debian-mirror-gitlab/spec/controllers/admin/sessions_controller_spec.rb

299 lines
9.8 KiB
Ruby
Raw Normal View History

2019-12-21 20:55:43 +05:30
# frozen_string_literal: true
require 'spec_helper'
2020-06-23 00:09:42 +05:30
RSpec.describe Admin::SessionsController, :do_not_mock_admin_mode do
2019-12-21 20:55:43 +05:30
include_context 'custom session'
let(:user) { create(:user) }
before do
sign_in(user)
end
describe '#new' do
context 'for regular users' do
it 'shows error page' do
get :new
expect(response).to have_gitlab_http_status(:not_found)
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
2019-12-21 20:55:43 +05:30
end
end
context 'for admin users' do
let(:user) { create(:admin) }
it 'renders a password form' do
get :new
expect(response).to render_template :new
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
end
context 'already in admin mode' do
before do
controller.current_user_mode.request_admin_mode!
controller.current_user_mode.enable_admin_mode!(password: user.password)
end
it 'redirects to original location' do
get :new
expect(response).to redirect_to(admin_root_path)
expect(controller.current_user_mode.admin_mode?).to be(true)
end
2019-12-21 20:55:43 +05:30
end
end
end
describe '#create' do
context 'for regular users' do
it 'shows error page' do
post :create
expect(response).to have_gitlab_http_status(:not_found)
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
2019-12-21 20:55:43 +05:30
end
end
context 'for admin users' do
let(:user) { create(:admin) }
it 'sets admin mode with a valid password' do
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
2019-12-21 20:55:43 +05:30
controller.store_location_for(:redirect, admin_root_path)
2020-01-01 13:55:28 +05:30
# triggering the auth form will request admin mode
get :new
2020-04-08 14:13:33 +05:30
post :create, params: { user: { password: user.password } }
2019-12-21 20:55:43 +05:30
expect(response).to redirect_to admin_root_path
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(true)
2019-12-21 20:55:43 +05:30
end
it 'fails with an invalid password' do
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
2019-12-21 20:55:43 +05:30
controller.store_location_for(:redirect, admin_root_path)
2020-01-01 13:55:28 +05:30
# triggering the auth form will request admin mode
get :new
2020-04-08 14:13:33 +05:30
post :create, params: { user: { password: '' } }
2019-12-21 20:55:43 +05:30
expect(response).to render_template :new
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
end
it 'fails if not requested first' do
expect(controller.current_user_mode.admin_mode?).to be(false)
controller.store_location_for(:redirect, admin_root_path)
# do not trigger the auth form
2020-04-08 14:13:33 +05:30
post :create, params: { user: { password: user.password } }
2020-01-01 13:55:28 +05:30
expect(response).to redirect_to(new_admin_session_path)
expect(controller.current_user_mode.admin_mode?).to be(false)
end
it 'fails if request period expired' do
expect(controller.current_user_mode.admin_mode?).to be(false)
controller.store_location_for(:redirect, admin_root_path)
# triggering the auth form will request admin mode
get :new
2021-01-03 14:25:43 +05:30
travel_to(Gitlab::Auth::CurrentUserMode::ADMIN_MODE_REQUESTED_GRACE_PERIOD.from_now) do
2020-04-08 14:13:33 +05:30
post :create, params: { user: { password: user.password } }
2020-01-01 13:55:28 +05:30
expect(response).to redirect_to(new_admin_session_path)
expect(controller.current_user_mode.admin_mode?).to be(false)
end
2019-12-21 20:55:43 +05:30
end
2020-04-08 14:13:33 +05:30
context 'when using two-factor authentication via OTP' do
let(:user) { create(:admin, :two_factor) }
def authenticate_2fa(user_params)
post(:create, params: { user: user_params }, session: { otp_user_id: user.id })
end
it 'requests two factor after a valid password is provided' do
expect(controller.current_user_mode.admin_mode?).to be(false)
# triggering the auth form will request admin mode
get :new
post :create, params: { user: { password: user.password } }
expect(response).to render_template('admin/sessions/two_factor')
expect(controller.current_user_mode.admin_mode?).to be(false)
end
it 'can login with valid otp' do
expect(controller.current_user_mode.admin_mode?).to be(false)
controller.store_location_for(:redirect, admin_root_path)
controller.current_user_mode.request_admin_mode!
authenticate_2fa(otp_attempt: user.current_otp)
expect(response).to redirect_to admin_root_path
expect(controller.current_user_mode.admin_mode?).to be(true)
end
it 'cannot login with invalid otp' do
expect(controller.current_user_mode.admin_mode?).to be(false)
controller.current_user_mode.request_admin_mode!
authenticate_2fa(otp_attempt: 'invalid')
expect(response).to render_template('admin/sessions/two_factor')
expect(controller.current_user_mode.admin_mode?).to be(false)
end
context 'with password authentication disabled' do
before do
stub_application_setting(password_authentication_enabled_for_web: false)
end
it 'allows 2FA stage of non-password login' do
expect(controller.current_user_mode.admin_mode?).to be(false)
controller.store_location_for(:redirect, admin_root_path)
controller.current_user_mode.request_admin_mode!
authenticate_2fa(otp_attempt: user.current_otp)
expect(response).to redirect_to admin_root_path
expect(controller.current_user_mode.admin_mode?).to be(true)
end
end
2020-04-22 19:07:51 +05:30
context 'on a read-only instance' do
before do
allow(Gitlab::Database).to receive(:read_only?).and_return(true)
end
it 'does not attempt to write to the database with valid otp' do
expect_any_instance_of(User).not_to receive(:save)
expect_any_instance_of(User).not_to receive(:save!)
controller.store_location_for(:redirect, admin_root_path)
controller.current_user_mode.request_admin_mode!
authenticate_2fa(otp_attempt: user.current_otp)
expect(response).to redirect_to admin_root_path
end
it 'does not attempt to write to the database with invalid otp' do
expect_any_instance_of(User).not_to receive(:save)
expect_any_instance_of(User).not_to receive(:save!)
controller.current_user_mode.request_admin_mode!
authenticate_2fa(otp_attempt: 'invalid')
expect(response).to render_template('admin/sessions/two_factor')
expect(controller.current_user_mode.admin_mode?).to be(false)
end
it 'does not attempt to write to the database with backup code' do
expect_any_instance_of(User).not_to receive(:save)
expect_any_instance_of(User).not_to receive(:save!)
controller.current_user_mode.request_admin_mode!
authenticate_2fa(otp_attempt: user.otp_backup_codes.first)
expect(response).to render_template('admin/sessions/two_factor')
expect(controller.current_user_mode.admin_mode?).to be(false)
end
end
2020-04-08 14:13:33 +05:30
end
2023-05-27 22:25:52 +05:30
context 'when using two-factor authentication via WebAuthn' do
let(:user) { create(:admin, :two_factor_via_webauthn) }
2020-11-24 15:15:51 +05:30
def authenticate_2fa(user_params)
2020-04-08 14:13:33 +05:30
post(:create, params: { user: user_params }, session: { otp_user_id: user.id })
end
it 'requests two factor after a valid password is provided' do
expect(controller.current_user_mode.admin_mode?).to be(false)
# triggering the auth form will request admin mode
get :new
post :create, params: { user: { password: user.password } }
expect(response).to render_template('admin/sessions/two_factor')
expect(controller.current_user_mode.admin_mode?).to be(false)
end
it 'can login with valid auth' do
2020-11-24 15:15:51 +05:30
allow_any_instance_of(Webauthn::AuthenticateService).to receive(:execute).and_return(true)
2020-04-08 14:13:33 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
controller.store_location_for(:redirect, admin_root_path)
controller.current_user_mode.request_admin_mode!
2020-11-24 15:15:51 +05:30
authenticate_2fa(login: user.username, device_response: '{}')
2020-04-08 14:13:33 +05:30
expect(response).to redirect_to admin_root_path
expect(controller.current_user_mode.admin_mode?).to be(true)
end
it 'cannot login with invalid auth' do
2020-11-24 15:15:51 +05:30
allow_any_instance_of(Webauthn::AuthenticateService).to receive(:execute).and_return(false)
2020-04-08 14:13:33 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
controller.current_user_mode.request_admin_mode!
2020-11-24 15:15:51 +05:30
authenticate_2fa(login: user.username, device_response: '{}')
2020-04-08 14:13:33 +05:30
expect(response).to render_template('admin/sessions/two_factor')
expect(controller.current_user_mode.admin_mode?).to be(false)
end
end
2019-12-21 20:55:43 +05:30
end
end
describe '#destroy' do
context 'for regular users' do
it 'shows error page' do
2020-03-13 15:44:24 +05:30
post :destroy
2019-12-21 20:55:43 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
2019-12-21 20:55:43 +05:30
end
end
context 'for admin users' do
let(:user) { create(:admin) }
it 'disables admin mode and redirects to main page' do
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
get :new
2020-04-08 14:13:33 +05:30
post :create, params: { user: { password: user.password } }
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(true)
2019-12-21 20:55:43 +05:30
2020-03-13 15:44:24 +05:30
post :destroy
2019-12-21 20:55:43 +05:30
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(root_path)
2020-01-01 13:55:28 +05:30
expect(controller.current_user_mode.admin_mode?).to be(false)
2019-12-21 20:55:43 +05:30
end
end
end
end