rublon-ssh/PAM/ssh/tests/passcode_auth_tests.cpp
rublon-bwi 9415174eba
Bwi/bugfix round2 (#9)
* Fix log file access, refactor configuration reading class

* Remove bypass option in favor of failmode

* fix loging, print enrolment info

* Add EMAIL method

* Add yubi authentication method

* Add support for verification message

* Add verification

* Made changes in Vagrant's files to run different OSs

* Switch off tests and packages demands to run PAM on Debian 11

* Add authentication totp

* Changes in utils

* Remove unnessesary interface

* Changed vagrant files and postinstal script for Ubuntu 20 and 22

* Moved adding PasswordAuth to vagrant file from posinst

* Added ubuntu 24.04

* Set version

* Poprawki UI

* WebSocket implementation 

* Add totp authentication method

* fixup changes in utils

* Remove unnessesary interface and simplify code

* Remove "default" message handler from WebSocket class

* Change display names of known authentication methods

* Cleanup code in 'main' file

* Add CheckApplication

* Remove unused function

* Changed vagrant files and postinstal script for Ubuntu 20 and 22

* Moved adding PasswordAuth to vagrant file from posinst

* Added ubuntu 24.04

* Set version to 2.0.2

* Proper handle for missing configuration

* Fixup use value of optional object

* Add more vCPU/RAM to vagrant VM's + fix translations

* Minor WS fixes, translations

* Proper handler for Werification error

* Make use of prompt parameter

* Add max number of prompts

* remove unused code, fir includes

* Add Waiting status

* Add check application status check

---------

Co-authored-by: Madzik <m.w@linux.pl>
2024-05-28 12:04:20 +02:00

65 lines
2.1 KiB
C++
Executable File

#include <gmock/gmock.h>
#include <rublon/method/passcode_based_auth.hpp>
#include "core_handler_mock.hpp"
#include "gtest_matchers.hpp"
#include "http_mock.hpp"
#include "pam_info_mock.hpp"
using namespace testing;
using namespace rublon;
///TODO test if lenght is checked
class PasscodeBasedAuthTest : public Test {
public:
PasscodeBasedAuthTest() : sut{systemToken, tid, name, userMessage, 6, true} {}
std::string systemToken, tid;
const char * name = "Test";
const char * userMessage = "message";
method::PasscodeBasedAuth sut;
mocks::CoreHandlerMock coreHandler;
mocks::PamInfoMock pam;
};
TEST_F(PasscodeBasedAuthTest, wrongPasscodeShouldFail) {
EXPECT_CALL(coreHandler, request(_, _)).WillOnce(Return(RawCoreResponse{}.codeConfirmationMessage().withWrongCodeResponse()));
EXPECT_CALL(pam, scan_mock(_)).WillOnce(Return("123456"));
EXPECT_CALL(pam, print_mock(_));
EXPECT_THAT(sut.handle(coreHandler, pam), Unexpected(WerificationError{WerificationError::WrongCode}));
}
TEST_F(PasscodeBasedAuthTest, whenGivenBadPasscodeWeNeedToAskAgain) {
EXPECT_CALL(coreHandler, request(_, _)).WillOnce(Return(RawCoreResponse{}.codeConfirmationMessage()));
EXPECT_CALL(pam, scan_mock(_))//
.WillOnce(Return("1_3456"))
.WillOnce(Return("123456"));
EXPECT_CALL(pam, print_mock(_) ).Times(2);
EXPECT_THAT(sut.handle(coreHandler, pam), HasValue() );
}
TEST_F(PasscodeBasedAuthTest, whenGiveenBadPasscodeMultipleTimesWeAbort) {
EXPECT_CALL(pam, scan_mock(_))//
.WillOnce(Return("1_3456"))
.WillOnce(Return("12345_"));
EXPECT_CALL(pam, print_mock(_) );
EXPECT_THAT(sut.handle(coreHandler, pam), Unexpected(WerificationError{WerificationError::WrongCode}));
}
TEST_F(PasscodeBasedAuthTest, goodPasscodeShouldPass){
EXPECT_CALL(coreHandler, request(_, _)).WillOnce(Return(RawCoreResponse{}.codeConfirmationMessage()));
EXPECT_CALL(pam, scan_mock(_)).WillOnce(Return("123456"));
EXPECT_CALL(pam, print_mock(_));
EXPECT_THAT(sut.handle(coreHandler, pam), HasValue() );
}