mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
267 lines
7.8 KiB
JavaScript
267 lines
7.8 KiB
JavaScript
|
||
var server = require('../../src/lib/server');
|
||
|
||
var Promise = require('bluebird');
|
||
var request = Promise.promisifyAll(require('request'));
|
||
var assert = require('assert');
|
||
var speakeasy = require('speakeasy');
|
||
var sinon = require('sinon');
|
||
|
||
var PORT = 8090;
|
||
var BASE_URL = 'http://localhost:' + PORT;
|
||
var requests = require('./requests')(PORT);
|
||
|
||
describe('test the server', function() {
|
||
var _server
|
||
var deps;
|
||
var u2f, nedb;
|
||
var transporter;
|
||
var collection;
|
||
var ldap_client = {
|
||
bind: sinon.stub(),
|
||
search: sinon.stub(),
|
||
modify: sinon.stub(),
|
||
};
|
||
var ldap = {
|
||
Change: sinon.spy()
|
||
}
|
||
|
||
beforeEach(function(done) {
|
||
var config = {
|
||
port: PORT,
|
||
totp_secret: 'totp_secret',
|
||
ldap_url: 'ldap://127.0.0.1:389',
|
||
ldap_users_dn: 'ou=users,dc=example,dc=com',
|
||
ldap_user: 'cn=admin,dc=example,dc=com',
|
||
ldap_password: 'password',
|
||
session_secret: 'session_secret',
|
||
session_max_age: 50000,
|
||
gmail: {
|
||
user: 'user@example.com',
|
||
pass: 'password'
|
||
}
|
||
};
|
||
|
||
u2f = {};
|
||
u2f.startRegistration = sinon.stub();
|
||
u2f.finishRegistration = sinon.stub();
|
||
u2f.startAuthentication = sinon.stub();
|
||
u2f.finishAuthentication = sinon.stub();
|
||
|
||
collection = {};
|
||
collection.insert = sinon.stub().yields(undefined, 1);
|
||
collection.findOne = sinon.stub().yields(undefined, {});
|
||
collection.update = sinon.stub().yields(undefined, {});
|
||
collection.remove = sinon.stub().yields(undefined, 1);
|
||
nedb = sinon.spy(function() {
|
||
return collection;
|
||
});
|
||
|
||
transporter = {};
|
||
transporter.sendMail = sinon.stub().yields();
|
||
|
||
var nodemailer = {};
|
||
nodemailer.createTransport = sinon.spy(function() {
|
||
return transporter;
|
||
});
|
||
|
||
var search_doc = {
|
||
object: {
|
||
mail: 'test_ok@example.com'
|
||
}
|
||
};
|
||
|
||
var search_res = {};
|
||
search_res.on = sinon.spy(function(event, fn) {
|
||
if(event != 'error') fn(search_doc);
|
||
});
|
||
|
||
ldap_client.bind.withArgs('cn=test_ok,ou=users,dc=example,dc=com',
|
||
'password').yields(undefined);
|
||
ldap_client.bind.withArgs('cn=admin,dc=example,dc=com',
|
||
'password').yields(undefined);
|
||
ldap_client.search.yields(undefined, search_res);
|
||
ldap_client.bind.withArgs('cn=test_nok,ou=users,dc=example,dc=com',
|
||
'password').yields('error');
|
||
ldap_client.modify.yields(undefined);
|
||
|
||
var deps = {};
|
||
deps.u2f = u2f;
|
||
deps.nedb = nedb;
|
||
deps.nodemailer = nodemailer;
|
||
deps.ldap = ldap;
|
||
|
||
_server = server.run(config, ldap_client, deps, function() {
|
||
done();
|
||
});
|
||
});
|
||
|
||
afterEach(function() {
|
||
_server.close();
|
||
});
|
||
|
||
describe('test GET /login', function() {
|
||
test_login()
|
||
});
|
||
|
||
describe('test GET /logout', function() {
|
||
test_logout()
|
||
});
|
||
|
||
describe('test authentication and verification', function() {
|
||
test_authentication();
|
||
test_reset_password();
|
||
});
|
||
|
||
function test_login() {
|
||
it('should serve the login page', function(done) {
|
||
request.getAsync(BASE_URL + '/authentication/login')
|
||
.then(function(response) {
|
||
assert.equal(response.statusCode, 200);
|
||
done();
|
||
});
|
||
});
|
||
}
|
||
|
||
function test_logout() {
|
||
it('should logout and redirect to /', function(done) {
|
||
request.getAsync(BASE_URL + '/authentication/logout')
|
||
.then(function(response) {
|
||
assert.equal(response.req.path, '/');
|
||
done();
|
||
});
|
||
});
|
||
}
|
||
|
||
function test_authentication() {
|
||
it('should return status code 401 when user is not authenticated', function() {
|
||
return request.getAsync({ url: BASE_URL + '/authentication/verify' })
|
||
.then(function(response) {
|
||
assert.equal(response.statusCode, 401);
|
||
return Promise.resolve();
|
||
});
|
||
});
|
||
|
||
it('should return status code 204 when user is authenticated using totp', function() {
|
||
var real_token = speakeasy.totp({
|
||
secret: 'totp_secret',
|
||
encoding: 'base32'
|
||
});
|
||
var j = request.jar();
|
||
return requests.login(j)
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 200, 'get login page failed');
|
||
return requests.first_factor(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'first factor failed');
|
||
return requests.totp(j, real_token);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'second factor failed');
|
||
return requests.verify(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'verify failed');
|
||
return Promise.resolve();
|
||
});
|
||
});
|
||
|
||
it('should keep session variables when login page is reloaded', function() {
|
||
var real_token = speakeasy.totp({
|
||
secret: 'totp_secret',
|
||
encoding: 'base32'
|
||
});
|
||
var j = request.jar();
|
||
return requests.login(j)
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 200, 'get login page failed');
|
||
return requests.first_factor(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'first factor failed');
|
||
return requests.totp(j, real_token);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'second factor failed');
|
||
return requests.login(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 200, 'login page loading failed');
|
||
return requests.verify(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'verify failed');
|
||
return Promise.resolve();
|
||
})
|
||
.catch(function(err) {
|
||
console.error(err);
|
||
});
|
||
});
|
||
|
||
it('should return status code 204 when user is authenticated using u2f', function() {
|
||
var sign_request = {};
|
||
var sign_status = {};
|
||
var registration_request = {};
|
||
var registration_status = {};
|
||
u2f.startRegistration.returns(Promise.resolve(sign_request));
|
||
u2f.finishRegistration.returns(Promise.resolve(sign_status));
|
||
u2f.startAuthentication.returns(Promise.resolve(registration_request));
|
||
u2f.finishAuthentication.returns(Promise.resolve(registration_status));
|
||
|
||
collection.insert = sinon.spy(function(data, fn) {
|
||
collection.findOne.yields(undefined, data);
|
||
fn();
|
||
});
|
||
|
||
var j = request.jar();
|
||
return requests.login(j)
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 200, 'get login page failed');
|
||
return requests.first_factor(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'first factor failed');
|
||
return requests.u2f_registration(j, transporter);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'second factor, finish register failed');
|
||
return requests.u2f_authentication(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'second factor, finish sign failed');
|
||
return requests.verify(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'verify failed');
|
||
return Promise.resolve();
|
||
});
|
||
});
|
||
}
|
||
|
||
function test_reset_password() {
|
||
it('should reset the password', function() {
|
||
collection.insert = sinon.spy(function(data, fn) {
|
||
collection.findOne.yields(undefined, data);
|
||
fn();
|
||
});
|
||
|
||
var j = request.jar();
|
||
return requests.login(j)
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 200, 'get login page failed');
|
||
return requests.first_factor(j);
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'first factor failed');
|
||
return requests.reset_password(j, transporter, 'user', 'new-password');
|
||
})
|
||
.then(function(res) {
|
||
assert.equal(res.statusCode, 204, 'second factor, finish register failed');
|
||
return Promise.resolve();
|
||
});
|
||
});
|
||
}
|
||
});
|
||
|