debian-mirror-gitlab/spec/features/webauthn_spec.rb

322 lines
11 KiB
Ruby
Raw Normal View History

2020-11-24 15:15:51 +05:30
# frozen_string_literal: true
require 'spec_helper'
2023-05-27 22:25:52 +05:30
RSpec.describe 'Using WebAuthn Devices for Authentication', :js, feature_category: :system_access do
2023-06-20 00:43:36 +05:30
include Features::TwoFactorHelpers
2020-11-24 15:15:51 +05:30
let(:app_id) { "http://#{Capybara.current_session.server.host}:#{Capybara.current_session.server.port}" }
before do
WebAuthn.configuration.origin = app_id
end
2023-05-27 22:25:52 +05:30
context 'when the webauth_without_totp feature flag is enabled' do
# Some of the shared tests don't apply. After removing U2F support and the `webauthn_without_totp` feature flag, refactor the shared tests.
# TODO: it_behaves_like 'hardware device for 2fa', 'WebAuthn'
describe 'registration' do
let(:user) { create(:user) }
before do
gitlab_sign_in(user)
end
it 'shows an error when using a wrong password' do
visit profile_account_path
# First device
enable_two_factor_authentication
webauthn_device_registration(password: 'fake')
expect(page).to have_content(_('You must provide a valid current password.'))
end
it 'allows registering more than one device' do
visit profile_account_path
# First device
enable_two_factor_authentication
first_device = webauthn_device_registration(password: user.password)
expect(page).to have_content('Your WebAuthn device was registered!')
copy_recovery_codes
manage_two_factor_authentication
# Second device
second_device = webauthn_device_registration(name: 'My other device', password: user.password)
expect(page).to have_content('Your WebAuthn device was registered!')
expect(page).to have_content(first_device.name)
expect(page).to have_content(second_device.name)
expect(WebauthnRegistration.count).to eq(2)
end
it 'allows the same device to be registered for multiple users' do
# First user
visit profile_account_path
enable_two_factor_authentication
webauthn_device = webauthn_device_registration(password: user.password)
expect(page).to have_content('Your WebAuthn device was registered!')
gitlab_sign_out
# Second user
user = gitlab_sign_in(:user)
visit profile_account_path
enable_two_factor_authentication
webauthn_device_registration(webauthn_device: webauthn_device, name: 'My other device', password: user.password)
expect(page).to have_content('Your WebAuthn device was registered!')
expect(WebauthnRegistration.count).to eq(2)
end
context 'when there are form errors' do
let(:mock_register_js) do
<<~JS
const mockResponse = {
type: 'public-key',
id: '',
rawId: '',
response: {
clientDataJSON: '',
attestationObject: '',
},
getClientExtensionResults: () => {},
};
navigator.credentials.create = () => Promise.resolve(mockResponse);
JS
end
it "doesn't register the device if there are errors" do
visit profile_account_path
enable_two_factor_authentication
# Have the "webauthn device" respond with bad data
page.execute_script(mock_register_js)
click_on _('Set up new device')
webauthn_fill_form_and_submit(password: user.password)
expect(page).to have_content(_('Your WebAuthn device did not send a valid JSON response.'))
expect(WebauthnRegistration.count).to eq(0)
end
it 'allows retrying registration' do
visit profile_account_path
enable_two_factor_authentication
# Failed registration
page.execute_script(mock_register_js)
click_on _('Set up new device')
webauthn_fill_form_and_submit(password: user.password)
expect(page).to have_content(_('Your WebAuthn device did not send a valid JSON response.'))
# Successful registration
webauthn_device_registration(password: user.password)
expect(page).to have_content('Your WebAuthn device was registered!')
expect(WebauthnRegistration.count).to eq(1)
end
end
end
end
2023-04-23 21:23:45 +05:30
context 'when the webauth_without_totp feature flag is disabled' do
2020-11-24 15:15:51 +05:30
before do
2023-04-23 21:23:45 +05:30
stub_feature_flags(webauthn_without_totp: false)
2020-11-24 15:15:51 +05:30
end
2023-04-23 21:23:45 +05:30
it_behaves_like 'hardware device for 2fa', 'WebAuthn'
describe 'registration' do
let(:user) { create(:user) }
before do
gitlab_sign_in(user)
user.update_attribute(:otp_required_for_login, true)
end
describe 'when 2FA via OTP is enabled' do
it 'allows registering more than one device' do
visit profile_account_path
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
# First device
manage_two_factor_authentication
first_device = register_webauthn_device
expect(page).to have_content('Your WebAuthn device was registered')
# Second device
second_device = register_webauthn_device(name: 'My other device')
expect(page).to have_content('Your WebAuthn device was registered')
expect(page).to have_content(first_device.name)
expect(page).to have_content(second_device.name)
expect(WebauthnRegistration.count).to eq(2)
end
end
it 'allows the same device to be registered for multiple users' do
# First user
visit profile_account_path
2020-11-24 15:15:51 +05:30
manage_two_factor_authentication
2023-04-23 21:23:45 +05:30
webauthn_device = register_webauthn_device
2020-11-24 15:15:51 +05:30
expect(page).to have_content('Your WebAuthn device was registered')
2023-04-23 21:23:45 +05:30
gitlab_sign_out
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
# Second user
user = gitlab_sign_in(:user)
user.update_attribute(:otp_required_for_login, true)
visit profile_account_path
manage_two_factor_authentication
register_webauthn_device(webauthn_device, name: 'My other device')
2020-11-24 15:15:51 +05:30
expect(page).to have_content('Your WebAuthn device was registered')
expect(WebauthnRegistration.count).to eq(2)
end
2023-04-23 21:23:45 +05:30
context 'when there are form errors' do
let(:mock_register_js) do
<<~JS
2020-11-24 15:15:51 +05:30
const mockResponse = {
type: 'public-key',
id: '',
rawId: '',
response: {
clientDataJSON: '',
attestationObject: '',
},
getClientExtensionResults: () => {},
};
navigator.credentials.create = function(_) {return Promise.resolve(mockResponse);}
2023-04-23 21:23:45 +05:30
JS
end
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
it "doesn't register the device if there are errors" do
visit profile_account_path
manage_two_factor_authentication
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
# Have the "webauthn device" respond with bad data
page.execute_script(mock_register_js)
click_on 'Set up new device'
expect(page).to have_content('Your device was successfully set up')
click_on 'Register device'
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
expect(WebauthnRegistration.count).to eq(0)
expect(page).to have_content('The form contains the following error')
expect(page).to have_content('did not send a valid JSON response')
end
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
it 'allows retrying registration' do
visit profile_account_path
manage_two_factor_authentication
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
# Failed registration
page.execute_script(mock_register_js)
click_on 'Set up new device'
expect(page).to have_content('Your device was successfully set up')
click_on 'Register device'
expect(page).to have_content('The form contains the following error')
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
# Successful registration
register_webauthn_device
2020-11-24 15:15:51 +05:30
2023-04-23 21:23:45 +05:30
expect(page).to have_content('Your WebAuthn device was registered')
expect(WebauthnRegistration.count).to eq(1)
end
2020-11-24 15:15:51 +05:30
end
end
2023-05-27 22:25:52 +05:30
end
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
describe 'authentication' do
let(:otp_required_for_login) { true }
let(:user) { create(:user, webauthn_xid: WebAuthn.generate_user_id, otp_required_for_login: otp_required_for_login) }
let!(:webauthn_device) do
add_webauthn_device(app_id, user)
end
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
describe 'when 2FA via OTP is disabled' do
let(:otp_required_for_login) { false }
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
it 'allows logging in with the WebAuthn device' do
gitlab_sign_in(user)
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
webauthn_device.respond_to_webauthn_authentication
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
expect(page).to have_css('.sign-out-link', visible: false)
2022-01-26 12:08:38 +05:30
end
2023-05-27 22:25:52 +05:30
end
2021-03-11 19:13:27 +05:30
2023-05-27 22:25:52 +05:30
describe 'when 2FA via OTP is enabled' do
it 'allows logging in with the WebAuthn device' do
gitlab_sign_in(user)
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
webauthn_device.respond_to_webauthn_authentication
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
expect(page).to have_css('.sign-out-link', visible: false)
2020-11-24 15:15:51 +05:30
end
2023-05-27 22:25:52 +05:30
end
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
describe 'when a given WebAuthn device has already been registered by another user' do
describe 'but not the current user' do
let(:other_user) { create(:user, webauthn_xid: WebAuthn.generate_user_id, otp_required_for_login: otp_required_for_login) }
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
it 'does not allow logging in with that particular device' do
# Register other user with a different WebAuthn device
other_device = add_webauthn_device(app_id, other_user)
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
# Try authenticating user with the old WebAuthn device
gitlab_sign_in(user)
other_device.respond_to_webauthn_authentication
expect(page).to have_content('Authentication via WebAuthn device failed')
2020-11-24 15:15:51 +05:30
end
2023-05-27 22:25:52 +05:30
end
describe "and also the current user" do
# TODO Uncomment once WebAuthn::FakeClient supports passing credential options
# (especially allow_credentials, as this is needed to specify which credential the
# fake client should use. Currently, the first credential is always used).
# There is an issue open for this: https://github.com/cedarcode/webauthn-ruby/issues/259
it "allows logging in with that particular device" do
pending("support for passing credential options in FakeClient")
# Register current user with the same WebAuthn device
current_user = gitlab_sign_in(:user)
visit profile_account_path
manage_two_factor_authentication
register_webauthn_device(webauthn_device)
gitlab_sign_out
# Try authenticating user with the same WebAuthn device
gitlab_sign_in(current_user)
webauthn_device.respond_to_webauthn_authentication
2022-01-26 12:08:38 +05:30
2023-05-27 22:25:52 +05:30
expect(page).to have_css('.sign-out-link', visible: false)
2020-11-24 15:15:51 +05:30
end
end
2023-05-27 22:25:52 +05:30
end
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
describe 'when a given WebAuthn device has not been registered' do
it 'does not allow logging in with that particular device' do
unregistered_device = FakeWebauthnDevice.new(page, 'My device')
gitlab_sign_in(user)
unregistered_device.respond_to_webauthn_authentication
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
expect(page).to have_content('Authentication via WebAuthn device failed')
2020-11-24 15:15:51 +05:30
end
2023-05-27 22:25:52 +05:30
end
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
describe 'when more than one device has been registered by the same user' do
it 'allows logging in with either device' do
first_device = add_webauthn_device(app_id, user)
second_device = add_webauthn_device(app_id, user)
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
# Authenticate as both devices
[first_device, second_device].each do |device|
gitlab_sign_in(user)
# register_webauthn_device(device)
device.respond_to_webauthn_authentication
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
expect(page).to have_css('.sign-out-link', visible: false)
2020-11-24 15:15:51 +05:30
2023-05-27 22:25:52 +05:30
gitlab_sign_out
2020-11-24 15:15:51 +05:30
end
end
end
end
end