mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
8aade7f40e
* added regulation validator * made regulations find_time and ban_time values duration notation strings * added DefaultRegulationConfiguration for the validator * made session expiration and inactivity values duration notation strings * TOTP period does not need to be converted because adjustment should be discouraged * moved TOTP defaults to DefaultTOTPConfiguration and removed the consts * arranged the root config validator in configuration file order * adjusted tests for the changes * moved duration notation docs to root of configuration * added references to duration notation where applicable * project wide gofmt and goimports: * run gofmt * run goimports -local github.com/authelia/authelia -w on all files * Make jwt_secret error uniform and add tests * now at 100% coverage for internal/configuration/validator/configuration.go
158 lines
4.4 KiB
Go
158 lines
4.4 KiB
Go
package handlers
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
"github.com/authelia/authelia/internal/authorization"
|
|
"github.com/authelia/authelia/internal/configuration/schema"
|
|
"github.com/authelia/authelia/internal/mocks"
|
|
)
|
|
|
|
type SecondFactorAvailableMethodsFixture struct {
|
|
suite.Suite
|
|
mock *mocks.MockAutheliaCtx
|
|
}
|
|
|
|
func (s *SecondFactorAvailableMethodsFixture) SetupTest() {
|
|
s.mock = mocks.NewMockAutheliaCtx(s.T())
|
|
s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{
|
|
DefaultPolicy: "deny",
|
|
Rules: []schema.ACLRule{},
|
|
})
|
|
}
|
|
|
|
func (s *SecondFactorAvailableMethodsFixture) TearDownTest() {
|
|
s.mock.Close()
|
|
}
|
|
|
|
func (s *SecondFactorAvailableMethodsFixture) TestShouldServeDefaultMethods() {
|
|
s.mock.Ctx.Configuration = schema.Configuration{
|
|
TOTP: &schema.TOTPConfiguration{
|
|
Period: schema.DefaultTOTPConfiguration.Period,
|
|
},
|
|
}
|
|
expectedBody := ExtendedConfigurationBody{
|
|
AvailableMethods: []string{"totp", "u2f"},
|
|
SecondFactorEnabled: false,
|
|
TOTPPeriod: schema.DefaultTOTPConfiguration.Period,
|
|
}
|
|
ExtendedConfigurationGet(s.mock.Ctx)
|
|
s.mock.Assert200OK(s.T(), expectedBody)
|
|
}
|
|
|
|
func (s *SecondFactorAvailableMethodsFixture) TestShouldServeDefaultMethodsAndMobilePush() {
|
|
s.mock.Ctx.Configuration = schema.Configuration{
|
|
DuoAPI: &schema.DuoAPIConfiguration{},
|
|
TOTP: &schema.TOTPConfiguration{
|
|
Period: schema.DefaultTOTPConfiguration.Period,
|
|
},
|
|
}
|
|
expectedBody := ExtendedConfigurationBody{
|
|
AvailableMethods: []string{"totp", "u2f", "mobile_push"},
|
|
SecondFactorEnabled: false,
|
|
TOTPPeriod: schema.DefaultTOTPConfiguration.Period,
|
|
}
|
|
ExtendedConfigurationGet(s.mock.Ctx)
|
|
s.mock.Assert200OK(s.T(), expectedBody)
|
|
}
|
|
|
|
func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsDisabledWhenNoRuleIsSetToTwoFactor() {
|
|
s.mock.Ctx.Configuration = schema.Configuration{
|
|
TOTP: &schema.TOTPConfiguration{
|
|
Period: schema.DefaultTOTPConfiguration.Period,
|
|
},
|
|
}
|
|
s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{
|
|
DefaultPolicy: "bypass",
|
|
Rules: []schema.ACLRule{
|
|
schema.ACLRule{
|
|
Domain: "example.com",
|
|
Policy: "deny",
|
|
},
|
|
schema.ACLRule{
|
|
Domain: "abc.example.com",
|
|
Policy: "single_factor",
|
|
},
|
|
schema.ACLRule{
|
|
Domain: "def.example.com",
|
|
Policy: "bypass",
|
|
},
|
|
},
|
|
})
|
|
ExtendedConfigurationGet(s.mock.Ctx)
|
|
s.mock.Assert200OK(s.T(), ExtendedConfigurationBody{
|
|
AvailableMethods: []string{"totp", "u2f"},
|
|
SecondFactorEnabled: false,
|
|
TOTPPeriod: schema.DefaultTOTPConfiguration.Period,
|
|
})
|
|
}
|
|
|
|
func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsEnabledWhenDefaultPolicySetToTwoFactor() {
|
|
s.mock.Ctx.Configuration = schema.Configuration{
|
|
TOTP: &schema.TOTPConfiguration{
|
|
Period: schema.DefaultTOTPConfiguration.Period,
|
|
},
|
|
}
|
|
s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{
|
|
DefaultPolicy: "two_factor",
|
|
Rules: []schema.ACLRule{
|
|
schema.ACLRule{
|
|
Domain: "example.com",
|
|
Policy: "deny",
|
|
},
|
|
schema.ACLRule{
|
|
Domain: "abc.example.com",
|
|
Policy: "single_factor",
|
|
},
|
|
schema.ACLRule{
|
|
Domain: "def.example.com",
|
|
Policy: "bypass",
|
|
},
|
|
},
|
|
})
|
|
ExtendedConfigurationGet(s.mock.Ctx)
|
|
s.mock.Assert200OK(s.T(), ExtendedConfigurationBody{
|
|
AvailableMethods: []string{"totp", "u2f"},
|
|
SecondFactorEnabled: true,
|
|
TOTPPeriod: schema.DefaultTOTPConfiguration.Period,
|
|
})
|
|
}
|
|
|
|
func (s *SecondFactorAvailableMethodsFixture) TestShouldCheckSecondFactorIsEnabledWhenSomePolicySetToTwoFactor() {
|
|
s.mock.Ctx.Configuration = schema.Configuration{
|
|
TOTP: &schema.TOTPConfiguration{
|
|
Period: schema.DefaultTOTPConfiguration.Period,
|
|
},
|
|
}
|
|
s.mock.Ctx.Providers.Authorizer = authorization.NewAuthorizer(schema.AccessControlConfiguration{
|
|
DefaultPolicy: "bypass",
|
|
Rules: []schema.ACLRule{
|
|
schema.ACLRule{
|
|
Domain: "example.com",
|
|
Policy: "deny",
|
|
},
|
|
schema.ACLRule{
|
|
Domain: "abc.example.com",
|
|
Policy: "two_factor",
|
|
},
|
|
schema.ACLRule{
|
|
Domain: "def.example.com",
|
|
Policy: "bypass",
|
|
},
|
|
},
|
|
})
|
|
ExtendedConfigurationGet(s.mock.Ctx)
|
|
s.mock.Assert200OK(s.T(), ExtendedConfigurationBody{
|
|
AvailableMethods: []string{"totp", "u2f"},
|
|
SecondFactorEnabled: true,
|
|
TOTPPeriod: schema.DefaultTOTPConfiguration.Period,
|
|
})
|
|
}
|
|
|
|
func TestRunSuite(t *testing.T) {
|
|
s := new(SecondFactorAvailableMethodsFixture)
|
|
suite.Run(t, s)
|
|
}
|