mirror of
				https://github.com/pelican-dev/panel.git
				synced 2025-11-04 03:46:52 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			190 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			190 lines
		
	
	
		
			6.1 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
 | 
						|
namespace Tests\Unit\Http\Middleware;
 | 
						|
 | 
						|
use Mockery as m;
 | 
						|
use Pterodactyl\Models\User;
 | 
						|
use Illuminate\Http\RedirectResponse;
 | 
						|
use Prologue\Alerts\AlertsMessageBag;
 | 
						|
use Pterodactyl\Http\Middleware\RequireTwoFactorAuthentication;
 | 
						|
 | 
						|
class RequireTwoFactorAuthenticationTest extends MiddlewareTestCase
 | 
						|
{
 | 
						|
    /**
 | 
						|
     * @var \Prologue\Alerts\AlertsMessageBag|\Mockery\Mock
 | 
						|
     */
 | 
						|
    private $alert;
 | 
						|
 | 
						|
    /**
 | 
						|
     * Setup tests.
 | 
						|
     */
 | 
						|
    public function setUp()
 | 
						|
    {
 | 
						|
        parent::setUp();
 | 
						|
 | 
						|
        $this->alert = m::mock(AlertsMessageBag::class);
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test that a missing user does not trigger this middleware.
 | 
						|
     */
 | 
						|
    public function testRequestMissingUser()
 | 
						|
    {
 | 
						|
        $this->setRequestUserModel(null);
 | 
						|
 | 
						|
        $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test that the middleware is ignored on specific routes.
 | 
						|
     *
 | 
						|
     * @dataProvider ignoredRoutesDataProvider
 | 
						|
     * @param string $route
 | 
						|
     */
 | 
						|
    public function testRequestOnIgnoredRoute($route)
 | 
						|
    {
 | 
						|
        $this->generateRequestUserModel();
 | 
						|
        $this->setRequestRouteName($route);
 | 
						|
 | 
						|
        $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test disabled 2FA requirement.
 | 
						|
     */
 | 
						|
    public function testTwoFactorRequirementDisabled()
 | 
						|
    {
 | 
						|
        $this->generateRequestUserModel();
 | 
						|
        $this->setRequestRouteName('random.route');
 | 
						|
        $this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_NONE);
 | 
						|
 | 
						|
        $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test that an invalid value for the level skips the check and continues with the request.
 | 
						|
     */
 | 
						|
    public function testTwoFactorRequirementWithInvalidValue()
 | 
						|
    {
 | 
						|
        $this->generateRequestUserModel();
 | 
						|
        $this->setRequestRouteName('random.route');
 | 
						|
        $this->setRequirementLevel(333);
 | 
						|
 | 
						|
        $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test 2FA required for admins as an administrative user who has 2FA disabled.
 | 
						|
     */
 | 
						|
    public function testTwoFactorEnabledForAdminsAsAdminUserWith2FADisabled()
 | 
						|
    {
 | 
						|
        $user = factory(User::class)->make(['root_admin' => 1, 'use_totp' => 0]);
 | 
						|
        $this->setRequestUserModel($user);
 | 
						|
        $this->setRequestRouteName('random.route');
 | 
						|
        $this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ADMIN);
 | 
						|
 | 
						|
        $this->alert->shouldReceive('danger')->with(trans('auth.2fa_must_be_enabled'))->once()->andReturnSelf();
 | 
						|
        $this->alert->shouldReceive('flash')->withNoArgs()->once()->andReturnSelf();
 | 
						|
 | 
						|
        $response = $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
        $this->assertInstanceOf(RedirectResponse::class, $response);
 | 
						|
        $this->assertEquals(route('account'), $response->getTargetUrl());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test 2FA required for admins as an administrative user who has 2FA enabled.
 | 
						|
     */
 | 
						|
    public function testTwoFactorEnabledForAdminsAsAdminUserWith2FAEnabled()
 | 
						|
    {
 | 
						|
        $user = factory(User::class)->make(['root_admin' => 1, 'use_totp' => 1]);
 | 
						|
        $this->setRequestUserModel($user);
 | 
						|
        $this->setRequestRouteName('random.route');
 | 
						|
        $this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ADMIN);
 | 
						|
 | 
						|
        $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test 2FA required for admins as an administrative user.
 | 
						|
     */
 | 
						|
    public function testTwoFactorEnabledForAdminsAsNonAdmin()
 | 
						|
    {
 | 
						|
        $user = factory(User::class)->make(['root_admin' => 0]);
 | 
						|
        $this->setRequestUserModel($user);
 | 
						|
        $this->setRequestRouteName('random.route');
 | 
						|
        $this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ADMIN);
 | 
						|
 | 
						|
        $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test 2FA required for all users without 2FA enabled.
 | 
						|
     */
 | 
						|
    public function testTwoFactorEnabledForAllUsersAsUserWith2FADisabled()
 | 
						|
    {
 | 
						|
        $user = factory(User::class)->make(['use_totp' => 0]);
 | 
						|
        $this->setRequestUserModel($user);
 | 
						|
        $this->setRequestRouteName('random.route');
 | 
						|
        $this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ALL);
 | 
						|
 | 
						|
        $this->alert->shouldReceive('danger')->with(trans('auth.2fa_must_be_enabled'))->once()->andReturnSelf();
 | 
						|
        $this->alert->shouldReceive('flash')->withNoArgs()->once()->andReturnSelf();
 | 
						|
 | 
						|
        $response = $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
        $this->assertInstanceOf(RedirectResponse::class, $response);
 | 
						|
        $this->assertEquals(route('account'), $response->getTargetUrl());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Test 2FA required for all users without 2FA enabled.
 | 
						|
     */
 | 
						|
    public function testTwoFactorEnabledForAllUsersAsUserWith2FAEnabled()
 | 
						|
    {
 | 
						|
        $user = factory(User::class)->make(['use_totp' => 1]);
 | 
						|
        $this->setRequestUserModel($user);
 | 
						|
        $this->setRequestRouteName('random.route');
 | 
						|
        $this->setRequirementLevel(RequireTwoFactorAuthentication::LEVEL_ALL);
 | 
						|
 | 
						|
        $this->getMiddleware()->handle($this->request, $this->getClosureAssertions());
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Routes that should be ignored.
 | 
						|
     *
 | 
						|
     * @return array
 | 
						|
     */
 | 
						|
    public function ignoredRoutesDataProvider()
 | 
						|
    {
 | 
						|
        return [
 | 
						|
            ['auth'],
 | 
						|
            ['account'],
 | 
						|
            ['account.security.revoke'],
 | 
						|
            ['account.security.totp'],
 | 
						|
            ['account.security.totp.set'],
 | 
						|
            ['account.security.totp.disable'],
 | 
						|
            ['auth.totp'],
 | 
						|
            ['auth.logout'],
 | 
						|
        ];
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Return an instance of the middleware using mocked dependencies.
 | 
						|
     *
 | 
						|
     * @return \Pterodactyl\Http\Middleware\RequireTwoFactorAuthentication
 | 
						|
     */
 | 
						|
    private function getMiddleware(): RequireTwoFactorAuthentication
 | 
						|
    {
 | 
						|
        return new RequireTwoFactorAuthentication($this->alert);
 | 
						|
    }
 | 
						|
 | 
						|
    /**
 | 
						|
     * Set the authentication level requirement.
 | 
						|
     *
 | 
						|
     * @param int $level
 | 
						|
     */
 | 
						|
    private function setRequirementLevel(int $level)
 | 
						|
    {
 | 
						|
        config()->set('pterodactyl.auth.2fa_required', $level);
 | 
						|
    }
 | 
						|
}
 |