two_factors_test.go 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194
  1. // Copyright 2020 The Gogs Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package db
  5. import (
  6. "context"
  7. "testing"
  8. "time"
  9. "github.com/stretchr/testify/assert"
  10. "github.com/stretchr/testify/require"
  11. "gorm.io/gorm"
  12. "gogs.io/gogs/internal/dbtest"
  13. "gogs.io/gogs/internal/errutil"
  14. )
  15. func TestTwoFactor_BeforeCreate(t *testing.T) {
  16. now := time.Now()
  17. db := &gorm.DB{
  18. Config: &gorm.Config{
  19. SkipDefaultTransaction: true,
  20. NowFunc: func() time.Time {
  21. return now
  22. },
  23. },
  24. }
  25. t.Run("CreatedUnix has been set", func(t *testing.T) {
  26. tf := &TwoFactor{
  27. CreatedUnix: 1,
  28. }
  29. _ = tf.BeforeCreate(db)
  30. assert.Equal(t, int64(1), tf.CreatedUnix)
  31. })
  32. t.Run("CreatedUnix has not been set", func(t *testing.T) {
  33. tf := &TwoFactor{}
  34. _ = tf.BeforeCreate(db)
  35. assert.Equal(t, db.NowFunc().Unix(), tf.CreatedUnix)
  36. })
  37. }
  38. func TestTwoFactor_AfterFind(t *testing.T) {
  39. now := time.Now()
  40. db := &gorm.DB{
  41. Config: &gorm.Config{
  42. SkipDefaultTransaction: true,
  43. NowFunc: func() time.Time {
  44. return now
  45. },
  46. },
  47. }
  48. tf := &TwoFactor{
  49. CreatedUnix: now.Unix(),
  50. }
  51. _ = tf.AfterFind(db)
  52. assert.Equal(t, tf.CreatedUnix, tf.Created.Unix())
  53. }
  54. func TestTwoFactors(t *testing.T) {
  55. if testing.Short() {
  56. t.Skip()
  57. }
  58. t.Parallel()
  59. tables := []any{new(TwoFactor), new(TwoFactorRecoveryCode)}
  60. db := &twoFactors{
  61. DB: dbtest.NewDB(t, "twoFactors", tables...),
  62. }
  63. for _, tc := range []struct {
  64. name string
  65. test func(t *testing.T, db *twoFactors)
  66. }{
  67. {"Create", twoFactorsCreate},
  68. {"GetByUserID", twoFactorsGetByUserID},
  69. {"IsEnabled", twoFactorsIsEnabled},
  70. {"UseRecoveryCode", twoFactorsUseRecoveryCode},
  71. } {
  72. t.Run(tc.name, func(t *testing.T) {
  73. t.Cleanup(func() {
  74. err := clearTables(t, db.DB, tables...)
  75. require.NoError(t, err)
  76. })
  77. tc.test(t, db)
  78. })
  79. if t.Failed() {
  80. break
  81. }
  82. }
  83. }
  84. func twoFactorsCreate(t *testing.T, db *twoFactors) {
  85. ctx := context.Background()
  86. // Create a 2FA token
  87. err := db.Create(ctx, 1, "secure-key", "secure-secret")
  88. require.NoError(t, err)
  89. // Get it back and check the Created field
  90. tf, err := db.GetByUserID(ctx, 1)
  91. require.NoError(t, err)
  92. assert.Equal(t, db.NowFunc().Format(time.RFC3339), tf.Created.UTC().Format(time.RFC3339))
  93. // Verify there are 10 recover codes generated
  94. var count int64
  95. err = db.Model(new(TwoFactorRecoveryCode)).Count(&count).Error
  96. require.NoError(t, err)
  97. assert.Equal(t, int64(10), count)
  98. }
  99. func twoFactorsGetByUserID(t *testing.T, db *twoFactors) {
  100. ctx := context.Background()
  101. // Create a 2FA token for user 1
  102. err := db.Create(ctx, 1, "secure-key", "secure-secret")
  103. require.NoError(t, err)
  104. // We should be able to get it back
  105. _, err = db.GetByUserID(ctx, 1)
  106. require.NoError(t, err)
  107. // Try to get a non-existent 2FA token
  108. _, err = db.GetByUserID(ctx, 2)
  109. wantErr := ErrTwoFactorNotFound{args: errutil.Args{"userID": int64(2)}}
  110. assert.Equal(t, wantErr, err)
  111. }
  112. func twoFactorsIsEnabled(t *testing.T, db *twoFactors) {
  113. ctx := context.Background()
  114. // Create a 2FA token for user 1
  115. err := db.Create(ctx, 1, "secure-key", "secure-secret")
  116. require.NoError(t, err)
  117. assert.True(t, db.IsEnabled(ctx, 1))
  118. assert.False(t, db.IsEnabled(ctx, 2))
  119. }
  120. func twoFactorsUseRecoveryCode(t *testing.T, ctx context.Context, s *TwoFactorsStore) {
  121. // Create 2FA tokens for two users
  122. err := s.Create(ctx, 1, "secure-key", "secure-secret")
  123. require.NoError(t, err)
  124. err = s.Create(ctx, 2, "secure-key", "secure-secret")
  125. require.NoError(t, err)
  126. // Get recovery codes for both users
  127. var user1Codes []TwoFactorRecoveryCode
  128. err = s.db.Where("user_id = ?", 1).Find(&user1Codes).Error
  129. require.NoError(t, err)
  130. require.NotEmpty(t, user1Codes)
  131. var user2Codes []TwoFactorRecoveryCode
  132. err = s.db.Where("user_id = ?", 2).Find(&user2Codes).Error
  133. require.NoError(t, err)
  134. require.NotEmpty(t, user2Codes)
  135. // User 1 should be able to use their own recovery code
  136. err = s.UseRecoveryCode(ctx, 1, user1Codes[0].Code)
  137. require.NoError(t, err)
  138. // Verify the code is now marked as used
  139. var usedCode TwoFactorRecoveryCode
  140. err = s.db.Where("id = ?", user1Codes[0].ID).First(&usedCode).Error
  141. require.NoError(t, err)
  142. assert.True(t, usedCode.IsUsed)
  143. // User 1 should NOT be able to use user 2's recovery code
  144. // This is the key security test - recovery codes must be scoped by user
  145. err = s.UseRecoveryCode(ctx, 1, user2Codes[0].Code)
  146. assert.True(t, IsTwoFactorRecoveryCodeNotFound(err), "expected recovery code not found error when using another user's code")
  147. // User 2's code should still be unused
  148. var user2Code TwoFactorRecoveryCode
  149. err = s.db.Where("id = ?", user2Codes[0].ID).First(&user2Code).Error
  150. require.NoError(t, err)
  151. assert.False(t, user2Code.IsUsed, "user 2's recovery code should not be marked as used")
  152. // User 2 should be able to use their own code
  153. err = s.UseRecoveryCode(ctx, 2, user2Codes[0].Code)
  154. require.NoError(t, err)
  155. // Using an already-used code should fail
  156. err = s.UseRecoveryCode(ctx, 1, user1Codes[0].Code)
  157. assert.True(t, IsTwoFactorRecoveryCodeNotFound(err), "expected error when reusing a recovery code")
  158. // Using a non-existent code should fail
  159. err = s.UseRecoveryCode(ctx, 1, "invalid-code")
  160. assert.True(t, IsTwoFactorRecoveryCodeNotFound(err), "expected error for invalid recovery code")
  161. }