$this->manager->expects($this->never())
|
|
->method('loadTwoFactorApp');
|
|
}
|
|
|
|
private function prepareProviders() {
|
|
$this->appManager->expects($this->any())
|
|
->method('getEnabledAppsForUser')
|
|
->with($this->user)
|
|
->will($this->returnValue(['mycustom2faapp']));
|
|
|
|
$this->appManager->expects($this->once())
|
|
->method('getAppInfo')
|
|
->with('mycustom2faapp')
|
|
->will($this->returnValue([
|
|
'two-factor-providers' => [
|
|
'\OCA\MyCustom2faApp\FakeProvider',
|
|
],
|
|
]));
|
|
|
|
$this->manager->expects($this->once())
|
|
->method('loadTwoFactorApp')
|
|
->with('mycustom2faapp');
|
|
}
|
|
|
|
private function prepareProvidersWitBackupProvider() {
|
|
$this->appManager->expects($this->any())
|
|
->method('getEnabledAppsForUser')
|
|
->with($this->user)
|
|
->will($this->returnValue([
|
|
'mycustom2faapp',
|
|
'twofactor_backupcodes',
|
|
]));
|
|
|
|
$this->appManager->expects($this->exactly(2))
|
|
->method('getAppInfo')
|
|
->will($this->returnValueMap([
|
|
[
|
|
'mycustom2faapp',
|
|
['two-factor-providers' => [
|
|
'\OCA\MyCustom2faApp\FakeProvider',
|
|
]
|
|
]
|
|
],
|
|
[
|
|
'twofactor_backupcodes',
|
|
['two-factor-providers' => [
|
|
'\OCA\TwoFactor_BackupCodes\Provider\FakeBackupCodesProvider',
|
|
]
|
|
]
|
|
],
|
|
]));
|
|
|
|
$this->manager->expects($this->exactly(2))
|
|
->method('loadTwoFactorApp');
|
|
}
|
|
|
|
/**
|
|
* @expectedException Exception
|
|
* @expectedExceptionMessage Could not load two-factor auth provider \OCA\MyFaulty2faApp\DoesNotExist
|
|
*/
|
|
public function testFailHardIfProviderCanNotBeLoaded() {
|
|
$this->appManager->expects($this->once())
|
|
->method('getEnabledAppsForUser')
|
|
->with($this->user)
|
|
->will($this->returnValue(['faulty2faapp']));
|
|
$this->manager->expects($this->once())
|
|
->method('loadTwoFactorApp')
|
|
->with('faulty2faapp');
|
|
|
|
$this->appManager->expects($this->once())
|
|
->method('getAppInfo')
|
|
->with('faulty2faapp')
|
|
->will($this->returnValue([
|
|
'two-factor-providers' => [
|
|
'\OCA\MyFaulty2faApp\DoesNotExist',
|
|
],
|
|
]));
|
|
|
|
$this->manager->getProviders($this->user);
|
|
}
|
|
|
|
public function testIsTwoFactorAuthenticated() {
|
|
$this->prepareProviders();
|
|
|
|
$this->user->expects($this->once())
|
|
->method('getUID')
|
|
->will($this->returnValue('user123'));
|
|
$this->config->expects($this->once())
|
|
->method('getUserValue')
|
|
->with('user123', 'core', 'two_factor_auth_disabled', 0)
|
|
->will($this->returnValue(0));
|
|
|
|
$this->assertTrue($this->manager->isTwoFactorAuthenticated($this->user));
|
|
}
|
|
|
|
public function testGetProvider() {
|
|
$this->prepareProviders();
|
|
|
|
$this->assertSame($this->fakeProvider, $this->manager->getProvider($this->user, 'email'));
|
|
}
|
|
|
|
public function testGetBackupProvider() {
|
|
$this->prepareProvidersWitBackupProvider();
|
|
|
|
$this->assertSame($this->backupProvider, $this->manager->getBackupProvider($this->user));
|
|
}
|
|
|
|
public function testGetInvalidProvider() {
|
|
$this->prepareProviders();
|
|
|
|
$this->assertSame(null, $this->manager->getProvider($this->user, 'nonexistent'));
|
|
}
|
|
|
|
public function testGetProviders() {
|
|
$this->prepareProviders();
|
|
$expectedProviders = [
|
|
'email' => $this->fakeProvider,
|
|
];
|
|
|
|
$this->assertEquals($expectedProviders, $this->manager->getProviders($this->user));
|
|
}
|
|
|
|
public function testVerifyChallenge() {
|
|
$this->prepareProviders();
|
|
|
|
$challenge = 'passme';
|
|
$this->fakeProvider->expects($this->once())
|
|
->method('verifyChallenge')
|
|
->with($this->user, $challenge)
|
|
->will($this->returnValue(true));
|
|
$this->session->expects($this->once())
|
|
->method('remove')
|
|
->with('two_factor_auth_uid');
|
|
|
|
$this->assertTrue($this->manager->verifyChallenge('email', $this->user, $challenge));
|
|
}
|
|
|
|
public function testVerifyChallengeInvalidProviderId() {
|
|
$this->prepareProviders();
|
|
|
|
$challenge = 'passme';
|
|
$this->fakeProvider->expects($this->never())
|
|
->method('verifyChallenge')
|
|
->with($this->user, $challenge);
|
|
$this->session->expects($this->never())
|
|
->method('remove');
|
|
|
|
$this->assertFalse($this->manager->verifyChallenge('dontexist', $this->user, $challenge));
|
|
}
|
|
|
|
public function testVerifyInvalidChallenge() {
|
|
$this->prepareProviders();
|
|
|
|
$challenge = 'dontpassme';
|
|
$this->fakeProvider->expects($this->once())
|
|
->method('verifyChallenge')
|
|
->with($this->user, $challenge)
|
|
->will($this->returnValue(false));
|
|
$this->session->expects($this->never())
|
|
->method('remove');
|
|
|
|
$this->assertFalse($this->manager->verifyChallenge('email', $this->user, $challenge));
|
|
}
|
|
|
|
public function testNeedsSecondFactor() {
|
|
$user = $this->createMock(IUser::class);
|
|
$this->session->expects($this->once())
|
|
->method('exists')
|
|
->with('two_factor_auth_uid')
|
|
->will($this->returnValue(false));
|
|
|
|
$this->assertFalse($this->manager->needsSecondFactor($user));
|
|
}
|
|
|
|
public function testNeedsSecondFactorUserIsNull() {
|
|
$user = null;
|
|
$this->session->expects($this->never())
|
|
->method('exists');
|
|
|
|
$this->assertFalse($this->manager->needsSecondFactor($user));
|
|
}
|
|
|
|
public function testNeedsSecondFactorWithNoProviderAvailableAnymore() {
|
|
$this->prepareNoProviders();
|
|
|
|
$user = null;
|
|
$this->session->expects($this->never())
|
|
->method('exists')
|
|
->with('two_factor_auth_uid')
|
|
->will($this->returnValue(true));
|
|
$this->session->expects($this->never())
|
|
->method('remove')
|
|
->with('two_factor_auth_uid');
|
|
|
|
$this->assertFalse($this->manager->needsSecondFactor($user));
|
|
}
|
|
|
|
public function testPrepareTwoFactorLogin() {
|
|
$this->user->expects($this->once())
|
|
->method('getUID')
|
|
->will($this->returnValue('ferdinand'));
|
|
|
|
$this->session->expects($this->once())
|
|
->method('set')
|
|
->with('two_factor_auth_uid', 'ferdinand');
|
|
|
|
$this->manager->prepareTwoFactorLogin($this->user);
|
|
}
|
|
|
|
}
|