* Fix log file access, refactor configuration reading class * Remove bypass option in favor of failmode * fix loging, print enrolment info * Add EMAIL method * Add yubi authentication method * Add support for verification message * Add verification * Made changes in Vagrant's files to run different OSs * Switch off tests and packages demands to run PAM on Debian 11 * Add authentication totp * Changes in utils * Remove unnessesary interface * Changed vagrant files and postinstal script for Ubuntu 20 and 22 * Moved adding PasswordAuth to vagrant file from posinst * Added ubuntu 24.04 * Set version * Poprawki UI * WebSocket implementation * Add totp authentication method * fixup changes in utils * Remove unnessesary interface and simplify code * Remove "default" message handler from WebSocket class * Change display names of known authentication methods * Cleanup code in 'main' file * Add CheckApplication * Remove unused function * Changed vagrant files and postinstal script for Ubuntu 20 and 22 * Moved adding PasswordAuth to vagrant file from posinst * Added ubuntu 24.04 * Set version to 2.0.2 * Proper handle for missing configuration * Fixup use value of optional object * Add more vCPU/RAM to vagrant VM's + fix translations * Minor WS fixes, translations * Proper handler for Werification error * Make use of prompt parameter * Add max number of prompts * remove unused code, fir includes * Add Waiting status * Add check application status check --------- Co-authored-by: Madzik <m.w@linux.pl>
65 lines
2.1 KiB
C++
Executable File
65 lines
2.1 KiB
C++
Executable File
#include <gmock/gmock.h>
|
|
|
|
#include <rublon/method/passcode_based_auth.hpp>
|
|
|
|
#include "core_handler_mock.hpp"
|
|
#include "gtest_matchers.hpp"
|
|
#include "http_mock.hpp"
|
|
#include "pam_info_mock.hpp"
|
|
|
|
using namespace testing;
|
|
using namespace rublon;
|
|
|
|
|
|
///TODO test if lenght is checked
|
|
class PasscodeBasedAuthTest : public Test {
|
|
public:
|
|
PasscodeBasedAuthTest() : sut{systemToken, tid, name, userMessage, 6, true} {}
|
|
|
|
std::string systemToken, tid;
|
|
const char * name = "Test";
|
|
const char * userMessage = "message";
|
|
method::PasscodeBasedAuth sut;
|
|
|
|
mocks::CoreHandlerMock coreHandler;
|
|
mocks::PamInfoMock pam;
|
|
};
|
|
|
|
TEST_F(PasscodeBasedAuthTest, wrongPasscodeShouldFail) {
|
|
EXPECT_CALL(coreHandler, request(_, _)).WillOnce(Return(RawCoreResponse{}.codeConfirmationMessage().withWrongCodeResponse()));
|
|
EXPECT_CALL(pam, scan_mock(_)).WillOnce(Return("123456"));
|
|
EXPECT_CALL(pam, print_mock(_));
|
|
|
|
EXPECT_THAT(sut.handle(coreHandler, pam), Unexpected(WerificationError{WerificationError::WrongCode}));
|
|
}
|
|
|
|
TEST_F(PasscodeBasedAuthTest, whenGivenBadPasscodeWeNeedToAskAgain) {
|
|
EXPECT_CALL(coreHandler, request(_, _)).WillOnce(Return(RawCoreResponse{}.codeConfirmationMessage()));
|
|
|
|
EXPECT_CALL(pam, scan_mock(_))//
|
|
.WillOnce(Return("1_3456"))
|
|
.WillOnce(Return("123456"));
|
|
|
|
EXPECT_CALL(pam, print_mock(_) ).Times(2);
|
|
|
|
EXPECT_THAT(sut.handle(coreHandler, pam), HasValue() );
|
|
}
|
|
|
|
TEST_F(PasscodeBasedAuthTest, whenGiveenBadPasscodeMultipleTimesWeAbort) {
|
|
EXPECT_CALL(pam, scan_mock(_))//
|
|
.WillOnce(Return("1_3456"))
|
|
.WillOnce(Return("12345_"));
|
|
|
|
EXPECT_CALL(pam, print_mock(_) );
|
|
|
|
EXPECT_THAT(sut.handle(coreHandler, pam), Unexpected(WerificationError{WerificationError::WrongCode}));
|
|
}
|
|
|
|
TEST_F(PasscodeBasedAuthTest, goodPasscodeShouldPass){
|
|
EXPECT_CALL(coreHandler, request(_, _)).WillOnce(Return(RawCoreResponse{}.codeConfirmationMessage()));
|
|
EXPECT_CALL(pam, scan_mock(_)).WillOnce(Return("123456"));
|
|
EXPECT_CALL(pam, print_mock(_));
|
|
|
|
EXPECT_THAT(sut.handle(coreHandler, pam), HasValue() );
|
|
}
|