Welcome to mirror list, hosted at ThFree Co, Russian Federation.

APITest.php « Integration « tests « TwoFactorAuth « plugins - github.com/matomo-org/matomo.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: af73c410d382760e6947b7de8f49174049abefd5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
<?php
/**
 * Matomo - free/libre analytics platform
 *
 * @link https://matomo.org
 * @license http://www.gnu.org/licenses/gpl-3.0.html GPL v3 or later
 */

namespace Piwik\Plugins\TwoFactorAuth\tests\Integration;

use Piwik\Container\StaticContainer;
use Piwik\Plugins\TwoFactorAuth\API;
use Piwik\Plugins\TwoFactorAuth\Dao\RecoveryCodeDao;
use Piwik\Plugins\TwoFactorAuth\TwoFactorAuthentication;
use Piwik\Plugins\UsersManager\API as UsersAPI;
use Piwik\Tests\Framework\Fixture;
use Piwik\Tests\Framework\Mock\FakeAccess;
use Piwik\Tests\Framework\TestCase\IntegrationTestCase;

/**
 * @group TwoFactorAuth
 * @group APITest
 * @group Plugins
 */
class APITest extends IntegrationTestCase
{
    /**
     * @var API
     */
    private $api;

    /**
     * @var RecoveryCodeDao
     */
    private $recoveryCodes;

    /**
     * @var TwoFactorAuthentication
     */
    private $twoFa;

    public function setUp(): void
    {
        parent::setUp();

        $this->api = API::getInstance();
        $this->recoveryCodes = StaticContainer::get(RecoveryCodeDao::class);

        foreach ([1,2,3] as $idsite) {
            Fixture::createWebsite('2014-01-02 03:04:05');
        }

        foreach (['mylogin1', 'mylogin2'] as $user) {
            UsersAPI::getInstance()->addUser($user, '123abcDk3_l3', $user . '@matomo.org');
        }
        $this->twoFa = StaticContainer::get(TwoFactorAuthentication::class);
    }

    public function test_resetTwoFactorAuth_failsWhenNotPermissions()
    {
        $this->expectException(\Exception::class);
        $this->expectExceptionMessage('checkUserHasSuperUserAccess Fake exception');

        $this->setAdminUser();
        $this->api->resetTwoFactorAuth('login');
    }

    public function test_resetTwoFactorAuth_resetsSecret()
    {
        $this->recoveryCodes->createRecoveryCodesForLogin('mylogin1');
        $this->recoveryCodes->createRecoveryCodesForLogin('mylogin2');
        $this->twoFa->saveSecret('mylogin1', '1234');
        $this->twoFa->saveSecret('mylogin2', '1234');

        $this->assertTrue(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin1'));
        $this->assertTrue(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin2'));
        $this->api->resetTwoFactorAuth('mylogin1');
        $this->assertFalse(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin1'));
        $this->assertTrue(TwoFactorAuthentication::isUserUsingTwoFactorAuthentication('mylogin2'));

        $this->assertEquals([], $this->recoveryCodes->getAllRecoveryCodesForLogin('mylogin1'));
    }

    protected function setAdminUser()
    {
        FakeAccess::clearAccess(false);
        FakeAccess::$identity = 'testUser';
        FakeAccess::$idSitesView = array();
        FakeAccess::$idSitesAdmin = array(1,2,3);
    }

    public function provideContainerConfig()
    {
        return array(
            'Piwik\Access' => new FakeAccess()
        );
    }
}