💣
This commit is contained in:
parent
f300577963
commit
44575439d6
1 changed files with 0 additions and 189 deletions
|
@ -1,189 +0,0 @@
|
||||||
<?php
|
|
||||||
|
|
||||||
namespace Tests\Unit\Http\Middleware;
|
|
||||||
|
|
||||||
use Mockery as m;
|
|
||||||
use Pterodactyl\Models\User;
|
|
||||||
use Illuminate\Http\RedirectResponse;
|
|
||||||
use Prologue\Alerts\AlertsMessageBag;
|
|
||||||
use Pterodactyl\Http\Middleware\RequireTwoFactorAuthentication;
|
|
||||||
|
|
||||||
class RequireTwoFactorAuthenticationTest extends MiddlewareTestCase
|
|
||||||
{
|
|
||||||
/**
|
|
||||||
* @var \Prologue\Alerts\AlertsMessageBag|\Mockery\Mock
|
|
||||||
*/
|
|
||||||
private $alert;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Setup tests.
|
|
||||||
*/
|
|
||||||
public function setUp(): void
|
|
||||||
{
|
|
||||||
parent::setUp();
|
|
||||||
|
|
||||||
$this->alert = m::mock(AlertsMessageBag::class);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test that a missing user does not trigger this middleware.
|
|
||||||
*/
|
|
||||||
public function testRequestMissingUser()
|
|
||||||
{
|
|
||||||
$this->setRequestUserModel(null);
|
|
||||||
|
|
||||||
$this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test that the middleware is ignored on specific routes.
|
|
||||||
*
|
|
||||||
* @dataProvider ignoredRoutesDataProvider
|
|
||||||
* @param string $route
|
|
||||||
*/
|
|
||||||
public function testRequestOnIgnoredRoute($route)
|
|
||||||
{
|
|
||||||
$this->generateRequestUserModel();
|
|
||||||
$this->setRequestRouteName($route);
|
|
||||||
|
|
||||||
$this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test disabled 2FA requirement.
|
|
||||||
*/
|
|
||||||
public function testTwoFactorRequirementDisabled()
|
|
||||||
{
|
|
||||||
$this->generateRequestUserModel();
|
|
||||||
$this->setRequestRouteName('random.route');
|
|
||||||
$this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_NONE);
|
|
||||||
|
|
||||||
$this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test that an invalid value for the level skips the check and continues with the request.
|
|
||||||
*/
|
|
||||||
public function testTwoFactorRequirementWithInvalidValue()
|
|
||||||
{
|
|
||||||
$this->generateRequestUserModel();
|
|
||||||
$this->setRequestRouteName('random.route');
|
|
||||||
$this->setRequirementLevel(333);
|
|
||||||
|
|
||||||
$this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test 2FA required for admins as an administrative user who has 2FA disabled.
|
|
||||||
*/
|
|
||||||
public function testTwoFactorEnabledForAdminsAsAdminUserWith2FADisabled()
|
|
||||||
{
|
|
||||||
$user = factory(User::class)->make(['root_admin' => 1, 'use_totp' => 0]);
|
|
||||||
$this->setRequestUserModel($user);
|
|
||||||
$this->setRequestRouteName('random.route');
|
|
||||||
$this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ADMIN);
|
|
||||||
|
|
||||||
$this->alert->shouldReceive('danger')->with(trans('auth.2fa_must_be_enabled'))->once()->andReturnSelf();
|
|
||||||
$this->alert->shouldReceive('flash')->withNoArgs()->once()->andReturnSelf();
|
|
||||||
|
|
||||||
$response = $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
$this->assertInstanceOf(RedirectResponse::class, $response);
|
|
||||||
$this->assertEquals(route('account'), $response->getTargetUrl());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test 2FA required for admins as an administrative user who has 2FA enabled.
|
|
||||||
*/
|
|
||||||
public function testTwoFactorEnabledForAdminsAsAdminUserWith2FAEnabled()
|
|
||||||
{
|
|
||||||
$user = factory(User::class)->make(['root_admin' => 1, 'use_totp' => 1]);
|
|
||||||
$this->setRequestUserModel($user);
|
|
||||||
$this->setRequestRouteName('random.route');
|
|
||||||
$this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ADMIN);
|
|
||||||
|
|
||||||
$this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test 2FA required for admins as an administrative user.
|
|
||||||
*/
|
|
||||||
public function testTwoFactorEnabledForAdminsAsNonAdmin()
|
|
||||||
{
|
|
||||||
$user = factory(User::class)->make(['root_admin' => 0]);
|
|
||||||
$this->setRequestUserModel($user);
|
|
||||||
$this->setRequestRouteName('random.route');
|
|
||||||
$this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ADMIN);
|
|
||||||
|
|
||||||
$this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test 2FA required for all users without 2FA enabled.
|
|
||||||
*/
|
|
||||||
public function testTwoFactorEnabledForAllUsersAsUserWith2FADisabled()
|
|
||||||
{
|
|
||||||
$user = factory(User::class)->make(['use_totp' => 0]);
|
|
||||||
$this->setRequestUserModel($user);
|
|
||||||
$this->setRequestRouteName('random.route');
|
|
||||||
$this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ALL);
|
|
||||||
|
|
||||||
$this->alert->shouldReceive('danger')->with(trans('auth.2fa_must_be_enabled'))->once()->andReturnSelf();
|
|
||||||
$this->alert->shouldReceive('flash')->withNoArgs()->once()->andReturnSelf();
|
|
||||||
|
|
||||||
$response = $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
$this->assertInstanceOf(RedirectResponse::class, $response);
|
|
||||||
$this->assertEquals(route('account'), $response->getTargetUrl());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Test 2FA required for all users without 2FA enabled.
|
|
||||||
*/
|
|
||||||
public function testTwoFactorEnabledForAllUsersAsUserWith2FAEnabled()
|
|
||||||
{
|
|
||||||
$user = factory(User::class)->make(['use_totp' => 1]);
|
|
||||||
$this->setRequestUserModel($user);
|
|
||||||
$this->setRequestRouteName('random.route');
|
|
||||||
$this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ALL);
|
|
||||||
|
|
||||||
$this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Routes that should be ignored.
|
|
||||||
*
|
|
||||||
* @return array
|
|
||||||
*/
|
|
||||||
public function ignoredRoutesDataProvider()
|
|
||||||
{
|
|
||||||
return [
|
|
||||||
['auth'],
|
|
||||||
['account'],
|
|
||||||
['account.security.revoke'],
|
|
||||||
['account.security.totp'],
|
|
||||||
['account.security.totp.set'],
|
|
||||||
['account.security.totp.disable'],
|
|
||||||
['auth.totp'],
|
|
||||||
['auth.logout'],
|
|
||||||
];
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Return an instance of the middleware using mocked dependencies.
|
|
||||||
*
|
|
||||||
* @return \Pterodactyl\Http\Middleware\RequireTwoFactorAuthentication
|
|
||||||
*/
|
|
||||||
private function getMiddleware(): RequireTwoFactorAuthentication
|
|
||||||
{
|
|
||||||
return new RequireTwoFactorAuthentication($this->alert);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set the authentication level requirement.
|
|
||||||
*
|
|
||||||
* @param int $level
|
|
||||||
*/
|
|
||||||
private function setRequirementLevel(int $level)
|
|
||||||
{
|
|
||||||
config()->set('pterodactyl.auth.2fa_required', $level);
|
|
||||||
}
|
|
||||||
}
|
|
Loading…
Reference in a new issue