2020-02-05 04:18:02 +07:00
|
|
|
package suites
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-08-02 13:15:38 +07:00
|
|
|
"fmt"
|
2020-02-05 04:18:02 +07:00
|
|
|
"log"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
)
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
type OneFactorOnlySuite struct {
|
2020-02-05 04:18:02 +07:00
|
|
|
suite.Suite
|
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
type OneFactorOnlyWebSuite struct {
|
2021-11-05 20:14:42 +07:00
|
|
|
*RodSuite
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
func NewOneFactorOnlyWebSuite() *OneFactorOnlyWebSuite {
|
2021-11-05 20:14:42 +07:00
|
|
|
return &OneFactorOnlyWebSuite{RodSuite: new(RodSuite)}
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) SetupSuite() {
|
2021-11-05 20:14:42 +07:00
|
|
|
browser, err := StartRod()
|
2020-02-05 04:18:02 +07:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2021-11-05 20:14:42 +07:00
|
|
|
s.RodSession = browser
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) TearDownSuite() {
|
2021-11-05 20:14:42 +07:00
|
|
|
err := s.RodSession.Stop()
|
2020-02-05 04:18:02 +07:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) SetupTest() {
|
2021-11-05 20:14:42 +07:00
|
|
|
s.Page = s.doCreateTab(s.T(), HomeBaseURL)
|
|
|
|
s.verifyIsHome(s.T(), s.Page)
|
|
|
|
}
|
2020-02-05 04:18:02 +07:00
|
|
|
|
2021-11-05 20:14:42 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) TearDownTest() {
|
|
|
|
s.collectCoverage(s.Page)
|
|
|
|
s.MustClose()
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
// No target url is provided, then the user should be redirect to the default url.
|
2020-03-06 07:31:09 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) TestShouldRedirectUserToDefaultURL() {
|
2020-02-05 04:18:02 +07:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
2021-11-05 20:14:42 +07:00
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
2020-02-05 04:18:02 +07:00
|
|
|
|
2021-11-05 20:14:42 +07:00
|
|
|
s.doLoginOneFactor(s.T(), s.Context(ctx), "john", "password", false, "")
|
|
|
|
s.verifyIsHome(s.T(), s.Context(ctx))
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Unsafe URL is provided, then the user should be redirect to the default url.
|
2020-03-06 07:31:09 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) TestShouldRedirectUserToDefaultURLWhenURLIsUnsafe() {
|
2020-02-05 04:18:02 +07:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
2021-11-05 20:14:42 +07:00
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
2020-02-05 04:18:02 +07:00
|
|
|
|
2021-11-05 20:14:42 +07:00
|
|
|
s.doLoginOneFactor(s.T(), s.Context(ctx), "john", "password", false, "http://unsafe.local")
|
|
|
|
s.verifyIsHome(s.T(), s.Context(ctx))
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
// When use logged in and visit the portal again, she gets redirect to the authenticated view.
|
2020-03-06 07:31:09 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) TestShouldDisplayAuthenticatedView() {
|
2020-02-05 04:18:02 +07:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)
|
2021-11-05 20:14:42 +07:00
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
|
|
|
|
|
|
|
s.doLoginOneFactor(s.T(), s.Context(ctx), "john", "password", false, "")
|
|
|
|
s.verifyIsHome(s.T(), s.Context(ctx))
|
|
|
|
s.doVisit(s.T(), s.Context(ctx), GetLoginBaseURL())
|
|
|
|
s.verifyIsAuthenticatedPage(s.T(), s.Context(ctx))
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
2021-08-02 13:15:38 +07:00
|
|
|
func (s *OneFactorOnlyWebSuite) TestShouldRedirectAlreadyAuthenticatedUser() {
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 20*time.Second)
|
2021-11-05 20:14:42 +07:00
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
2021-08-02 13:15:38 +07:00
|
|
|
|
2021-11-05 20:14:42 +07:00
|
|
|
s.doLoginOneFactor(s.T(), s.Context(ctx), "john", "password", false, "")
|
|
|
|
s.verifyIsHome(s.T(), s.Context(ctx))
|
2021-08-02 13:15:38 +07:00
|
|
|
|
2021-11-05 20:14:42 +07:00
|
|
|
s.doVisit(s.T(), s.Context(ctx), fmt.Sprintf("%s?rd=https://singlefactor.example.com:8080/secret.html", GetLoginBaseURL()))
|
|
|
|
s.verifySecretAuthorized(s.T(), s.Context(ctx))
|
|
|
|
s.verifyURLIs(s.T(), s.Context(ctx), "https://singlefactor.example.com:8080/secret.html")
|
2021-08-02 13:15:38 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *OneFactorOnlyWebSuite) TestShouldNotRedirectAlreadyAuthenticatedUserToUnsafeURL() {
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 20*time.Second)
|
2021-11-05 20:14:42 +07:00
|
|
|
defer func() {
|
|
|
|
cancel()
|
|
|
|
s.collectScreenshot(ctx.Err(), s.Page)
|
|
|
|
}()
|
2021-08-02 13:15:38 +07:00
|
|
|
|
2021-11-05 20:14:42 +07:00
|
|
|
s.doLoginOneFactor(s.T(), s.Context(ctx), "john", "password", false, "")
|
|
|
|
s.verifyIsHome(s.T(), s.Context(ctx))
|
2021-08-02 13:15:38 +07:00
|
|
|
|
|
|
|
// Visit the login page and wait for redirection to 2FA page with success icon displayed.
|
2021-11-05 20:14:42 +07:00
|
|
|
s.doVisit(s.T(), s.Context(ctx), fmt.Sprintf("%s?rd=https://secure.example.local:8080", GetLoginBaseURL()))
|
|
|
|
s.verifyNotificationDisplayed(s.T(), s.Context(ctx), "Redirection was determined to be unsafe and aborted. Ensure the redirection URL is correct.")
|
2021-08-02 13:15:38 +07:00
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
func (s *OneFactorOnlySuite) TestWeb() {
|
|
|
|
suite.Run(s.T(), NewOneFactorOnlyWebSuite())
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
func TestOneFactorOnlySuite(t *testing.T) {
|
2021-03-14 14:08:26 +07:00
|
|
|
if testing.Short() {
|
|
|
|
t.Skip("skipping suite test in short mode")
|
|
|
|
}
|
|
|
|
|
2020-03-06 07:31:09 +07:00
|
|
|
suite.Run(t, new(OneFactorOnlySuite))
|
2020-02-05 04:18:02 +07:00
|
|
|
}
|