184 lines
5.8 KiB
Ruby
184 lines
5.8 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
describe 'Admin Mode Login', :clean_gitlab_redis_shared_state, :do_not_mock_admin_mode do
|
|
include TermsHelper
|
|
include UserLoginHelper
|
|
|
|
describe 'with two-factor authentication', :js do
|
|
def enter_code(code)
|
|
fill_in 'user_otp_attempt', with: code
|
|
click_button 'Verify code'
|
|
end
|
|
|
|
context 'with valid username/password' do
|
|
let(:user) { create(:admin, :two_factor) }
|
|
|
|
context 'using one-time code' do
|
|
it 'blocks login if we reuse the same code immediately' do
|
|
gitlab_sign_in(user, remember: true)
|
|
|
|
expect(page).to have_content('Two-Factor Authentication')
|
|
|
|
repeated_otp = user.current_otp
|
|
enter_code(repeated_otp)
|
|
gitlab_enable_admin_mode_sign_in(user)
|
|
|
|
expect(page).to have_content('Two-Factor Authentication')
|
|
|
|
enter_code(repeated_otp)
|
|
|
|
expect(current_path).to eq admin_session_path
|
|
expect(page).to have_content('Invalid two-factor code')
|
|
end
|
|
|
|
context 'not re-using codes' do
|
|
before do
|
|
gitlab_sign_in(user, remember: true)
|
|
|
|
expect(page).to have_content('Two-Factor Authentication')
|
|
|
|
enter_code(user.current_otp)
|
|
gitlab_enable_admin_mode_sign_in(user)
|
|
|
|
expect(page).to have_content('Two-Factor Authentication')
|
|
end
|
|
|
|
it 'allows login with valid code' do
|
|
# Cannot reuse the TOTP
|
|
Timecop.travel(30.seconds.from_now) do
|
|
enter_code(user.current_otp)
|
|
|
|
expect(current_path).to eq admin_root_path
|
|
expect(page).to have_content('Admin mode enabled')
|
|
end
|
|
end
|
|
|
|
it 'blocks login with invalid code' do
|
|
# Cannot reuse the TOTP
|
|
Timecop.travel(30.seconds.from_now) do
|
|
enter_code('foo')
|
|
|
|
expect(page).to have_content('Invalid two-factor code')
|
|
end
|
|
end
|
|
|
|
it 'allows login with invalid code, then valid code' do
|
|
# Cannot reuse the TOTP
|
|
Timecop.travel(30.seconds.from_now) do
|
|
enter_code('foo')
|
|
|
|
expect(page).to have_content('Invalid two-factor code')
|
|
|
|
enter_code(user.current_otp)
|
|
|
|
expect(current_path).to eq admin_root_path
|
|
expect(page).to have_content('Admin mode enabled')
|
|
end
|
|
end
|
|
|
|
context 'using backup code' do
|
|
let(:codes) { user.generate_otp_backup_codes! }
|
|
|
|
before do
|
|
expect(codes.size).to eq 10
|
|
|
|
# Ensure the generated codes get saved
|
|
user.save
|
|
end
|
|
|
|
context 'with valid code' do
|
|
it 'allows login' do
|
|
enter_code(codes.sample)
|
|
|
|
expect(current_path).to eq admin_root_path
|
|
expect(page).to have_content('Admin mode enabled')
|
|
end
|
|
|
|
it 'invalidates the used code' do
|
|
expect { enter_code(codes.sample) }
|
|
.to change { user.reload.otp_backup_codes.size }.by(-1)
|
|
end
|
|
end
|
|
|
|
context 'with invalid code' do
|
|
it 'blocks login' do
|
|
code = codes.sample
|
|
expect(user.invalidate_otp_backup_code!(code)).to eq true
|
|
|
|
user.save!
|
|
expect(user.reload.otp_backup_codes.size).to eq 9
|
|
|
|
enter_code(code)
|
|
|
|
expect(page).to have_content('Invalid two-factor code.')
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when logging in via omniauth' do
|
|
let(:user) { create(:omniauth_user, :admin, :two_factor, extern_uid: 'my-uid', provider: 'saml')}
|
|
let(:mock_saml_response) do
|
|
File.read('spec/fixtures/authentication/saml_response.xml')
|
|
end
|
|
|
|
before do
|
|
stub_omniauth_saml_config(enabled: true, auto_link_saml_user: true, allow_single_sign_on: ['saml'],
|
|
providers: [mock_saml_config_with_upstream_two_factor_authn_contexts])
|
|
end
|
|
|
|
context 'when authn_context is worth two factors' do
|
|
let(:mock_saml_response) do
|
|
File.read('spec/fixtures/authentication/saml_response.xml')
|
|
.gsub('urn:oasis:names:tc:SAML:2.0:ac:classes:Password',
|
|
'urn:oasis:names:tc:SAML:2.0:ac:classes:SecondFactorOTPSMS')
|
|
end
|
|
|
|
it 'signs user in without prompting for second factor' do
|
|
sign_in_using_saml!
|
|
|
|
expect(page).not_to have_content('Two-Factor Authentication')
|
|
|
|
enable_admin_mode_using_saml!
|
|
|
|
expect(page).not_to have_content('Two-Factor Authentication')
|
|
expect(current_path).to eq admin_root_path
|
|
expect(page).to have_content('Admin mode enabled')
|
|
end
|
|
end
|
|
|
|
context 'when two factor authentication is required' do
|
|
it 'shows 2FA prompt after omniauth login' do
|
|
sign_in_using_saml!
|
|
|
|
expect(page).to have_content('Two-Factor Authentication')
|
|
enter_code(user.current_otp)
|
|
|
|
enable_admin_mode_using_saml!
|
|
|
|
expect(page).to have_content('Two-Factor Authentication')
|
|
|
|
# Cannot reuse the TOTP
|
|
Timecop.travel(30.seconds.from_now) do
|
|
enter_code(user.current_otp)
|
|
|
|
expect(current_path).to eq admin_root_path
|
|
expect(page).to have_content('Admin mode enabled')
|
|
end
|
|
end
|
|
end
|
|
|
|
def sign_in_using_saml!
|
|
gitlab_sign_in_via('saml', user, 'my-uid', mock_saml_response)
|
|
end
|
|
|
|
def enable_admin_mode_using_saml!
|
|
gitlab_enable_admin_mode_sign_in_via('saml', user, 'my-uid', mock_saml_response)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|