Koha/t/db_dependent/api/v1/two_factor_auth.t
Marcel de Rooy 17c504f54f
Bug 30588: (QA follow-up) Remove erroneous FIXME
Comment speaks for itself. Look at surrounding code.

Signed-off-by: Marcel de Rooy <m.de.rooy@rijksmuseum.nl>

Signed-off-by: Nick Clemens <nick@bywatersolutions.com>
Signed-off-by: Tomas Cohen Arazi <tomascohen@theke.io>
2022-10-21 11:36:59 -03:00

235 lines
8.3 KiB
Perl
Executable file

#!/usr/bin/env perl
# This file is part of Koha.
#
# Koha is free software; you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# Koha is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Koha; if not, see <http://www.gnu.org/licenses>.
use Modern::Perl;
use Test::More tests => 2;
use Test::Mojo;
use Test::MockModule;
use t::lib::TestBuilder;
use t::lib::Mocks;
use Koha::Database;
my $schema = Koha::Database->new->schema;
my $builder = t::lib::TestBuilder->new;
# FIXME: sessionStorage defaults to mysql, but it seems to break transaction handling
# this affects the other REST api tests
t::lib::Mocks::mock_preference( 'SessionStorage', 'tmp' );
my $remote_address = '127.0.0.1';
my $t = Test::Mojo->new('Koha::REST::V1');
my $mocked_koha_email = Test::MockModule->new('Koha::Email');
$mocked_koha_email->mock( 'send_or_die', sub {
return 1;
});
subtest 'registration and verification' => sub {
plan tests => 22;
$schema->storage->txn_begin;
t::lib::Mocks::mock_preference('TwoFactorAuthentication', 'enabled');
my $patron = $builder->build_object(
{
class => 'Koha::Patrons',
value => {
flags => 20, # Staff access and Patron info
}
}
);
# Not authenticated yet - 401
my $session = C4::Auth::get_session('');
$session->param( 'ip', '127.0.0.1' );
$session->param( 'lasttime', time() );
$session->flush;
my $tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(401);
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration/verification" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(401);
# Authenticated - can register
$session->param( 'number', $patron->borrowernumber );
$session->param( 'id', $patron->userid );
$session->flush;
$patron->auth_method('password');
$patron->secret(undef);
$patron->store;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(201);
my $secret32 = $t->tx->res->json->{secret32};
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration/verification" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(400); # Missing parameter
my $auth = Koha::Auth::TwoFactorAuth->new({patron => $patron, secret32 => $secret32});
my $pin_code = $auth->code;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration/verification" => form => {secret32 => $secret32, pin_code => $pin_code} );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(204);
$patron = $patron->get_from_storage;
is($patron->auth_method, 'two-factor');
isnt($patron->secret, undef);
$patron->auth_method('password');
$patron->secret(undef);
$patron->store;
# Setting up 2FA - can register
$session->param('waiting-for-2FA-setup', 1);
$session->flush;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(201);
$secret32 = $t->tx->res->json->{secret32};
$auth = Koha::Auth::TwoFactorAuth->new({patron => $patron, secret32 => $secret32});
$pin_code = $auth->code;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration/verification" => form => {secret32 => $secret32, pin_code => $pin_code} );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(204);
$patron = $patron->get_from_storage;
is($patron->auth_method, 'two-factor');
isnt($patron->secret, undef);
# 2FA already enabled - cannot register again
$patron->auth_method('two-factor');
$patron->encode_secret("nv4v65dpobpxgzldojsxiii");
$patron->store;
$session->param('waiting-for-2FA-setup', undef);
$session->flush;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(401);
$tx = $t->ua->build_tx( POST => "/api/v1/auth/two-factor/registration/verification" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(401);
$schema->storage->txn_rollback;
};
subtest 'send_otp_token' => sub {
plan tests => 11;
$schema->storage->txn_begin;
t::lib::Mocks::mock_preference('TwoFactorAuthentication', 'enabled');
my $patron = $builder->build_object(
{
class => 'Koha::Patrons',
value => {
flags => 20, # Staff access and Patron info
}
}
);
my $session = C4::Auth::get_session('');
$session->param( 'ip', '127.0.0.1' );
$session->param( 'lasttime', time() );
$session->flush;
my $tx = $t->ua->build_tx( POST => "/api/v1/auth/otp/token_delivery" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
# Session is still anonymous, no borrowernumber yet: Unauthorized
$t->request_ok($tx)->status_is(401);
# Patron is partially authenticated (credentials correct)
$session->param( 'number', $patron->borrowernumber );
$session->param( 'id', $patron->userid );
$session->param('waiting-for-2FA', 1);
$session->flush;
$patron->library->set(
{
branchemail => 'from@example.org',
branchreturnpath => undef,
branchreplyto => undef,
}
)->store;
$patron->auth_method('two-factor');
$patron->encode_secret("nv4v65dpobpxgzldojsxiii");
$patron->email(undef);
$patron->store;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/otp/token_delivery" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
# Invalid email
$t->request_ok($tx)->status_is(400)->json_is({ error => 'email_not_sent' });
$patron->email('to@example.org')->store;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/otp/token_delivery" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
# Everything is ok, the email will be sent
$t->request_ok($tx)->status_is(200);
# Change flags: not enough authorization anymore
$patron->flags(16)->store;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/otp/token_delivery" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(403);
$patron->flags(20)->store;
# Patron is fully authenticated, cannot request a token again
$session->param('waiting-for-2FA', 0);
$session->flush;
$tx = $t->ua->build_tx( POST => "/api/v1/auth/otp/token_delivery" );
$tx->req->cookies( { name => 'CGISESSID', value => $session->id } );
$tx->req->env( { REMOTE_ADDR => $remote_address } );
$t->request_ok($tx)->status_is(401);
$schema->storage->txn_rollback;
};
1;