summaryrefslogtreecommitdiffstats
path: root/api4/user_test.go
diff options
context:
space:
mode:
authorJoram Wilander <jwawilander@gmail.com>2017-03-27 09:21:48 -0400
committerGitHub <noreply@github.com>2017-03-27 09:21:48 -0400
commit58397f853a31773f24ad4e62dc1f34df0a975d53 (patch)
treec2055df17b6347199bf48054d606cf1b3b0e89c2 /api4/user_test.go
parenta0d5c01dfd97b45478353ccff777de677f088d0f (diff)
downloadchat-58397f853a31773f24ad4e62dc1f34df0a975d53.tar.gz
chat-58397f853a31773f24ad4e62dc1f34df0a975d53.tar.bz2
chat-58397f853a31773f24ad4e62dc1f34df0a975d53.zip
Implement some MFA endpoints for APIv4 (#5864)
Diffstat (limited to 'api4/user_test.go')
-rw-r--r--api4/user_test.go80
1 files changed, 80 insertions, 0 deletions
diff --git a/api4/user_test.go b/api4/user_test.go
index 3bdc73045..39a7dce10 100644
--- a/api4/user_test.go
+++ b/api4/user_test.go
@@ -1009,6 +1009,86 @@ func TestGetUsersNotInChannel(t *testing.T) {
CheckNotImplementedStatus(t, resp)
}*/
+func TestCheckUserMfa(t *testing.T) {
+ th := Setup().InitBasic().InitSystemAdmin()
+ defer TearDown()
+ Client := th.Client
+
+ required, resp := Client.CheckUserMfa(th.BasicUser.Email)
+ CheckNoError(t, resp)
+
+ if required {
+ t.Fatal("should be false - mfa not active")
+ }
+
+ _, resp = Client.CheckUserMfa("")
+ CheckBadRequestStatus(t, resp)
+
+ Client.Logout()
+
+ required, resp = Client.CheckUserMfa(th.BasicUser.Email)
+ CheckNoError(t, resp)
+
+ if required {
+ t.Fatal("should be false - mfa not active")
+ }
+
+ isLicensed := utils.IsLicensed
+ license := utils.License
+ enableMfa := *utils.Cfg.ServiceSettings.EnableMultifactorAuthentication
+ defer func() {
+ utils.IsLicensed = isLicensed
+ utils.License = license
+ *utils.Cfg.ServiceSettings.EnableMultifactorAuthentication = enableMfa
+ }()
+ utils.IsLicensed = true
+ utils.License = &model.License{Features: &model.Features{}}
+ utils.License.Features.SetDefaults()
+ *utils.License.Features.MFA = true
+ *utils.Cfg.ServiceSettings.EnableMultifactorAuthentication = true
+
+ th.LoginBasic()
+
+ required, resp = Client.CheckUserMfa(th.BasicUser.Email)
+ CheckNoError(t, resp)
+
+ if required {
+ t.Fatal("should be false - mfa not active")
+ }
+
+ Client.Logout()
+
+ required, resp = Client.CheckUserMfa(th.BasicUser.Email)
+ CheckNoError(t, resp)
+
+ if required {
+ t.Fatal("should be false - mfa not active")
+ }
+}
+
+func TestGenerateMfaSecret(t *testing.T) {
+ th := Setup().InitBasic().InitSystemAdmin()
+ defer TearDown()
+ Client := th.Client
+
+ _, resp := Client.GenerateMfaSecret(th.BasicUser.Id)
+ CheckNotImplementedStatus(t, resp)
+
+ _, resp = Client.GenerateMfaSecret("junk")
+ CheckBadRequestStatus(t, resp)
+
+ _, resp = Client.GenerateMfaSecret(model.NewId())
+ CheckForbiddenStatus(t, resp)
+
+ Client.Logout()
+
+ _, resp = Client.GenerateMfaSecret(th.BasicUser.Id)
+ CheckUnauthorizedStatus(t, resp)
+
+ _, resp = th.SystemAdminClient.GenerateMfaSecret(th.BasicUser.Id)
+ CheckNotImplementedStatus(t, resp)
+}
+
func TestUpdateUserPassword(t *testing.T) {
th := Setup().InitBasic().InitSystemAdmin()
defer TearDown()