package handlers import ( "encoding/json" "regexp" "testing" "github.com/golang/mock/gomock" "github.com/stretchr/testify/suite" "github.com/tstranex/u2f" "github.com/authelia/authelia/internal/mocks" "github.com/authelia/authelia/internal/session" ) type HandlerSignTOTPSuite struct { suite.Suite mock *mocks.MockAutheliaCtx } func (s *HandlerSignTOTPSuite) SetupTest() { s.mock = mocks.NewMockAutheliaCtx(s.T()) userSession := s.mock.Ctx.GetSession() userSession.Username = testUsername userSession.U2FChallenge = &u2f.Challenge{} userSession.U2FRegistration = &session.U2FRegistration{} s.mock.Ctx.SaveSession(userSession) //nolint:errcheck // TODO: Legacy code, consider refactoring time permitting. } func (s *HandlerSignTOTPSuite) TearDownTest() { s.mock.Close() } func (s *HandlerSignTOTPSuite) TestShouldRedirectUserToDefaultURL() { verifier := NewMockTOTPVerifier(s.mock.Ctrl) s.mock.StorageProviderMock.EXPECT(). LoadTOTPSecret(gomock.Any()). Return("secret", nil) verifier.EXPECT(). Verify(gomock.Eq("abc"), gomock.Eq("secret")). Return(true, nil) s.mock.Ctx.Configuration.DefaultRedirectionURL = testRedirectionURL bodyBytes, err := json.Marshal(signTOTPRequestBody{ Token: "abc", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) SecondFactorTOTPPost(verifier)(s.mock.Ctx) s.mock.Assert200OK(s.T(), redirectResponse{ Redirect: testRedirectionURL, }) } func (s *HandlerSignTOTPSuite) TestShouldNotReturnRedirectURL() { verifier := NewMockTOTPVerifier(s.mock.Ctrl) s.mock.StorageProviderMock.EXPECT(). LoadTOTPSecret(gomock.Any()). Return("secret", nil) verifier.EXPECT(). Verify(gomock.Eq("abc"), gomock.Eq("secret")). Return(true, nil) bodyBytes, err := json.Marshal(signTOTPRequestBody{ Token: "abc", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) SecondFactorTOTPPost(verifier)(s.mock.Ctx) s.mock.Assert200OK(s.T(), nil) } func (s *HandlerSignTOTPSuite) TestShouldRedirectUserToSafeTargetURL() { verifier := NewMockTOTPVerifier(s.mock.Ctrl) s.mock.StorageProviderMock.EXPECT(). LoadTOTPSecret(gomock.Any()). Return("secret", nil) verifier.EXPECT(). Verify(gomock.Eq("abc"), gomock.Eq("secret")). Return(true, nil) bodyBytes, err := json.Marshal(signTOTPRequestBody{ Token: "abc", TargetURL: "https://mydomain.local", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) SecondFactorTOTPPost(verifier)(s.mock.Ctx) s.mock.Assert200OK(s.T(), redirectResponse{ Redirect: "https://mydomain.local", }) } func (s *HandlerSignTOTPSuite) TestShouldNotRedirectToUnsafeURL() { verifier := NewMockTOTPVerifier(s.mock.Ctrl) s.mock.StorageProviderMock.EXPECT(). LoadTOTPSecret(gomock.Any()). Return("secret", nil) verifier.EXPECT(). Verify(gomock.Eq("abc"), gomock.Eq("secret")). Return(true, nil) bodyBytes, err := json.Marshal(signTOTPRequestBody{ Token: "abc", TargetURL: "http://mydomain.local", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) SecondFactorTOTPPost(verifier)(s.mock.Ctx) s.mock.Assert200OK(s.T(), nil) } func (s *HandlerSignTOTPSuite) TestShouldRegenerateSessionForPreventingSessionFixation() { verifier := NewMockTOTPVerifier(s.mock.Ctrl) s.mock.StorageProviderMock.EXPECT(). LoadTOTPSecret(gomock.Any()). Return("secret", nil) verifier.EXPECT(). Verify(gomock.Eq("abc"), gomock.Eq("secret")). Return(true, nil) bodyBytes, err := json.Marshal(signTOTPRequestBody{ Token: "abc", }) s.Require().NoError(err) s.mock.Ctx.Request.SetBody(bodyBytes) r := regexp.MustCompile("^authelia_session=(.*); path=") res := r.FindAllStringSubmatch(string(s.mock.Ctx.Response.Header.PeekCookie("authelia_session")), -1) SecondFactorTOTPPost(verifier)(s.mock.Ctx) s.mock.Assert200OK(s.T(), nil) s.Assert().NotEqual( res[0][1], string(s.mock.Ctx.Request.Header.Cookie("authelia_session"))) } func TestRunHandlerSignTOTPSuite(t *testing.T) { suite.Run(t, new(HandlerSignTOTPSuite)) }