debian-mirror-gitlab/spec/services/webauthn/authenticate_service_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

58 lines
2 KiB
Ruby
Raw Permalink Normal View History

2020-11-24 15:15:51 +05:30
# frozen_string_literal: true
require 'spec_helper'
require 'webauthn/fake_client'
2023-05-27 22:25:52 +05:30
RSpec.describe Webauthn::AuthenticateService, feature_category: :system_access do
2020-11-24 15:15:51 +05:30
let(:client) { WebAuthn::FakeClient.new(origin) }
let(:user) { create(:user) }
let(:challenge) { Base64.strict_encode64(SecureRandom.random_bytes(32)) }
let(:origin) { 'http://localhost' }
before do
create_result = client.create(challenge: challenge) # rubocop:disable Rails/SaveBang
webauthn_credential = WebAuthn::Credential.from_create(create_result)
registration = WebauthnRegistration.new(credential_xid: Base64.strict_encode64(webauthn_credential.raw_id),
public_key: webauthn_credential.public_key,
counter: 0,
name: 'name',
user_id: user.id)
registration.save!
end
describe '#execute' do
it 'returns true if the response is valid and a matching stored credential is present' do
get_result = client.get(challenge: challenge)
get_result['clientExtensionResults'] = {}
service = Webauthn::AuthenticateService.new(user, get_result.to_json, challenge)
2022-08-27 11:52:29 +05:30
expect(service.execute).to eq true
2020-11-24 15:15:51 +05:30
end
2022-08-27 11:52:29 +05:30
context 'when response is valid but no matching stored credential is present' do
it 'returns false' do
other_client = WebAuthn::FakeClient.new(origin)
other_client.create(challenge: challenge) # rubocop:disable Rails/SaveBang
2020-11-24 15:15:51 +05:30
2022-08-27 11:52:29 +05:30
get_result = other_client.get(challenge: challenge)
2020-11-24 15:15:51 +05:30
2022-08-27 11:52:29 +05:30
get_result['clientExtensionResults'] = {}
service = Webauthn::AuthenticateService.new(user, get_result.to_json, challenge)
expect(service.execute).to eq false
end
end
2020-11-24 15:15:51 +05:30
2022-08-27 11:52:29 +05:30
context 'when device response includes invalid json' do
it 'returns false' do
service = Webauthn::AuthenticateService.new(user, 'invalid JSON', '')
expect(service.execute).to eq false
end
2020-11-24 15:15:51 +05:30
end
end
end