mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
b4e570358e
* build: include major in go.mod module directive * fix: xflags * revert: cobra changes * fix: mock doc
157 lines
4.6 KiB
Go
157 lines
4.6 KiB
Go
package session
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/valyala/fasthttp"
|
|
|
|
"github.com/authelia/authelia/v4/internal/authentication"
|
|
"github.com/authelia/authelia/v4/internal/authorization"
|
|
"github.com/authelia/authelia/v4/internal/configuration/schema"
|
|
)
|
|
|
|
func TestShouldInitializerSession(t *testing.T) {
|
|
ctx := &fasthttp.RequestCtx{}
|
|
configuration := schema.SessionConfiguration{}
|
|
configuration.Domain = testDomain
|
|
configuration.Name = testName
|
|
configuration.Expiration = testExpiration
|
|
|
|
provider := NewProvider(configuration, nil)
|
|
session, err := provider.GetSession(ctx)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, NewDefaultUserSession(), session)
|
|
}
|
|
|
|
func TestShouldUpdateSession(t *testing.T) {
|
|
ctx := &fasthttp.RequestCtx{}
|
|
|
|
configuration := schema.SessionConfiguration{}
|
|
configuration.Domain = testDomain
|
|
configuration.Name = testName
|
|
configuration.Expiration = testExpiration
|
|
|
|
provider := NewProvider(configuration, nil)
|
|
session, _ := provider.GetSession(ctx)
|
|
|
|
session.Username = testUsername
|
|
session.AuthenticationLevel = authentication.TwoFactor
|
|
|
|
err := provider.SaveSession(ctx, session)
|
|
require.NoError(t, err)
|
|
|
|
session, err = provider.GetSession(ctx)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, UserSession{
|
|
Username: testUsername,
|
|
AuthenticationLevel: authentication.TwoFactor,
|
|
}, session)
|
|
}
|
|
|
|
func TestShouldSetSessionAuthenticationLevels(t *testing.T) {
|
|
ctx := &fasthttp.RequestCtx{}
|
|
configuration := schema.SessionConfiguration{}
|
|
|
|
timeOneFactor := time.Unix(1625048140, 0)
|
|
timeTwoFactor := time.Unix(1625048150, 0)
|
|
timeZeroFactor := time.Unix(0, 0)
|
|
|
|
configuration.Domain = testDomain
|
|
configuration.Name = testName
|
|
configuration.Expiration = testExpiration
|
|
|
|
provider := NewProvider(configuration, nil)
|
|
session, _ := provider.GetSession(ctx)
|
|
|
|
session.SetOneFactor(timeOneFactor, &authentication.UserDetails{Username: testUsername}, false)
|
|
|
|
err := provider.SaveSession(ctx, session)
|
|
require.NoError(t, err)
|
|
|
|
session, err = provider.GetSession(ctx)
|
|
require.NoError(t, err)
|
|
|
|
authAt, err := session.AuthenticatedTime(authorization.OneFactor)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, timeOneFactor, authAt)
|
|
|
|
authAt, err = session.AuthenticatedTime(authorization.TwoFactor)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, timeZeroFactor, authAt)
|
|
|
|
authAt, err = session.AuthenticatedTime(authorization.Denied)
|
|
assert.EqualError(t, err, "invalid authorization level")
|
|
assert.Equal(t, timeZeroFactor, authAt)
|
|
|
|
assert.Equal(t, UserSession{
|
|
Username: testUsername,
|
|
AuthenticationLevel: authentication.OneFactor,
|
|
LastActivity: timeOneFactor.Unix(),
|
|
FirstFactorAuthnTimestamp: timeOneFactor.Unix(),
|
|
}, session)
|
|
|
|
session.SetTwoFactor(timeTwoFactor)
|
|
|
|
err = provider.SaveSession(ctx, session)
|
|
require.NoError(t, err)
|
|
|
|
session, err = provider.GetSession(ctx)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, UserSession{
|
|
Username: testUsername,
|
|
AuthenticationLevel: authentication.TwoFactor,
|
|
LastActivity: timeTwoFactor.Unix(),
|
|
FirstFactorAuthnTimestamp: timeOneFactor.Unix(),
|
|
SecondFactorAuthnTimestamp: timeTwoFactor.Unix(),
|
|
}, session)
|
|
|
|
authAt, err = session.AuthenticatedTime(authorization.OneFactor)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, timeOneFactor, authAt)
|
|
|
|
authAt, err = session.AuthenticatedTime(authorization.TwoFactor)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, timeTwoFactor, authAt)
|
|
|
|
authAt, err = session.AuthenticatedTime(authorization.Denied)
|
|
assert.EqualError(t, err, "invalid authorization level")
|
|
assert.Equal(t, timeZeroFactor, authAt)
|
|
}
|
|
|
|
func TestShouldDestroySessionAndWipeSessionData(t *testing.T) {
|
|
ctx := &fasthttp.RequestCtx{}
|
|
configuration := schema.SessionConfiguration{}
|
|
configuration.Domain = testDomain
|
|
configuration.Name = testName
|
|
configuration.Expiration = testExpiration
|
|
|
|
provider := NewProvider(configuration, nil)
|
|
session, err := provider.GetSession(ctx)
|
|
require.NoError(t, err)
|
|
|
|
session.Username = testUsername
|
|
session.AuthenticationLevel = authentication.TwoFactor
|
|
|
|
err = provider.SaveSession(ctx, session)
|
|
require.NoError(t, err)
|
|
|
|
newUserSession, err := provider.GetSession(ctx)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, testUsername, newUserSession.Username)
|
|
assert.Equal(t, authentication.TwoFactor, newUserSession.AuthenticationLevel)
|
|
|
|
err = provider.DestroySession(ctx)
|
|
require.NoError(t, err)
|
|
|
|
newUserSession, err = provider.GetSession(ctx)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, "", newUserSession.Username)
|
|
assert.Equal(t, authentication.NotAuthenticated, newUserSession.AuthenticationLevel)
|
|
}
|