2022-08-13 15:12:31 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
RSpec.describe 'Email Verification On Login', :clean_gitlab_redis_rate_limiting, feature_category: :system_access do
|
2022-08-13 15:12:31 +05:30
|
|
|
include EmailHelpers
|
|
|
|
|
|
|
|
let_it_be(:user) { create(:user) }
|
|
|
|
|
|
|
|
let(:require_email_verification_enabled) { user }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_feature_flags(require_email_verification: require_email_verification_enabled)
|
2023-04-23 21:23:45 +05:30
|
|
|
stub_feature_flags(skip_require_email_verification: false)
|
2022-08-13 15:12:31 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples 'email verification required' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab::AppLogger).to receive(:info)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'requires email verification before being able to access GitLab' do
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
# When logging in
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
expect_log_message(message: "Account Locked: username=#{user.username}")
|
|
|
|
expect_log_message('Instructions Sent')
|
|
|
|
|
|
|
|
# Expect the user to be locked and the unlock_token to be set
|
|
|
|
user.reload
|
|
|
|
expect(user.locked_at).not_to be_nil
|
|
|
|
expect(user.unlock_token).not_to be_nil
|
|
|
|
|
|
|
|
# Expect to see the verification form on the login page
|
|
|
|
expect(page).to have_current_path(new_user_session_path)
|
|
|
|
expect(page).to have_content('Help us protect your account')
|
|
|
|
|
|
|
|
# Expect an instructions email to be sent with a code
|
|
|
|
code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
# Signing in again prompts for the code and doesn't send a new one
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
expect(page).to have_current_path(new_user_session_path)
|
|
|
|
expect(page).to have_content('Help us protect your account')
|
|
|
|
|
|
|
|
# Verify the code
|
|
|
|
verify_code(code)
|
|
|
|
expect_log_message('Successful')
|
|
|
|
expect_log_message(message: "Successful Login: username=#{user.username} "\
|
|
|
|
"ip=127.0.0.1 method=standard admin=false")
|
|
|
|
|
|
|
|
# Expect the user to be unlocked
|
|
|
|
expect_user_to_be_unlocked
|
|
|
|
|
|
|
|
# Expect a confirmation page with a meta refresh tag for 3 seconds to the root
|
|
|
|
expect(page).to have_current_path(users_successful_verification_path)
|
|
|
|
expect(page).to have_content('Verification successful')
|
|
|
|
expect(page).to have_selector("meta[http-equiv='refresh'][content='3; url=#{root_path}']", visible: false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'resending a new code' do
|
|
|
|
it 'resends a new code' do
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
# When logging in
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
|
|
|
|
# Expect an instructions email to be sent with a code
|
|
|
|
code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
# Request a new code
|
|
|
|
click_link 'Resend code'
|
|
|
|
expect_log_message('Instructions Sent', 2)
|
|
|
|
new_code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
# Verify the old code is different from the new code
|
|
|
|
expect(code).not_to eq(new_code)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'rate limits resends' do
|
|
|
|
# When logging in
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
|
|
|
|
# It shows a resend button
|
|
|
|
expect(page).to have_link 'Resend code'
|
|
|
|
|
|
|
|
# Resend more than the rate limited amount of times
|
|
|
|
10.times do
|
|
|
|
click_link 'Resend code'
|
|
|
|
end
|
|
|
|
|
|
|
|
# Expect the link to be gone
|
|
|
|
expect(page).not_to have_link 'Resend code'
|
|
|
|
|
|
|
|
# Wait for 1 hour
|
|
|
|
travel 1.hour
|
|
|
|
|
|
|
|
# Now it's visible again
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
expect(page).to have_link 'Resend code'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'verification errors' do
|
|
|
|
it 'rate limits verifications' do
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
# When logging in
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
|
|
|
|
# Expect an instructions email to be sent with a code
|
|
|
|
code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
# Verify an invalid token more than the rate limited amount of times
|
|
|
|
11.times do
|
|
|
|
verify_code('123456')
|
|
|
|
end
|
|
|
|
|
|
|
|
# Expect an error message
|
|
|
|
expect_log_message('Failed Attempt', reason: 'rate_limited')
|
|
|
|
expect(page).to have_content("You've reached the maximum amount of tries. "\
|
2022-10-11 01:57:18 +05:30
|
|
|
'Wait 10 minutes or send a new code and try again.')
|
2022-08-13 15:12:31 +05:30
|
|
|
|
|
|
|
# Wait for 10 minutes
|
|
|
|
travel 10.minutes
|
|
|
|
|
|
|
|
# Now it works again
|
|
|
|
verify_code(code)
|
|
|
|
expect_log_message('Successful')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'verifies invalid codes' do
|
|
|
|
# When logging in
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
|
|
|
|
# Verify an invalid code
|
|
|
|
verify_code('123456')
|
|
|
|
|
|
|
|
# Expect an error message
|
|
|
|
expect_log_message('Failed Attempt', reason: 'invalid')
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(page).to have_content('The code is incorrect. Enter it again, or send a new code.')
|
2022-08-13 15:12:31 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'verifies expired codes' do
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
# When logging in
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
|
|
|
|
# Expect an instructions email to be sent with a code
|
|
|
|
code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
# Wait for the code to expire before verifying
|
2022-10-11 01:57:18 +05:30
|
|
|
travel Users::EmailVerification::ValidateTokenService::TOKEN_VALID_FOR_MINUTES.minutes + 1.second
|
2022-08-13 15:12:31 +05:30
|
|
|
verify_code(code)
|
|
|
|
|
|
|
|
# Expect an error message
|
|
|
|
expect_log_message('Failed Attempt', reason: 'expired')
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(page).to have_content('The code has expired. Send a new code and try again.')
|
2022-08-13 15:12:31 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples 'no email verification required' do |**login_args|
|
|
|
|
it 'does not lock the user and redirects to the root page after logging in' do
|
|
|
|
gitlab_sign_in(user, **login_args)
|
|
|
|
|
|
|
|
expect_user_to_be_unlocked
|
|
|
|
|
|
|
|
expect(page).to have_current_path(root_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
shared_examples 'no email verification required when 2fa enabled or ff disabled' do
|
|
|
|
context 'when 2FA is enabled' do
|
|
|
|
let_it_be(:user) { create(:user, :two_factor) }
|
|
|
|
|
|
|
|
it_behaves_like 'no email verification required', two_factor_auth: true
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the feature flag is disabled' do
|
|
|
|
let(:require_email_verification_enabled) { false }
|
|
|
|
|
|
|
|
it_behaves_like 'no email verification required'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when failing to login the maximum allowed number of times' do
|
|
|
|
before do
|
|
|
|
# See comment in RequireEmailVerification::MAXIMUM_ATTEMPTS on why this is divided by 2
|
|
|
|
(RequireEmailVerification::MAXIMUM_ATTEMPTS / 2).times do
|
|
|
|
gitlab_sign_in(user, password: 'wrong_password')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'locks the user, but does not set the unlock token', :aggregate_failures do
|
|
|
|
user.reload
|
|
|
|
expect(user.locked_at).not_to be_nil
|
|
|
|
expect(user.unlock_token).to be_nil # The unlock token is only set after logging in with valid credentials
|
|
|
|
expect(user.failed_attempts).to eq(RequireEmailVerification::MAXIMUM_ATTEMPTS)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'email verification required'
|
|
|
|
it_behaves_like 'no email verification required when 2fa enabled or ff disabled'
|
|
|
|
|
|
|
|
describe 'when waiting for the auto unlock time' do
|
|
|
|
before do
|
|
|
|
travel User::UNLOCK_IN + 1.second
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'no email verification required'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when no previous authentication event exists' do
|
|
|
|
it_behaves_like 'no email verification required'
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when a previous authentication event exists for another ip address' do
|
|
|
|
before do
|
|
|
|
create(:authentication_event, :successful, user: user, ip_address: '1.2.3.4')
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'email verification required'
|
|
|
|
it_behaves_like 'no email verification required when 2fa enabled or ff disabled'
|
2023-03-04 22:38:38 +05:30
|
|
|
|
|
|
|
context 'when the check_ip_address_for_email_verification feature flag is disabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(check_ip_address_for_email_verification: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'no email verification required'
|
|
|
|
end
|
2022-08-13 15:12:31 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe 'when a previous authentication event exists for the same ip address' do
|
|
|
|
before do
|
|
|
|
create(:authentication_event, :successful, user: user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'no email verification required'
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'rate limiting password guessing' do
|
|
|
|
before do
|
|
|
|
5.times { gitlab_sign_in(user, password: 'wrong_password') }
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'shows an error message on on the login page' do
|
|
|
|
expect(page).to have_current_path(new_user_session_path)
|
|
|
|
expect(page).to have_content('Maximum login attempts exceeded. Wait 10 minutes and try again.')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'inconsistent states' do
|
|
|
|
context 'when the feature flag is toggled off after being prompted for a verification token' do
|
|
|
|
before do
|
|
|
|
create(:authentication_event, :successful, user: user, ip_address: '1.2.3.4')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'still accepts the token' do
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
# The user is prompted for a verification code
|
|
|
|
gitlab_sign_in(user)
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(page).to have_content(s_('IdentityVerification|Help us protect your account'))
|
2022-08-13 15:12:31 +05:30
|
|
|
code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
# We toggle the feature flag off
|
|
|
|
stub_feature_flags(require_email_verification: false)
|
|
|
|
|
|
|
|
# Resending and veryfying the code work as expected
|
|
|
|
click_link 'Resend code'
|
|
|
|
new_code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
verify_code(code)
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(page)
|
|
|
|
.to have_content(s_('IdentityVerification|The code is incorrect. Enter it again, or send a new code.'))
|
2022-08-13 15:12:31 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
travel Users::EmailVerification::ValidateTokenService::TOKEN_VALID_FOR_MINUTES.minutes + 1.second
|
2022-08-13 15:12:31 +05:30
|
|
|
|
|
|
|
verify_code(new_code)
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(page).to have_content(s_('IdentityVerification|The code has expired. Send a new code and try again.'))
|
2022-08-13 15:12:31 +05:30
|
|
|
|
|
|
|
click_link 'Resend code'
|
|
|
|
another_code = expect_instructions_email_and_extract_code
|
|
|
|
|
|
|
|
verify_code(another_code)
|
|
|
|
expect_user_to_be_unlocked
|
|
|
|
expect(page).to have_current_path(users_successful_verification_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the feature flag is toggled on after Devise sent unlock instructions' do
|
|
|
|
let(:require_email_verification_enabled) { false }
|
|
|
|
|
|
|
|
before do
|
|
|
|
perform_enqueued_jobs do
|
|
|
|
(User.maximum_attempts / 2).times do
|
|
|
|
gitlab_sign_in(user, password: 'wrong_password')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'the unlock link still works' do
|
|
|
|
# The user is locked and unlock instructions are sent
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(page).to have_content(_('Invalid login or password.'))
|
2022-08-13 15:12:31 +05:30
|
|
|
user.reload
|
|
|
|
expect(user.locked_at).not_to be_nil
|
|
|
|
expect(user.unlock_token).not_to be_nil
|
|
|
|
mail = find_email_for(user)
|
|
|
|
|
|
|
|
expect(mail.to).to match_array([user.email])
|
|
|
|
expect(mail.subject).to eq('Unlock instructions')
|
|
|
|
unlock_url = mail.body.parts.first.to_s[/http.*/]
|
|
|
|
|
|
|
|
# We toggle the feature flag on
|
|
|
|
stub_feature_flags(require_email_verification: true)
|
|
|
|
|
|
|
|
# Unlocking works as expected
|
|
|
|
visit unlock_url
|
|
|
|
expect_user_to_be_unlocked
|
|
|
|
expect(page).to have_current_path(new_user_session_path)
|
|
|
|
expect(page).to have_content('Your account has been unlocked successfully')
|
|
|
|
|
|
|
|
gitlab_sign_in(user)
|
|
|
|
expect(page).to have_current_path(root_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def expect_user_to_be_unlocked
|
|
|
|
user.reload
|
|
|
|
|
|
|
|
aggregate_failures do
|
|
|
|
expect(user.locked_at).to be_nil
|
|
|
|
expect(user.unlock_token).to be_nil
|
|
|
|
expect(user.failed_attempts).to eq(0)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def expect_instructions_email_and_extract_code
|
|
|
|
mail = find_email_for(user)
|
|
|
|
expect(mail.to).to match_array([user.email])
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(mail.subject).to eq(s_('IdentityVerification|Verify your identity'))
|
|
|
|
code = mail.body.parts.first.to_s[/\d{#{Users::EmailVerification::GenerateTokenService::TOKEN_LENGTH}}/o]
|
2022-08-13 15:12:31 +05:30
|
|
|
reset_delivered_emails!
|
|
|
|
code
|
|
|
|
end
|
|
|
|
|
|
|
|
def verify_code(code)
|
2022-10-11 01:57:18 +05:30
|
|
|
fill_in s_('IdentityVerification|Verification code'), with: code
|
|
|
|
click_button s_('IdentityVerification|Verify code')
|
2022-08-13 15:12:31 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def expect_log_message(event = nil, times = 1, reason: '', message: nil)
|
|
|
|
expect(Gitlab::AppLogger).to have_received(:info)
|
|
|
|
.exactly(times).times
|
|
|
|
.with(message || hash_including(message: 'Email Verification',
|
2022-10-11 01:57:18 +05:30
|
|
|
event: event,
|
|
|
|
username: user.username,
|
|
|
|
ip: '127.0.0.1',
|
|
|
|
reason: reason))
|
2022-08-13 15:12:31 +05:30
|
|
|
end
|
|
|
|
end
|