2019-11-02 14:32:58 +00:00
|
|
|
package suites
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2023-01-25 09:36:40 +00:00
|
|
|
"net/url"
|
|
|
|
"regexp"
|
2019-11-02 14:32:58 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
)
|
|
|
|
|
|
|
|
type TwoFactorSuite struct {
|
2021-11-05 13:14:42 +00:00
|
|
|
*RodSuite
|
2022-12-07 09:22:03 +00:00
|
|
|
|
|
|
|
secret string
|
2019-11-02 14:32:58 +00:00
|
|
|
}
|
|
|
|
|
2022-05-04 01:01:36 +00:00
|
|
|
func New2FAScenario() *TwoFactorSuite {
|
2019-11-02 14:32:58 +00:00
|
|
|
return &TwoFactorSuite{
|
2023-01-25 04:11:05 +00:00
|
|
|
RodSuite: NewRodSuite(""),
|
2019-11-02 14:32:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TwoFactorSuite) SetupSuite() {
|
2021-11-05 13:14:42 +00:00
|
|
|
browser, err := StartRod()
|
2019-11-02 14:32:58 +00:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-11-05 13:14:42 +00:00
|
|
|
s.RodSession = browser
|
2022-12-07 09:22:03 +00:00
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
|
|
|
|
s.collectCoverage(s.Page)
|
|
|
|
s.MustClose()
|
|
|
|
}()
|
|
|
|
|
|
|
|
s.Page = s.doCreateTab(s.T(), HomeBaseURL)
|
|
|
|
s.secret = s.doLoginAndRegisterTOTP(s.T(), s.Context(ctx), "john", "password", false)
|
2019-11-02 14:32:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TwoFactorSuite) TearDownSuite() {
|
2021-11-05 13:14:42 +00:00
|
|
|
err := s.RodSession.Stop()
|
2019-11-02 14:32:58 +00:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TwoFactorSuite) SetupTest() {
|
2021-11-05 13:14:42 +00:00
|
|
|
s.Page = s.doCreateTab(s.T(), HomeBaseURL)
|
|
|
|
s.verifyIsHome(s.T(), s.Page)
|
|
|
|
}
|
2019-11-02 14:32:58 +00:00
|
|
|
|
2021-11-05 13:14:42 +00:00
|
|
|
func (s *TwoFactorSuite) TearDownTest() {
|
|
|
|
s.collectCoverage(s.Page)
|
|
|
|
s.MustClose()
|
2019-11-02 14:32:58 +00:00
|
|
|
}
|
|
|
|
|
2023-01-25 09:36:40 +00:00
|
|
|
func (s *TwoFactorSuite) TestShouldNotAuthorizeSecretBeforeTwoFactor() {
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 60*time.Second)
|
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
|
|
|
|
|
|
|
targetURL := fmt.Sprintf("%s/secret.html", AdminBaseURL)
|
|
|
|
|
|
|
|
s.doVisit(s.T(), s.Context(ctx), targetURL)
|
|
|
|
|
|
|
|
s.verifyIsFirstFactorPage(s.T(), s.Context(ctx))
|
|
|
|
|
|
|
|
raw := GetLoginBaseURLWithFallbackPrefix(BaseDomain, "/")
|
|
|
|
|
|
|
|
expected, err := url.ParseRequestURI(raw)
|
|
|
|
s.Assert().NoError(err)
|
|
|
|
s.Require().NotNil(expected)
|
|
|
|
|
|
|
|
query := expected.Query()
|
|
|
|
|
|
|
|
query.Set("rd", targetURL)
|
|
|
|
|
|
|
|
expected.RawQuery = query.Encode()
|
|
|
|
|
|
|
|
rx := regexp.MustCompile(fmt.Sprintf(`^%s(&rm=GET)?$`, regexp.QuoteMeta(expected.String())))
|
|
|
|
|
|
|
|
s.verifyURLIsRegexp(s.T(), s.Context(ctx), rx)
|
|
|
|
}
|
|
|
|
|
2019-11-02 14:32:58 +00:00
|
|
|
func (s *TwoFactorSuite) TestShouldAuthorizeSecretAfterTwoFactor() {
|
2021-11-05 13:14:42 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 60*time.Second)
|
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
2019-11-02 14:32:58 +00:00
|
|
|
|
2020-05-02 16:20:40 +00:00
|
|
|
username := testUsername
|
|
|
|
password := testPassword
|
2019-12-07 17:14:26 +00:00
|
|
|
|
2022-01-31 05:25:15 +00:00
|
|
|
// Login and register TOTP, logout and login again with 1FA & 2FA.
|
2019-11-02 14:32:58 +00:00
|
|
|
targetURL := fmt.Sprintf("%s/secret.html", AdminBaseURL)
|
2022-12-07 09:22:03 +00:00
|
|
|
s.doLoginTwoFactor(s.T(), s.Context(ctx), username, password, false, s.secret, targetURL)
|
2019-12-07 17:14:26 +00:00
|
|
|
|
|
|
|
// And check if the user is redirected to the secret.
|
2021-11-05 13:14:42 +00:00
|
|
|
s.verifySecretAuthorized(s.T(), s.Context(ctx))
|
2019-11-24 20:27:59 +00:00
|
|
|
|
2022-01-31 05:25:15 +00:00
|
|
|
// Leave the secret.
|
2021-11-05 13:14:42 +00:00
|
|
|
s.doVisit(s.T(), s.Context(ctx), HomeBaseURL)
|
|
|
|
s.verifyIsHome(s.T(), s.Context(ctx))
|
2019-11-24 20:27:59 +00:00
|
|
|
|
2022-01-31 05:25:15 +00:00
|
|
|
// And try to reload it again to check the session is kept.
|
2021-11-05 13:14:42 +00:00
|
|
|
s.doVisit(s.T(), s.Context(ctx), targetURL)
|
|
|
|
s.verifySecretAuthorized(s.T(), s.Context(ctx))
|
2019-11-24 20:27:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TwoFactorSuite) TestShouldFailTwoFactor() {
|
2023-01-12 10:57:44 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 25*time.Second)
|
2021-11-05 13:14:42 +00:00
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
2019-11-24 20:27:59 +00:00
|
|
|
|
|
|
|
wrongPasscode := "123456"
|
2020-05-05 19:35:32 +00:00
|
|
|
|
2023-01-12 10:57:44 +00:00
|
|
|
s.doLoginOneFactor(s.T(), s.Context(ctx), testUsername, testPassword, false, BaseDomain, "")
|
2021-11-05 13:14:42 +00:00
|
|
|
s.verifyIsSecondFactorPage(s.T(), s.Context(ctx))
|
|
|
|
s.doEnterOTP(s.T(), s.Context(ctx), wrongPasscode)
|
|
|
|
s.verifyNotificationDisplayed(s.T(), s.Context(ctx), "The one-time password might be wrong")
|
2019-11-02 14:32:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestRunTwoFactor(t *testing.T) {
|
2021-03-14 07:08:26 +00:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("skipping suite test in short mode")
|
|
|
|
}
|
|
|
|
|
2022-05-04 01:01:36 +00:00
|
|
|
suite.Run(t, New2FAScenario())
|
2019-11-02 14:32:58 +00:00
|
|
|
}
|