You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
cartodb/spec/requests/sessions_spec.rb

398 lines
16 KiB

require_relative '../acceptance_helper'
require_relative '../factories/visualization_creation_helpers'
def org_login_url(organization)
login_url(host: "#{organization.name}.localhost.lan", port: Capybara.server_port)
end
def submit_login(user, password)
fill_in 'email', with: user.email
fill_in 'password', with: password
click_link_or_button 'Log in'
end
feature "Sessions" do
let(:password) { 'password123456' }
after do
Carto::UserMultifactorAuth.delete_all
Carto::FeatureFlagsUser.delete_all
Carto::User.delete_all
Carto::Ldap::Configuration.delete_all
Carto::Organization.delete_all
end
before do
Capybara.current_driver = :rack_test
@banned_user_agents = [
"Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET CLR 1.0.3705; .NET CLR 1.1.4322)",
"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET CLR 2.0.50727; Media Center PC 6.0)",
"Mozilla/5.0 (compatible; MSIE 7.0; Windows NT 5.0; Trident/4.0; FBSMTWB; .NET CLR 2.0.34861; .NET CLR 3.0.3746.3218; .NET CLR 3.5.33652; msn OptimizedIE8;ENUS)",
"Mozilla/4.0(compatible; MSIE 7.0b; Windows NT 6.0)",
"Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)",
"Mozilla/4.0 (compatible; MSIE 6.01; Windows NT 6.0)",
"Mozilla/4.0 (compatible; MSIE 5.5b1; Mac_PowerPC)",
"Mozilla/5.0 (Macintosh; U; PPC Mac OS X; de-de) AppleWebKit/412.7 (KHTML, like Gecko) Safari/412.5"
]
@allowed_user_agents = [
"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)",
"Mozilla/5.0 (Windows NT 6.1; rv:15.0) Gecko/20120716 Firefox/15.0a2",
"Mozilla/5.0 (Windows NT 5.1; rv:8.0; en_us) Gecko/20100101 Firefox/8.0",
"Mozilla/5.0 (iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25",
"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10",
"Opera/9.80 (Windows NT 6.1; U; es-ES) Presto/2.9.181 Version/12.00",
"Opera/9.80 (X11; Linux x86_64; U; fr) Presto/2.9.168 Version/11.50"
]
end
describe 'valid user' do
before do
@user = create_user :email => 'fernando.blat@vizzuality.com', :username => 'blat'
end
scenario "Login in the application" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit login_path
submit_login(@user, 'blablapassword')
page.should have_css(".Sessions-fieldError.js-Sessions-fieldError")
page.should have_css("[@data-content='Your account or your password is not ok']")
submit_login(@user, @user.password)
page.status_code.should eq 200
page.should_not have_css(".Sessions-fieldError.js-Sessions-fieldError")
page.should_not have_css("[@data-content='Your account or your password is not ok']")
end
scenario "Get the session information via OAuth" do
client_application = create_client_application(
user: @user.carto_user, url: CartoDB.hostname, callback_url: CartoDB.hostname
)
oauth_consumer = OAuth::Consumer.new(client_application.key, client_application.secret, {
:site => client_application.url,
:scheme => :query_string,
:http_method => :post
})
access_token = create_access_token(client_application: client_application, user: @user.carto_user)
identity_uri = "http://vizzuality.testhost.lan/oauth/identity.json"
req = prepare_oauth_request(oauth_consumer, identity_uri, :token => access_token)
get_json identity_uri, {}, {'Authorization' => req["Authorization"]} do |response|
response.status.should be_success
response.body.should == { :uid => @user.id, :email => @user.email, :username => @user.username }
end
end
end
scenario "should redirect you to the user login page if unauthorized", :js => true do
user = create(:user_with_private_tables)
visit api_key_credentials_url(host: "#{user.username}.localhost.lan", port: Capybara.server_port)
current_url.should be == login_url(host: "#{user.username}.localhost.lan", port: Capybara.server_port)
end
scenario "should show error page when trying to connect with unsupported browser" do
options = page.driver.instance_variable_get("@options")
old_headers = options[:headers]
begin
@banned_user_agents.each do |user_agent|
options[:headers] = {"HTTP_USER_AGENT" => user_agent}
page.driver.instance_variable_set "@options", options
visit '/login'
page.should have_content("We recommend that you install the latest version of any")
end
ensure
options[:headers] = old_headers
end
end
scenario "shouldn't show error page when trying to connect with supported browser" do
@allowed_user_agents.each do |user_agent|
options = page.driver.instance_variable_get("@options")
options[:headers] = {"HTTP_USER_AGENT" => user_agent}
page.driver.instance_variable_set "@options", options
visit '/login'
page.should have_content("Log in")
end
end
describe 'Multifactor Authentication' do
describe 'valid user with MFA' do
before do
@user_mfa_setup = create(:carto_user_mfa_setup)
@user_mfa = create(:carto_user_mfa)
end
scenario "Login in the application with MFA that does not need setup" do
# we use this to avoid generating the static assets in client_application
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit login_path
submit_login(@user_mfa, @user_mfa.email.split('@').first)
page.status_code.should eq 200
page.body.should_not include(@user_mfa.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
fill_in 'code', with: ROTP::TOTP.new(@user_mfa.active_multifactor_authentication.shared_secret).now
click_link_or_button 'Verify'
page.status_code.should eq 200
page.body.should_not include(@user_mfa.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should_not include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
end
scenario "Failed login in the application with MFA that does not need setup" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit login_path
submit_login(@user_mfa, @user_mfa.email.split('@').first)
page.status_code.should eq 200
page.body.should_not include(@user_mfa.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
fill_in 'code', with: 'wrong_code'
click_link_or_button 'Verify'
page.status_code.should eq 200
page.body.should include("Verification code")
page.should have_css(".Sessions-fieldError.js-Sessions-fieldError")
page.should have_css("[@data-content='Verification code is not valid']")
end
scenario "MFA screen does not have skip link when mfa is active" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit login_path
submit_login(@user_mfa, @user_mfa.email.split('@').first)
page.status_code.should eq 200
page.body.should include("Verification code")
page.body.should_not include("skip this step")
end
scenario "Login in the application with MFA that needs setup" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
mfa = @user_mfa_setup.active_multifactor_authentication
mfa.enabled = false
mfa.save!
@user_mfa_setup.reload
visit login_path
submit_login(@user_mfa_setup, @user_mfa_setup.email.split('@').first)
page.status_code.should eq 200
page.body.should include(@user_mfa_setup.active_multifactor_authentication.shared_secret)
page.body.should include("data:image/png;base64")
page.body.should include("Verification code")
page.body.should include("Use Google Authenticator app to scan the QR code")
fill_in 'code', with: ROTP::TOTP.new(@user_mfa_setup.active_multifactor_authentication.shared_secret).now
click_link_or_button 'Verify'
page.status_code.should eq 200
page.body.should_not include(@user_mfa_setup.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should_not include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
end
scenario "MFA setup screen has skip link when mfa needs setup" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
mfa = @user_mfa_setup.active_multifactor_authentication
mfa.enabled = false
mfa.save!
visit login_path
submit_login(@user_mfa_setup, @user_mfa_setup.email.split('@').first)
page.status_code.should eq 200
page.body.should include("Verification code")
page.body.should include("skip this step")
end
end
describe 'org owner with MFA' do
let(:organization) { create(:organization_with_users, :mfa_enabled) }
let(:organization_user) { organization.non_owner_users.first }
before do
@user_mfa = organization.owner
@user_mfa.password = password
@user_mfa.password_confirmation = password
@user_mfa.save!
end
scenario "Login in the application with MFA that does not need setup" do
# we use this to avoid generating the static assets in client_application
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit login_path
submit_login(@user_mfa, @user_mfa.password)
page.status_code.should eq 200
page.body.should_not include(@user_mfa.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
fill_in 'code', with: ROTP::TOTP.new(@user_mfa.active_multifactor_authentication.shared_secret).now
click_link_or_button 'Verify'
page.status_code.should eq 200
page.body.should_not include(@user_mfa.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should_not include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
end
scenario "Failed login in the application with MFA that does not need setup" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit login_path
submit_login(@user_mfa, @user_mfa.password)
page.status_code.should eq 200
page.body.should_not include(@user_mfa.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
fill_in 'code', with: 'wrong_code'
click_link_or_button 'Verify'
page.status_code.should eq 200
page.body.should include("Verification code")
page.should have_css(".Sessions-fieldError.js-Sessions-fieldError")
page.should have_css("[@data-content='Verification code is not valid']")
end
scenario "MFA screen does not have skip link when mfa is active" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit login_path
submit_login(@user_mfa, @user_mfa.password)
page.status_code.should eq 200
page.body.should include("Verification code")
page.body.should_not include("skip this step")
end
scenario "Login in the application with MFA that needs setup" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
mfa = organization_user.active_multifactor_authentication
mfa.enabled = false
mfa.save!
organization_user.reload
visit login_path
submit_login(organization_user, "#{organization_user.username}123")
page.status_code.should eq 200
page.body.should include(organization_user.active_multifactor_authentication.shared_secret)
page.body.should include("data:image/png;base64")
page.body.should include("Verification code")
page.body.should include("Use Google Authenticator app to scan the QR code")
fill_in 'code', with: ROTP::TOTP.new(organization_user.active_multifactor_authentication.shared_secret).now
click_link_or_button 'Verify'
page.status_code.should eq 200
page.body.should_not include(organization_user.active_multifactor_authentication.shared_secret)
page.body.should_not include("data:image/png;base64")
page.body.should_not include("Verification code")
page.body.should_not include("Use Google Authenticator app to scan the QR code")
end
scenario "MFA setup screen has skip link when mfa needs setup" do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
mfa = organization_user.active_multifactor_authentication
mfa.enabled = false
mfa.save!
organization_user.reload
visit login_path
submit_login(organization_user, "#{organization_user.username}123")
page.status_code.should eq 200
page.body.should include("Verification code")
page.body.should include("skip this step")
end
end
end
describe "Organization login" do
let!(:organization) { create(:organization_with_users) }
let(:organization_user) { organization.users.first }
it 'allows login to organization users' do
# we use this to avoid generating the static assets in CI
Admin::VisualizationsController.any_instance.stubs(:render).returns('')
visit org_login_url(organization_user.organization)
submit_login(organization_user, organization_user.password)
page.status_code.should eq 200
page.should_not have_css(".Sessions-fieldError.js-Sessions-fieldError")
end
it 'does not allow user+password login to organization users if auth_username_password_enabled is false' do
organization.auth_username_password_enabled = false
organization.save
visit org_login_url(organization_user.organization)
page.should_not have_css('#email')
page.should_not have_css('#password')
end
it 'does not allow google login to organization users if auth_google_enabled is false' do
organization.auth_google_enabled = false
organization.save
visit org_login_url(organization_user.organization)
page.should_not have_css('#google_signup_access_token')
page.should_not have_css('#google_login_button_iframe')
end
describe 'ldap login' do
before do
@ldap_configuration = create(:ldap_configuration, { organization_id: organization.id })
end
it 'does not allow google login to organization users if they have ldap configuration' do
visit org_login_url(organization_user.organization)
page.should_not have_css('#google_signup_access_token')
page.should_not have_css('#google_login_button_iframe')
end
end
end
end