This commit is contained in:
Christophe Maudoux 2021-04-01 14:38:31 +02:00
parent b67d11c58a
commit 6eda19c112

View File

@ -4,96 +4,99 @@ use IO::String;
use Data::Dumper; use Data::Dumper;
require 't/test-lib.pm'; require 't/test-lib.pm';
require 't/smtp.pm'; my $maintests = 5;
use_ok('Lemonldap::NG::Common::FormEncode'); SKIP: {
count(1); eval { require Crypt::U2F::Server; require Authen::U2F::Tester };
my $res; if ( $@ or $Crypt::U2F::Server::VERSION < 0.42 ) {
skip 'Missing libraries', $maintests;
my $client = LLNG::Manager::Test->new( {
ini => {
logLevel => 'debug',
sfOnlyUpgrade => 1,
u2fActivation => 1,
u2fAuthnLevel => 5,
authentication => 'Demo',
userDB => 'Same',
'vhostOptions' => {
'test1.example.com' => {
'vhostAuthnLevel' => 3
},
},
}
} }
);
# CASE 1: no 2F available use_ok('Lemonldap::NG::Common::FormEncode');
# ----------------------- my $res;
my $query = 'user=rtyler&password=rtyler';
ok(
$res = $client->_post(
'/',
IO::String->new($query),
length => length($query),
accept => 'text/html',
),
'Auth query'
);
count(1);
my $id = expectCookie($res); my $client = LLNG::Manager::Test->new( {
ini => {
logLevel => 'error',
sfOnlyUpgrade => 1,
u2fActivation => 1,
u2fAuthnLevel => 5,
authentication => 'Demo',
userDB => 'Same',
'vhostOptions' => {
'test1.example.com' => {
'vhostAuthnLevel' => 3
},
},
}
}
);
# After attempting to access test1, # CASE 1: no 2F available
# the handler sends up back to /upgradesession # -----------------------
# -------------------------------------------- my $query = 'user=rtyler&password=rtyler';
ok(
$res = $client->_post(
'/',
IO::String->new($query),
length => length($query),
accept => 'text/html',
),
'Auth query'
);
my $id = expectCookie($res);
ok( # After attempting to access test1,
$res = $client->_get( # the handler sends up back to /upgradesession
'/upgradesession', # --------------------------------------------
query => 'url=aHR0cDovL3Rlc3QxLmV4YW1wbGUuY29t', ok(
accept => 'text/html', $res = $client->_get(
cookie => "lemonldap=$id", '/upgradesession',
), query => 'url=aHR0cDovL3Rlc3QxLmV4YW1wbGUuY29t',
'Upgrade session query' accept => 'text/html',
); cookie => "lemonldap=$id",
count(1); ),
'Upgrade session query'
);
( my $host, my $url, $query ) = ( my $host, my $url, $query ) =
expectForm( $res, undef, '/upgradesession', 'confirm', 'url' ); expectForm( $res, undef, '/upgradesession', 'confirm', 'url' );
# Accept session upgrade # Accept session upgrade
# ---------------------- # ----------------------
ok( ok(
$res = $client->_post( $res = $client->_post(
'/upgradesession', '/upgradesession',
IO::String->new($query), IO::String->new($query),
length => length($query), length => length($query),
accept => 'text/html', accept => 'text/html',
cookie => "lemonldap=$id", cookie => "lemonldap=$id",
), ),
'Accept session upgrade query' 'Accept session upgrade query'
); );
count(1);
my $pdata = expectCookie( $res, 'lemonldappdata' ); expectCookie( $res, 'lemonldappdata' );
# A message warns the user that they do not have any 2FA available # A message warns the user that they do not have any 2FA available
expectPortalError( $res, 83 ); expectPortalError( $res, 83 );
$query = 'user=rtyler&password=rtyler'; $query = 'user=rtyler&password=rtyler';
ok( ok(
$res = $client->_post( $res = $client->_post(
'/upgradesession', '/upgradesession',
IO::String->new($query), IO::String->new($query),
length => length($query), length => length($query),
accept => 'text/html', accept => 'text/html',
cookie => "lemonldap=$id", cookie => "lemonldap=$id",
), ),
'Accept session upgrade query' 'Accept session upgrade query'
); );
count(1); expectRedirection( $res, 'http://auth.example.com/' );
expectRedirection( $res, 'http://auth.example.com/' ); $client->logout($id);
}
count($maintests);
clean_sessions(); clean_sessions();
done_testing( count() ); done_testing( count() );