authelia/test/suites/high-availability/scenarii/AccessControl.ts

118 lines
5.6 KiB
TypeScript
Raw Normal View History

2019-02-09 22:20:37 +00:00
import LoginAndRegisterTotp from "../../../helpers/LoginAndRegisterTotp";
import VerifySecretObserved from "../../../helpers/assertions/VerifySecretObserved";
2019-02-09 22:20:37 +00:00
import WithDriver from "../../../helpers/context/WithDriver";
import FillLoginPageAndClick from "../../../helpers/FillLoginPageAndClick";
import ValidateTotp from "../../../helpers/ValidateTotp";
import Logout from "../../../helpers/Logout";
import VisitPageAndWaitUrlIs from "../../../helpers/behaviors/VisitPageAndWaitUrlIs";
import VerifyBodyContains from "../../../helpers/assertions/VerifyBodyContains";
import VerifyIsSecondFactorStage from "../../../helpers/assertions/VerifyIsSecondFactorStage";
import VerifyUrlIs from "../../../helpers/assertions/VerifyUrlIs";
2019-02-09 22:20:37 +00:00
async function ShouldHaveAccessTo(url: string) {
it('should have access to ' + url, async function() {
await VisitPageAndWaitUrlIs(this.driver, url);
await VerifySecretObserved(this.driver);
2019-02-09 22:20:37 +00:00
})
}
async function ShouldNotHaveAccessTo(url: string) {
it('should not have access to ' + url, async function() {
await VisitPageAndWaitUrlIs(this.driver, url);
await VerifyBodyContains(this.driver, "403 Forbidden");
2019-02-09 22:20:37 +00:00
})
}
// we verify that the user has only access to want he is granted to.
export default function() {
// We ensure that bob has access to what he is granted to
describe('Permissions of user john', function() {
after(async function() {
await Logout(this.driver);
})
WithDriver();
before(async function() {
const secret = await LoginAndRegisterTotp(this.driver, "john", "password", true);
await VisitPageAndWaitUrlIs(this.driver, 'https://login.example.com:8080/#/');
2019-02-09 22:20:37 +00:00
await FillLoginPageAndClick(this.driver, 'john', 'password', false);
await ValidateTotp(this.driver, secret);
// Default URL in conf is home.
await VerifyUrlIs(this.driver, 'https://home.example.com:8080/');
2019-02-09 22:20:37 +00:00
})
ShouldHaveAccessTo('https://public.example.com:8080/secret.html');
ShouldHaveAccessTo('https://secure.example.com:8080/secret.html');
2019-02-09 22:20:37 +00:00
ShouldHaveAccessTo('https://dev.example.com:8080/groups/admin/secret.html');
ShouldHaveAccessTo('https://dev.example.com:8080/groups/dev/secret.html');
ShouldHaveAccessTo('https://dev.example.com:8080/users/john/secret.html');
ShouldHaveAccessTo('https://dev.example.com:8080/users/harry/secret.html');
ShouldHaveAccessTo('https://dev.example.com:8080/users/bob/secret.html');
ShouldHaveAccessTo('https://admin.example.com:8080/secret.html');
ShouldHaveAccessTo('https://mx1.mail.example.com:8080/secret.html');
ShouldHaveAccessTo('https://singlefactor.example.com:8080/secret.html');
2019-02-09 22:20:37 +00:00
ShouldNotHaveAccessTo('https://mx2.mail.example.com:8080/secret.html');
})
// We ensure that bob has access to what he is granted to
describe('Permissions of user bob', function() {
after(async function() {
await Logout(this.driver);
})
WithDriver();
before(async function() {
const secret = await LoginAndRegisterTotp(this.driver, "bob", "password", true);
await VisitPageAndWaitUrlIs(this.driver, 'https://login.example.com:8080/#/');
2019-02-09 22:20:37 +00:00
await FillLoginPageAndClick(this.driver, 'bob', 'password', false);
await ValidateTotp(this.driver, secret);
// Default URL in conf is home.
await VerifyUrlIs(this.driver, 'https://home.example.com:8080/');
2019-02-09 22:20:37 +00:00
})
ShouldHaveAccessTo('https://public.example.com:8080/secret.html');
ShouldHaveAccessTo('https://secure.example.com:8080/secret.html');
2019-02-09 22:20:37 +00:00
ShouldNotHaveAccessTo('https://dev.example.com:8080/groups/admin/secret.html');
ShouldHaveAccessTo('https://dev.example.com:8080/groups/dev/secret.html');
ShouldNotHaveAccessTo('https://dev.example.com:8080/users/john/secret.html');
ShouldNotHaveAccessTo('https://dev.example.com:8080/users/harry/secret.html');
ShouldHaveAccessTo('https://dev.example.com:8080/users/bob/secret.html');
ShouldNotHaveAccessTo('https://admin.example.com:8080/secret.html');
ShouldHaveAccessTo('https://mx1.mail.example.com:8080/secret.html');
ShouldHaveAccessTo('https://singlefactor.example.com:8080/secret.html');
2019-02-09 22:20:37 +00:00
ShouldHaveAccessTo('https://mx2.mail.example.com:8080/secret.html');
})
// We ensure that harry has access to what he is granted to
describe('Permissions of user harry', function() {
after(async function() {
await Logout(this.driver);
})
WithDriver();
before(async function() {
const secret = await LoginAndRegisterTotp(this.driver, "harry", "password", true);
await VisitPageAndWaitUrlIs(this.driver, 'https://login.example.com:8080/#/');
2019-02-09 22:20:37 +00:00
await FillLoginPageAndClick(this.driver, 'harry', 'password', false);
await ValidateTotp(this.driver, secret);
// Default URL in conf is home.
await VerifyUrlIs(this.driver, 'https://home.example.com:8080/');
2019-02-09 22:20:37 +00:00
})
ShouldHaveAccessTo('https://public.example.com:8080/secret.html');
ShouldHaveAccessTo('https://secure.example.com:8080/secret.html');
2019-02-09 22:20:37 +00:00
ShouldNotHaveAccessTo('https://dev.example.com:8080/groups/admin/secret.html');
ShouldNotHaveAccessTo('https://dev.example.com:8080/groups/dev/secret.html');
ShouldNotHaveAccessTo('https://dev.example.com:8080/users/john/secret.html');
ShouldHaveAccessTo('https://dev.example.com:8080/users/harry/secret.html');
ShouldNotHaveAccessTo('https://dev.example.com:8080/users/bob/secret.html');
ShouldNotHaveAccessTo('https://admin.example.com:8080/secret.html');
ShouldNotHaveAccessTo('https://mx1.mail.example.com:8080/secret.html');
ShouldHaveAccessTo('https://singlefactor.example.com:8080/secret.html');
2019-02-09 22:20:37 +00:00
ShouldNotHaveAccessTo('https://mx2.mail.example.com:8080/secret.html');
})
}