1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113
|
<?php
/**
* Matomo - free/libre analytics platform
*
* @link https://matomo.org
* @license https://www.gnu.org/licenses/gpl-3.0.html GPL v3 or later
*/
namespace Piwik\Plugins\TwoFactorAuth\tests\Integration;
use Piwik\Container\StaticContainer;
use Piwik\Piwik;
use Piwik\Plugins\TwoFactorAuth\API;
use Piwik\Plugins\TwoFactorAuth\Dao\RecoveryCodeDao;
use Piwik\Plugins\TwoFactorAuth\TwoFactorAuthentication;
use Piwik\Plugins\UsersManager\API as UsersAPI;
use Piwik\Tests\Framework\Fixture;
use Piwik\Tests\Framework\Mock\FakeAccess;
use Piwik\Tests\Framework\TestCase\IntegrationTestCase;
/**
* @group TwoFactorAuth
* @group APITest
* @group Plugins
*/
class APITest extends IntegrationTestCase
{
/**
* @var API
*/
private $api;
/**
* @var RecoveryCodeDao
*/
private $recoveryCodes;
/**
* @var TwoFactorAuthentication
*/
private $twoFa;
public function setUp(): void
{
parent::setUp();
$this->api = API::getInstance();
$this->recoveryCodes = StaticContainer::get(RecoveryCodeDao::class);
foreach ([1,2,3] as $idsite) {
Fixture::createWebsite('2014-01-02 03:04:05');
}
foreach (['mylogin1', 'mylogin2', 'login'] as $user) {
UsersAPI::getInstance()->addUser($user, '123abcDk3_l3', $user . '@matomo.org');
}
$this->twoFa = StaticContainer::get(TwoFactorAuthentication::class);
}
public function testResetTwoFactorAuthFailsWhenNotPermissions()
{
$this->expectException(\Exception::class);
$this->expectExceptionMessage('checkUserHasSuperUserAccess Fake exception');
$this->setAdminUser();
$this->api->resetTwoFactorAuth('login', Fixture::ADMIN_USER_PASSWORD);
}
public function testResetTwoFactorAuthResetsSecret()
{
$this->recoveryCodes->createRecoveryCodesForLogin('mylogin1');
$this->recoveryCodes->createRecoveryCodesForLogin('mylogin2');
$this->twoFa->saveSecret('mylogin1', '1234');
$this->twoFa->saveSecret('mylogin2', '1234');
$this->assertTrue(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin1'));
$this->assertTrue(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin2'));
$this->api->resetTwoFactorAuth('mylogin1', Fixture::ADMIN_USER_PASSWORD);
$this->assertFalse(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin1'));
$this->assertTrue(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin2'));
$this->assertEquals([], $this->recoveryCodes->getAllRecoveryCodesForLogin('mylogin1'));
//Reset without a password
Piwik::addAction('Login.userRequiresPasswordConfirmation', function (&$requiresPasswordConfirmation) {
$requiresPasswordConfirmation = false;
});
$this->api->resetTwoFactorAuth('mylogin2');
$this->assertFalse(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin2'));
}
protected function setAdminUser()
{
FakeAccess::clearAccess(false);
FakeAccess::$identity = 'testUser';
FakeAccess::$idSitesView = array();
FakeAccess::$idSitesAdmin = array(1,2,3);
}
public function provideContainerConfig()
{
return array(
'Piwik\Access' => new FakeAccess(),
);
}
protected static function configureFixture($fixture)
{
parent::configureFixture($fixture);
$fixture->createSuperUser = true;
}
}
|