diff options
author | Joram Wilander <jwawilander@gmail.com> | 2017-03-27 09:21:48 -0400 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-03-27 09:21:48 -0400 |
commit | 58397f853a31773f24ad4e62dc1f34df0a975d53 (patch) | |
tree | c2055df17b6347199bf48054d606cf1b3b0e89c2 /api4/user_test.go | |
parent | a0d5c01dfd97b45478353ccff777de677f088d0f (diff) | |
download | chat-58397f853a31773f24ad4e62dc1f34df0a975d53.tar.gz chat-58397f853a31773f24ad4e62dc1f34df0a975d53.tar.bz2 chat-58397f853a31773f24ad4e62dc1f34df0a975d53.zip |
Implement some MFA endpoints for APIv4 (#5864)
Diffstat (limited to 'api4/user_test.go')
-rw-r--r-- | api4/user_test.go | 80 |
1 files changed, 80 insertions, 0 deletions
diff --git a/api4/user_test.go b/api4/user_test.go index 3bdc73045..39a7dce10 100644 --- a/api4/user_test.go +++ b/api4/user_test.go @@ -1009,6 +1009,86 @@ func TestGetUsersNotInChannel(t *testing.T) { CheckNotImplementedStatus(t, resp) }*/ +func TestCheckUserMfa(t *testing.T) { + th := Setup().InitBasic().InitSystemAdmin() + defer TearDown() + Client := th.Client + + required, resp := Client.CheckUserMfa(th.BasicUser.Email) + CheckNoError(t, resp) + + if required { + t.Fatal("should be false - mfa not active") + } + + _, resp = Client.CheckUserMfa("") + CheckBadRequestStatus(t, resp) + + Client.Logout() + + required, resp = Client.CheckUserMfa(th.BasicUser.Email) + CheckNoError(t, resp) + + if required { + t.Fatal("should be false - mfa not active") + } + + isLicensed := utils.IsLicensed + license := utils.License + enableMfa := *utils.Cfg.ServiceSettings.EnableMultifactorAuthentication + defer func() { + utils.IsLicensed = isLicensed + utils.License = license + *utils.Cfg.ServiceSettings.EnableMultifactorAuthentication = enableMfa + }() + utils.IsLicensed = true + utils.License = &model.License{Features: &model.Features{}} + utils.License.Features.SetDefaults() + *utils.License.Features.MFA = true + *utils.Cfg.ServiceSettings.EnableMultifactorAuthentication = true + + th.LoginBasic() + + required, resp = Client.CheckUserMfa(th.BasicUser.Email) + CheckNoError(t, resp) + + if required { + t.Fatal("should be false - mfa not active") + } + + Client.Logout() + + required, resp = Client.CheckUserMfa(th.BasicUser.Email) + CheckNoError(t, resp) + + if required { + t.Fatal("should be false - mfa not active") + } +} + +func TestGenerateMfaSecret(t *testing.T) { + th := Setup().InitBasic().InitSystemAdmin() + defer TearDown() + Client := th.Client + + _, resp := Client.GenerateMfaSecret(th.BasicUser.Id) + CheckNotImplementedStatus(t, resp) + + _, resp = Client.GenerateMfaSecret("junk") + CheckBadRequestStatus(t, resp) + + _, resp = Client.GenerateMfaSecret(model.NewId()) + CheckForbiddenStatus(t, resp) + + Client.Logout() + + _, resp = Client.GenerateMfaSecret(th.BasicUser.Id) + CheckUnauthorizedStatus(t, resp) + + _, resp = th.SystemAdminClient.GenerateMfaSecret(th.BasicUser.Id) + CheckNotImplementedStatus(t, resp) +} + func TestUpdateUserPassword(t *testing.T) { th := Setup().InitBasic().InitSystemAdmin() defer TearDown() |