2019-04-30 08:27:42 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-02-20 14:44:51 +08:00
|
|
|
RSpec.describe SecondFactorManager do
|
2020-01-15 18:27:12 +08:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
|
|
|
fab!(:user_second_factor_totp) { Fabricate(:user_second_factor_totp, user: user) }
|
|
|
|
fab!(:user_security_key) do
|
|
|
|
Fabricate(
|
|
|
|
:user_security_key,
|
|
|
|
user: user,
|
|
|
|
public_key: valid_security_key_data[:public_key],
|
|
|
|
credential_id: valid_security_key_data[:credential_id],
|
|
|
|
)
|
|
|
|
end
|
2019-05-07 11:12:20 +08:00
|
|
|
fab!(:another_user) { Fabricate(:user) }
|
2018-02-20 14:44:51 +08:00
|
|
|
|
2019-05-07 11:12:20 +08:00
|
|
|
fab!(:user_second_factor_backup) { Fabricate(:user_second_factor_backup) }
|
2018-06-28 16:12:32 +08:00
|
|
|
let(:user_backup) { user_second_factor_backup.user }
|
|
|
|
|
2018-02-20 14:44:51 +08:00
|
|
|
describe "#totp" do
|
|
|
|
it "should return the right data" do
|
|
|
|
totp = nil
|
|
|
|
|
2019-06-27 07:58:06 +08:00
|
|
|
expect do totp = another_user.create_totp(enabled: true) end.to change {
|
2018-02-20 14:44:51 +08:00
|
|
|
UserSecondFactor.count
|
|
|
|
}.by(1)
|
|
|
|
|
2019-12-17 08:33:51 +08:00
|
|
|
expect(totp.totp_object.issuer).to eq(SiteSetting.title)
|
|
|
|
expect(totp.totp_object.secret).to eq(
|
|
|
|
another_user.reload.user_second_factors.totps.first.data,
|
|
|
|
)
|
2018-02-20 14:44:51 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#create_totp" do
|
|
|
|
it "should create the right record" do
|
|
|
|
second_factor = another_user.create_totp(enabled: true)
|
|
|
|
|
|
|
|
expect(second_factor.method).to eq(UserSecondFactor.methods[:totp])
|
|
|
|
expect(second_factor.data).to be_present
|
|
|
|
expect(second_factor.enabled).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#totp_provisioning_uri" do
|
|
|
|
it "should return the right uri" do
|
2019-06-27 07:58:06 +08:00
|
|
|
expect(user.user_second_factors.totps.first.totp_provisioning_uri).to eq(
|
2020-08-19 23:16:33 +08:00
|
|
|
"otpauth://totp/#{SiteSetting.title}:#{ERB::Util.url_encode(user.email)}?secret=#{user_second_factor_totp.data}&issuer=#{SiteSetting.title}",
|
2018-02-20 14:44:51 +08:00
|
|
|
)
|
|
|
|
end
|
2020-02-21 05:35:30 +08:00
|
|
|
it "should handle a colon in the site title" do
|
|
|
|
SiteSetting.title = "Spaceballs: The Discourse"
|
|
|
|
expect(user.user_second_factors.totps.first.totp_provisioning_uri).to eq(
|
2020-08-19 23:16:33 +08:00
|
|
|
"otpauth://totp/Spaceballs%20The%20Discourse:#{ERB::Util.url_encode(user.email)}?secret=#{user_second_factor_totp.data}&issuer=Spaceballs%20The%20Discourse",
|
2020-02-21 05:35:30 +08:00
|
|
|
)
|
|
|
|
end
|
|
|
|
it "should handle a two words before a colon in the title" do
|
|
|
|
SiteSetting.title = "Our Spaceballs: The Discourse"
|
|
|
|
expect(user.user_second_factors.totps.first.totp_provisioning_uri).to eq(
|
2020-08-19 23:16:33 +08:00
|
|
|
"otpauth://totp/Our%20Spaceballs%20The%20Discourse:#{ERB::Util.url_encode(user.email)}?secret=#{user_second_factor_totp.data}&issuer=Our%20Spaceballs%20The%20Discourse",
|
2020-02-21 05:35:30 +08:00
|
|
|
)
|
|
|
|
end
|
2018-02-20 14:44:51 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "#authenticate_totp" do
|
|
|
|
it "should be able to authenticate a token" do
|
|
|
|
freeze_time do
|
2019-06-27 07:58:06 +08:00
|
|
|
expect(user.user_second_factors.totps.first.last_used).to eq(nil)
|
2018-02-20 14:44:51 +08:00
|
|
|
|
2019-12-17 08:33:51 +08:00
|
|
|
token = user.user_second_factors.totps.first.totp_object.now
|
2018-02-20 14:44:51 +08:00
|
|
|
|
|
|
|
expect(user.authenticate_totp(token)).to eq(true)
|
2020-03-11 05:13:17 +08:00
|
|
|
expect(user.user_second_factors.totps.first.last_used).to eq_time(Time.zone.now)
|
2018-02-20 14:44:51 +08:00
|
|
|
expect(user.authenticate_totp(token)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when token is blank" do
|
|
|
|
it "should be false" do
|
|
|
|
expect(user.authenticate_totp(nil)).to eq(false)
|
2019-06-27 07:58:06 +08:00
|
|
|
expect(user.user_second_factors.totps.first.last_used).to eq(nil)
|
2018-02-20 14:44:51 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when token is invalid" do
|
|
|
|
it "should be false" do
|
|
|
|
expect(user.authenticate_totp("111111")).to eq(false)
|
2019-06-27 07:58:06 +08:00
|
|
|
expect(user.user_second_factors.totps.first.last_used).to eq(nil)
|
2018-02-20 14:44:51 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#totp_enabled?" do
|
|
|
|
describe "when user does not have a second factor record" do
|
|
|
|
it "should return false" do
|
|
|
|
expect(another_user.totp_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when user's second factor record is disabled" do
|
|
|
|
it "should return false" do
|
2020-01-15 18:27:12 +08:00
|
|
|
disable_totp
|
2018-02-20 14:44:51 +08:00
|
|
|
expect(user.totp_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when user's second factor record is enabled" do
|
|
|
|
it "should return true" do
|
|
|
|
expect(user.totp_enabled?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
2018-03-02 10:37:13 +08:00
|
|
|
|
|
|
|
describe "when SSO is enabled" do
|
|
|
|
it "should return false" do
|
2021-02-08 18:04:33 +08:00
|
|
|
SiteSetting.discourse_connect_url = "http://someurl.com"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
2018-03-02 10:37:13 +08:00
|
|
|
|
|
|
|
expect(user.totp_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when local login is disabled" do
|
|
|
|
it "should return false" do
|
|
|
|
SiteSetting.enable_local_logins = false
|
|
|
|
|
|
|
|
expect(user.totp_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
2018-02-20 14:44:51 +08:00
|
|
|
end
|
2018-06-28 16:12:32 +08:00
|
|
|
|
2020-01-15 18:27:12 +08:00
|
|
|
describe "#has_multiple_second_factor_methods?" do
|
|
|
|
context "when security keys and totp are enabled" do
|
2021-05-21 09:43:47 +08:00
|
|
|
it "returns true" do
|
2020-01-15 18:27:12 +08:00
|
|
|
expect(user.has_multiple_second_factor_methods?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "if the totp gets disabled" do
|
2021-05-21 09:43:47 +08:00
|
|
|
it "returns false" do
|
2020-01-15 18:27:12 +08:00
|
|
|
disable_totp
|
|
|
|
expect(user.has_multiple_second_factor_methods?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "if the security key gets disabled" do
|
2021-05-21 09:43:47 +08:00
|
|
|
it "returns false" do
|
2020-01-15 18:27:12 +08:00
|
|
|
disable_security_key
|
|
|
|
expect(user.has_multiple_second_factor_methods?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#only_security_keys_enabled?" do
|
|
|
|
it "returns true if totp disabled and security key enabled" do
|
|
|
|
disable_totp
|
|
|
|
expect(user.only_security_keys_enabled?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#only_totp_or_backup_codes_enabled?" do
|
|
|
|
it "returns true if totp enabled and security key disabled" do
|
|
|
|
disable_security_key
|
|
|
|
expect(user.only_totp_or_backup_codes_enabled?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#authenticate_second_factor" do
|
|
|
|
let(:params) { {} }
|
|
|
|
let(:secure_session) { {} }
|
|
|
|
|
|
|
|
context "when neither security keys nor totp/backup codes are enabled" do
|
|
|
|
before { disable_security_key && disable_totp }
|
|
|
|
it "returns OK, because it doesn't need to authenticate" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
2022-04-13 20:04:09 +08:00
|
|
|
|
|
|
|
it "keeps used_2fa_method nil because no authentication is done" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(nil)
|
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when only security key is enabled" do
|
|
|
|
before do
|
|
|
|
disable_totp
|
|
|
|
simulate_localhost_webauthn_challenge
|
2023-08-18 20:39:10 +08:00
|
|
|
DiscourseWebauthn.stage_challenge(user, secure_session)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when security key params are valid" do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
second_factor_token: valid_security_key_auth_post_data,
|
|
|
|
second_factor_method: UserSecondFactor.methods[:security_key],
|
|
|
|
}
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
it "returns OK" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
2022-04-13 20:04:09 +08:00
|
|
|
|
|
|
|
it "sets used_2fa_method to security keys" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(
|
|
|
|
UserSecondFactor.methods[:security_key],
|
|
|
|
)
|
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when security key params are invalid" do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
second_factor_token: {
|
|
|
|
signature: "bad",
|
|
|
|
clientData: "bad",
|
|
|
|
authenticatorData: "bad",
|
|
|
|
credentialId: "bad",
|
|
|
|
},
|
|
|
|
second_factor_method: UserSecondFactor.methods[:security_key],
|
|
|
|
}
|
|
|
|
end
|
|
|
|
it "returns not OK" do
|
|
|
|
result = user.authenticate_second_factor(params, secure_session)
|
|
|
|
expect(result.ok).to eq(false)
|
|
|
|
expect(result.error).to eq(I18n.t("webauthn.validation.not_found_error"))
|
2022-04-13 20:04:09 +08:00
|
|
|
expect(result.used_2fa_method).to eq(nil)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when only totp is enabled" do
|
|
|
|
before { disable_security_key }
|
|
|
|
|
|
|
|
context "when totp is valid" do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
second_factor_token: user.user_second_factors.totps.first.totp_object.now,
|
|
|
|
second_factor_method: UserSecondFactor.methods[:totp],
|
|
|
|
}
|
|
|
|
end
|
|
|
|
it "returns OK" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
2022-04-13 20:04:09 +08:00
|
|
|
|
|
|
|
it "sets used_2fa_method to totp" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(
|
|
|
|
UserSecondFactor.methods[:totp],
|
|
|
|
)
|
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when totp is invalid" do
|
|
|
|
let(:params) do
|
|
|
|
{ second_factor_token: "blah", second_factor_method: UserSecondFactor.methods[:totp] }
|
|
|
|
end
|
|
|
|
it "returns not OK" do
|
|
|
|
result = user.authenticate_second_factor(params, secure_session)
|
|
|
|
expect(result.ok).to eq(false)
|
|
|
|
expect(result.error).to eq(I18n.t("login.invalid_second_factor_code"))
|
2022-04-13 20:04:09 +08:00
|
|
|
expect(result.used_2fa_method).to eq(nil)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when both security keys and totp are enabled" do
|
|
|
|
let(:invalid_method) { 4 }
|
|
|
|
let(:method) { invalid_method }
|
|
|
|
|
|
|
|
before do
|
|
|
|
simulate_localhost_webauthn_challenge
|
2023-08-18 20:39:10 +08:00
|
|
|
DiscourseWebauthn.stage_challenge(user, secure_session)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when method selected is invalid" do
|
|
|
|
it "returns an error" do
|
|
|
|
result = user.authenticate_second_factor(params, secure_session)
|
|
|
|
expect(result.ok).to eq(false)
|
|
|
|
expect(result.error).to eq(I18n.t("login.invalid_second_factor_method"))
|
2022-04-13 20:04:09 +08:00
|
|
|
expect(result.used_2fa_method).to eq(nil)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when method selected is TOTP" do
|
|
|
|
let(:method) { UserSecondFactor.methods[:totp] }
|
|
|
|
let(:token) { user.user_second_factors.totps.first.totp_object.now }
|
|
|
|
|
|
|
|
context "when totp params are provided" do
|
|
|
|
let(:params) { { second_factor_token: token, second_factor_method: method } }
|
|
|
|
|
|
|
|
it "validates totp OK" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
|
|
|
|
2022-04-13 20:04:09 +08:00
|
|
|
it "sets used_2fa_method to totp" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(
|
|
|
|
UserSecondFactor.methods[:totp],
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2020-01-15 18:27:12 +08:00
|
|
|
context "when the user does not have TOTP enabled" do
|
|
|
|
let(:token) { "test" }
|
|
|
|
before { user.totps.destroy_all }
|
|
|
|
|
|
|
|
it "returns an error" do
|
|
|
|
result = user.authenticate_second_factor(params, secure_session)
|
|
|
|
expect(result.ok).to eq(false)
|
|
|
|
expect(result.error).to eq(I18n.t("login.not_enabled_second_factor_method"))
|
2022-04-13 20:04:09 +08:00
|
|
|
expect(result.used_2fa_method).to eq(nil)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when method selected is Security Keys" do
|
|
|
|
let(:method) { UserSecondFactor.methods[:security_key] }
|
|
|
|
|
|
|
|
before do
|
|
|
|
simulate_localhost_webauthn_challenge
|
2023-08-18 20:39:10 +08:00
|
|
|
DiscourseWebauthn.stage_challenge(user, secure_session)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when security key params are valid" do
|
|
|
|
let(:params) do
|
|
|
|
{ second_factor_token: valid_security_key_auth_post_data, second_factor_method: method }
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
it "returns OK" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
|
|
|
|
2022-04-13 20:04:09 +08:00
|
|
|
it "sets used_2fa_method to security keys" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(
|
|
|
|
UserSecondFactor.methods[:security_key],
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2020-01-15 18:27:12 +08:00
|
|
|
context "when the user does not have security keys enabled" do
|
|
|
|
before { user.security_keys.destroy_all }
|
|
|
|
|
|
|
|
it "returns an error" do
|
|
|
|
result = user.authenticate_second_factor(params, secure_session)
|
|
|
|
expect(result.ok).to eq(false)
|
|
|
|
expect(result.error).to eq(I18n.t("login.not_enabled_second_factor_method"))
|
2022-04-13 20:04:09 +08:00
|
|
|
expect(result.used_2fa_method).to eq(nil)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when method selected is Backup Codes" do
|
|
|
|
let(:method) { UserSecondFactor.methods[:backup_codes] }
|
|
|
|
let!(:backup_code) { Fabricate(:user_second_factor_backup, user: user) }
|
|
|
|
|
|
|
|
context "when backup code params are provided" do
|
|
|
|
let(:params) do
|
|
|
|
{ second_factor_token: "iAmValidBackupCode", second_factor_method: method }
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when backup codes enabled" do
|
|
|
|
it "validates codes OK" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
2022-04-13 20:04:09 +08:00
|
|
|
|
|
|
|
it "sets used_2fa_method to backup codes" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(
|
|
|
|
UserSecondFactor.methods[:backup_codes],
|
|
|
|
)
|
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when backup codes disabled" do
|
|
|
|
before { user.user_second_factors.backup_codes.destroy_all }
|
|
|
|
|
|
|
|
it "returns an error" do
|
|
|
|
result = user.authenticate_second_factor(params, secure_session)
|
|
|
|
expect(result.ok).to eq(false)
|
|
|
|
expect(result.error).to eq(I18n.t("login.not_enabled_second_factor_method"))
|
2022-04-13 20:04:09 +08:00
|
|
|
expect(result.used_2fa_method).to eq(nil)
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when no totp params are provided" do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
second_factor_token: valid_security_key_auth_post_data,
|
|
|
|
second_factor_method: UserSecondFactor.methods[:security_key],
|
|
|
|
}
|
2023-01-09 19:18:21 +08:00
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
|
|
|
|
it "validates the security key OK" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
2022-04-13 20:04:09 +08:00
|
|
|
|
|
|
|
it "sets used_2fa_method to security keys" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(
|
|
|
|
UserSecondFactor.methods[:security_key],
|
|
|
|
)
|
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
context "when totp params are provided" do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
second_factor_token: user.user_second_factors.totps.first.totp_object.now,
|
|
|
|
second_factor_method: UserSecondFactor.methods[:totp],
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
it "validates totp OK" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).ok).to eq(true)
|
|
|
|
end
|
2022-04-13 20:04:09 +08:00
|
|
|
|
|
|
|
it "sets used_2fa_method to totp" do
|
|
|
|
expect(user.authenticate_second_factor(params, secure_session).used_2fa_method).to eq(
|
|
|
|
UserSecondFactor.methods[:totp],
|
|
|
|
)
|
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
describe "backup codes" do
|
2018-06-28 16:12:32 +08:00
|
|
|
describe "#generate_backup_codes" do
|
|
|
|
it "should generate and store 10 backup codes" do
|
|
|
|
backup_codes = user.generate_backup_codes
|
|
|
|
|
|
|
|
expect(backup_codes.length).to be 10
|
|
|
|
expect(user_backup.user_second_factors.backup_codes).to be_present
|
|
|
|
expect(user_backup.user_second_factors.backup_codes.pluck(:method).uniq[0]).to eq(
|
|
|
|
UserSecondFactor.methods[:backup_codes],
|
|
|
|
)
|
|
|
|
expect(user_backup.user_second_factors.backup_codes.pluck(:enabled).uniq[0]).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#create_backup_codes" do
|
|
|
|
it "should create 10 backup code records" do
|
|
|
|
raw_codes = Array.new(10) { SecureRandom.hex(8) }
|
|
|
|
backup_codes = another_user.create_backup_codes(raw_codes)
|
|
|
|
|
|
|
|
expect(another_user.user_second_factors.backup_codes.length).to be 10
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#authenticate_backup_code" do
|
|
|
|
it "should be able to authenticate a backup code" do
|
|
|
|
backup_code = "iAmValidBackupCode"
|
|
|
|
|
|
|
|
expect(user_backup.authenticate_backup_code(backup_code)).to eq(true)
|
|
|
|
expect(user_backup.authenticate_backup_code(backup_code)).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when code is blank" do
|
|
|
|
it "should be false" do
|
|
|
|
expect(user_backup.authenticate_backup_code(nil)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when code is invalid" do
|
|
|
|
it "should be false" do
|
|
|
|
expect(user_backup.authenticate_backup_code("notValidBackupCode")).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "#backup_codes_enabled?" do
|
|
|
|
describe "when user does not have a second factor backup enabled" do
|
|
|
|
it "should return false" do
|
|
|
|
expect(another_user.backup_codes_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when user's second factor backup codes have been used" do
|
|
|
|
it "should return false" do
|
|
|
|
user_backup.user_second_factors.backup_codes.update_all(enabled: false)
|
|
|
|
expect(user_backup.backup_codes_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when user's second factor code is available" do
|
|
|
|
it "should return true" do
|
|
|
|
expect(user_backup.backup_codes_enabled?).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when SSO is enabled" do
|
|
|
|
it "should return false" do
|
2021-02-08 18:04:33 +08:00
|
|
|
SiteSetting.discourse_connect_url = "http://someurl.com"
|
|
|
|
SiteSetting.enable_discourse_connect = true
|
2018-06-28 16:12:32 +08:00
|
|
|
|
|
|
|
expect(user_backup.backup_codes_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "when local login is disabled" do
|
|
|
|
it "should return false" do
|
|
|
|
SiteSetting.enable_local_logins = false
|
|
|
|
|
|
|
|
expect(user_backup.backup_codes_enabled?).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-01-15 18:27:12 +08:00
|
|
|
|
|
|
|
def disable_totp
|
|
|
|
user.user_second_factors.totps.first.update!(enabled: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
def disable_security_key
|
|
|
|
user.security_keys.first.destroy!
|
|
|
|
end
|
2018-02-20 14:44:51 +08:00
|
|
|
end
|