two_factors_test.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "testing"
  8. "time"
  9. "github.com/stretchr/testify/assert"
  10. "github.com/stretchr/testify/require"
  11. "gorm.io/gorm"
  12. "gogs.io/gogs/internal/dbtest"
  13. "gogs.io/gogs/internal/errutil"
  14. )
  15. func TestTwoFactor_BeforeCreate(t *testing.T) {
  16. now := time.Now()
  17. db := &gorm.DB{
  18. Config: &gorm.Config{
  19. SkipDefaultTransaction: true,
  20. NowFunc: func() time.Time {
  21. return now
  22. },
  23. },
  24. }
  25. t.Run("CreatedUnix has been set", func(t *testing.T) {
  26. tf := &TwoFactor{
  27. CreatedUnix: 1,
  28. }
  29. _ = tf.BeforeCreate(db)
  30. assert.Equal(t, int64(1), tf.CreatedUnix)
  31. })
  32. t.Run("CreatedUnix has not been set", func(t *testing.T) {
  33. tf := &TwoFactor{}
  34. _ = tf.BeforeCreate(db)
  35. assert.Equal(t, db.NowFunc().Unix(), tf.CreatedUnix)
  36. })
  37. }
  38. func TestTwoFactor_AfterFind(t *testing.T) {
  39. now := time.Now()
  40. db := &gorm.DB{
  41. Config: &gorm.Config{
  42. SkipDefaultTransaction: true,
  43. NowFunc: func() time.Time {
  44. return now
  45. },
  46. },
  47. }
  48. tf := &TwoFactor{
  49. CreatedUnix: now.Unix(),
  50. }
  51. _ = tf.AfterFind(db)
  52. assert.Equal(t, tf.CreatedUnix, tf.Created.Unix())
  53. }
  54. func TestTwoFactors(t *testing.T) {
  55. if testing.Short() {
  56. t.Skip()
  57. }
  58. t.Parallel()
  59. tables := []any{new(TwoFactor), new(TwoFactorRecoveryCode)}
  60. db := &twoFactors{
  61. DB: dbtest.NewDB(t, "twoFactors", tables...),
  62. }
  63. for _, tc := range []struct {
  64. name string
  65. test func(t *testing.T, db *twoFactors)
  66. }{
  67. {"Create", twoFactorsCreate},
  68. {"GetByUserID", twoFactorsGetByUserID},
  69. {"IsEnabled", twoFactorsIsEnabled},
  70. {"UseRecoveryCode", twoFactorsUseRecoveryCode},
  71. } {
  72. t.Run(tc.name, func(t *testing.T) {
  73. t.Cleanup(func() {
  74. err := clearTables(t, db.DB, tables...)
  75. require.NoError(t, err)
  76. })
  77. tc.test(t, db)
  78. })
  79. if t.Failed() {
  80. break
  81. }
  82. }
  83. }
  84. func twoFactorsCreate(t *testing.T, db *twoFactors) {
  85. ctx := context.Background()
  86. // Create a 2FA token
  87. err := db.Create(ctx, 1, "secure-key", "secure-secret")
  88. require.NoError(t, err)
  89. // Get it back and check the Created field
  90. tf, err := db.GetByUserID(ctx, 1)
  91. require.NoError(t, err)
  92. assert.Equal(t, db.NowFunc().Format(time.RFC3339), tf.Created.UTC().Format(time.RFC3339))
  93. // Verify there are 10 recover codes generated
  94. var count int64
  95. err = db.Model(new(TwoFactorRecoveryCode)).Count(&count).Error
  96. require.NoError(t, err)
  97. assert.Equal(t, int64(10), count)
  98. }
  99. func twoFactorsGetByUserID(t *testing.T, db *twoFactors) {
  100. ctx := context.Background()
  101. // Create a 2FA token for user 1
  102. err := db.Create(ctx, 1, "secure-key", "secure-secret")
  103. require.NoError(t, err)
  104. // We should be able to get it back
  105. _, err = db.GetByUserID(ctx, 1)
  106. require.NoError(t, err)
  107. // Try to get a non-existent 2FA token
  108. _, err = db.GetByUserID(ctx, 2)
  109. wantErr := ErrTwoFactorNotFound{args: errutil.Args{"userID": int64(2)}}
  110. assert.Equal(t, wantErr, err)
  111. }
  112. func twoFactorsIsEnabled(t *testing.T, db *twoFactors) {
  113. ctx := context.Background()
  114. // Create a 2FA token for user 1
  115. err := db.Create(ctx, 1, "secure-key", "secure-secret")
  116. require.NoError(t, err)
  117. assert.True(t, db.IsEnabled(ctx, 1))
  118. assert.False(t, db.IsEnabled(ctx, 2))
  119. }
  120. func twoFactorsUseRecoveryCode(t *testing.T, db *twoFactors) {
  121. ctx := context.Background()
  122. // Create 2FA tokens for two users
  123. err := db.Create(ctx, 1, "secure-key", "secure-secret")
  124. require.NoError(t, err)
  125. err = db.Create(ctx, 2, "secure-key", "secure-secret")
  126. require.NoError(t, err)
  127. // Get recovery codes for both users
  128. var user1Codes []TwoFactorRecoveryCode
  129. err = db.DB.Where("user_id = ?", 1).Find(&user1Codes).Error
  130. require.NoError(t, err)
  131. require.NotEmpty(t, user1Codes)
  132. var user2Codes []TwoFactorRecoveryCode
  133. err = db.DB.Where("user_id = ?", 2).Find(&user2Codes).Error
  134. require.NoError(t, err)
  135. require.NotEmpty(t, user2Codes)
  136. // User 1 should be able to use their own recovery code
  137. err = db.UseRecoveryCode(ctx, 1, user1Codes[0].Code)
  138. require.NoError(t, err)
  139. // Verify the code is now marked as used
  140. var usedCode TwoFactorRecoveryCode
  141. err = db.DB.Where("id = ?", user1Codes[0].ID).First(&usedCode).Error
  142. require.NoError(t, err)
  143. assert.True(t, usedCode.IsUsed)
  144. // User 1 should NOT be able to use user 2's recovery code
  145. // This is the key security test - recovery codes must be scoped by user
  146. err = db.UseRecoveryCode(ctx, 1, user2Codes[0].Code)
  147. assert.True(t, IsTwoFactorRecoveryCodeNotFound(err), "expected recovery code not found error when using another user's code")
  148. // User 2's code should still be unused
  149. var user2Code TwoFactorRecoveryCode
  150. err = db.DB.Where("id = ?", user2Codes[0].ID).First(&user2Code).Error
  151. require.NoError(t, err)
  152. assert.False(t, user2Code.IsUsed, "user 2's recovery code should not be marked as used")
  153. // User 2 should be able to use their own code
  154. err = db.UseRecoveryCode(ctx, 2, user2Codes[0].Code)
  155. require.NoError(t, err)
  156. // Using an already-used code should fail
  157. err = db.UseRecoveryCode(ctx, 1, user1Codes[0].Code)
  158. assert.True(t, IsTwoFactorRecoveryCodeNotFound(err), "expected error when reusing a recovery code")
  159. // Using a non-existent code should fail
  160. err = db.UseRecoveryCode(ctx, 1, "invalid-code")
  161. assert.True(t, IsTwoFactorRecoveryCodeNotFound(err), "expected error for invalid recovery code")
  162. }