2008-04-26 08:31:52 +02:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Test the security class, including log-in form, change password form, etc
|
2008-06-15 15:33:53 +02:00
|
|
|
*
|
2012-04-12 08:02:46 +02:00
|
|
|
* @package framework
|
2008-06-15 15:33:53 +02:00
|
|
|
* @subpackage tests
|
2008-04-26 08:31:52 +02:00
|
|
|
*/
|
2008-08-11 07:27:18 +02:00
|
|
|
class SecurityTest extends FunctionalTest {
|
2011-03-30 08:49:11 +02:00
|
|
|
static $fixture_file = 'MemberTest.yml';
|
2008-04-26 08:31:52 +02:00
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
protected $autoFollowRedirection = false;
|
2008-04-26 08:31:52 +02:00
|
|
|
|
2008-10-08 04:00:12 +02:00
|
|
|
protected $priorAuthenticators = array();
|
|
|
|
|
|
|
|
protected $priorDefaultAuthenticator = null;
|
2010-10-15 01:53:44 +02:00
|
|
|
|
|
|
|
protected $priorUniqueIdentifierField = null;
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function setUp() {
|
2008-10-08 04:00:12 +02:00
|
|
|
// This test assumes that MemberAuthenticator is present and the default
|
|
|
|
$this->priorAuthenticators = Authenticator::get_authenticators();
|
|
|
|
$this->priorDefaultAuthenticator = Authenticator::get_default_authenticator();
|
2011-01-11 10:19:38 +01:00
|
|
|
foreach($this->priorAuthenticators as $authenticator) {
|
|
|
|
Authenticator::unregister($authenticator);
|
|
|
|
}
|
2010-10-15 01:53:44 +02:00
|
|
|
|
2008-10-08 04:00:12 +02:00
|
|
|
Authenticator::register('MemberAuthenticator');
|
|
|
|
Authenticator::set_default_authenticator('MemberAuthenticator');
|
2010-10-15 01:53:44 +02:00
|
|
|
|
|
|
|
// And that the unique identified field is 'Email'
|
|
|
|
$this->priorUniqueIdentifierField = Member::get_unique_identifier_field();
|
|
|
|
Member::set_unique_identifier_field('Email');
|
|
|
|
|
2008-10-08 04:00:12 +02:00
|
|
|
parent::setUp();
|
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function tearDown() {
|
2008-10-08 04:00:12 +02:00
|
|
|
// Restore selected authenticator
|
|
|
|
|
|
|
|
// MemberAuthenticator might not actually be present
|
|
|
|
if(!in_array('MemberAuthenticator', $this->priorAuthenticators)) {
|
|
|
|
Authenticator::unregister('MemberAuthenticator');
|
|
|
|
}
|
2011-01-11 10:19:38 +01:00
|
|
|
foreach($this->priorAuthenticators as $authenticator) {
|
|
|
|
Authenticator::register($authenticator);
|
|
|
|
}
|
2008-10-08 04:00:12 +02:00
|
|
|
Authenticator::set_default_authenticator($this->priorDefaultAuthenticator);
|
2010-10-15 01:53:44 +02:00
|
|
|
|
|
|
|
// Restore unique identifier field
|
|
|
|
Member::set_unique_identifier_field($this->priorUniqueIdentifierField);
|
2008-10-08 04:00:12 +02:00
|
|
|
|
|
|
|
parent::tearDown();
|
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testAccessingAuthenticatedPageRedirectsToLoginForm() {
|
2011-03-28 07:23:06 +02:00
|
|
|
$this->autoFollowRedirection = false;
|
|
|
|
|
|
|
|
$response = $this->get('SecurityTest_SecuredController');
|
|
|
|
$this->assertEquals(302, $response->getStatusCode());
|
|
|
|
$this->assertContains('Security/login', $response->getHeader('Location'));
|
|
|
|
|
|
|
|
$this->logInWithPermission('ADMIN');
|
|
|
|
$response = $this->get('SecurityTest_SecuredController');
|
|
|
|
$this->assertEquals(200, $response->getStatusCode());
|
|
|
|
$this->assertContains('Success', $response->getBody());
|
|
|
|
|
|
|
|
$this->autoFollowRedirection = true;
|
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testLogInAsSomeoneElse() {
|
2009-04-29 02:07:39 +02:00
|
|
|
$member = DataObject::get_one('Member');
|
|
|
|
|
|
|
|
/* Log in with any user that we can find */
|
|
|
|
$this->session()->inst_set('loggedInAs', $member->ID);
|
|
|
|
|
|
|
|
/* View the Security/login page */
|
2011-03-18 03:01:09 +01:00
|
|
|
$response = $this->get('Security/login');
|
2009-04-29 02:07:39 +02:00
|
|
|
|
|
|
|
$items = $this->cssParser()->getBySelector('#MemberLoginForm_LoginForm input.action');
|
|
|
|
|
|
|
|
/* We have only 1 input, one to allow the user to log in as someone else */
|
|
|
|
$this->assertEquals(count($items), 1, 'There is 1 input, allowing the user to log in as someone else.');
|
|
|
|
|
|
|
|
$this->autoFollowRedirection = true;
|
|
|
|
|
|
|
|
/* Submit the form, using only the logout action and a hidden field for the authenticator */
|
|
|
|
$response = $this->submitForm(
|
|
|
|
'MemberLoginForm_LoginForm',
|
|
|
|
null,
|
|
|
|
array(
|
|
|
|
'AuthenticationMethod' => 'MemberAuthenticator',
|
|
|
|
'action_dologout' => 1,
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
/* We get a good response */
|
|
|
|
$this->assertEquals($response->getStatusCode(), 200, 'We have a 200 OK response');
|
|
|
|
$this->assertNotNull($response->getBody(), 'There is body content on the page');
|
|
|
|
|
|
|
|
/* Log the user out */
|
|
|
|
$this->session()->inst_set('loggedInAs', null);
|
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testMemberIDInSessionDoesntExistInDatabaseHasToLogin() {
|
2009-04-29 02:07:39 +02:00
|
|
|
/* Log in with a Member ID that doesn't exist in the DB */
|
|
|
|
$this->session()->inst_set('loggedInAs', 500);
|
|
|
|
|
|
|
|
$this->autoFollowRedirection = true;
|
|
|
|
|
|
|
|
/* Attempt to get into the admin section */
|
2011-03-18 03:01:09 +01:00
|
|
|
$response = $this->get('Security/login/');
|
2009-02-11 22:08:28 +01:00
|
|
|
|
2009-04-29 02:07:39 +02:00
|
|
|
$items = $this->cssParser()->getBySelector('#MemberLoginForm_LoginForm input.text');
|
|
|
|
|
|
|
|
/* We have 2 text inputs - one for email, and another for the password */
|
|
|
|
$this->assertEquals(count($items), 2, 'There are 2 inputs - one for email, another for password');
|
|
|
|
|
|
|
|
$this->autoFollowRedirection = false;
|
|
|
|
|
|
|
|
/* Log the user out */
|
|
|
|
$this->session()->inst_set('loggedInAs', null);
|
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testExternalBackUrlRedirectionDisallowed() {
|
2009-02-11 22:08:28 +01:00
|
|
|
// Test internal relative redirect
|
|
|
|
$response = $this->doTestLoginForm('noexpiry@silverstripe.com', '1nitialPassword', 'testpage');
|
|
|
|
$this->assertEquals(302, $response->getStatusCode());
|
|
|
|
$this->assertRegExp('/testpage/', $response->getHeader('Location'),
|
|
|
|
"Internal relative BackURLs work when passed through to login form"
|
|
|
|
);
|
|
|
|
// Log the user out
|
|
|
|
$this->session()->inst_set('loggedInAs', null);
|
|
|
|
|
|
|
|
// Test internal absolute redirect
|
2012-09-26 23:34:00 +02:00
|
|
|
$response = $this->doTestLoginForm('noexpiry@silverstripe.com', '1nitialPassword',
|
|
|
|
Director::absoluteBaseURL() . 'testpage');
|
2009-02-11 22:08:28 +01:00
|
|
|
// for some reason the redirect happens to a relative URL
|
2012-09-26 23:34:00 +02:00
|
|
|
$this->assertRegExp('/^' . preg_quote(Director::absoluteBaseURL(), '/') . 'testpage/',
|
|
|
|
$response->getHeader('Location'),
|
2009-02-11 22:08:28 +01:00
|
|
|
"Internal absolute BackURLs work when passed through to login form"
|
|
|
|
);
|
|
|
|
// Log the user out
|
|
|
|
$this->session()->inst_set('loggedInAs', null);
|
|
|
|
|
|
|
|
// Test external redirect
|
|
|
|
$response = $this->doTestLoginForm('noexpiry@silverstripe.com', '1nitialPassword', 'http://myspoofedhost.com');
|
2012-09-26 23:34:00 +02:00
|
|
|
$this->assertNotRegExp('/^' . preg_quote('http://myspoofedhost.com', '/') . '/',
|
|
|
|
(string)$response->getHeader('Location'),
|
2009-02-11 22:08:28 +01:00
|
|
|
"Redirection to external links in login form BackURL gets prevented as a measure against spoofing attacks"
|
|
|
|
);
|
2010-10-13 05:39:04 +02:00
|
|
|
|
|
|
|
// Test external redirection on ChangePasswordForm
|
|
|
|
$this->get('Security/changepassword?BackURL=http://myspoofedhost.com');
|
|
|
|
$changedResponse = $this->doTestChangepasswordForm('1nitialPassword', 'changedPassword');
|
2012-09-26 23:34:00 +02:00
|
|
|
$this->assertNotRegExp('/^' . preg_quote('http://myspoofedhost.com', '/') . '/',
|
|
|
|
(string)$changedResponse->getHeader('Location'),
|
|
|
|
"Redirection to external links in change password form BackURL gets prevented to stop spoofing attacks"
|
2010-10-13 05:39:04 +02:00
|
|
|
);
|
|
|
|
|
2009-02-11 22:08:28 +01:00
|
|
|
// Log the user out
|
|
|
|
$this->session()->inst_set('loggedInAs', null);
|
|
|
|
}
|
|
|
|
|
2008-04-26 08:31:52 +02:00
|
|
|
/**
|
|
|
|
* Test that the login form redirects to the change password form after logging in with an expired password
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testExpiredPassword() {
|
2008-04-26 08:32:52 +02:00
|
|
|
/* BAD PASSWORDS ARE LOCKED OUT */
|
2008-08-12 01:04:25 +02:00
|
|
|
$badResponse = $this->doTestLoginForm('sam@silverstripe.com' , 'badpassword');
|
2008-04-26 08:31:52 +02:00
|
|
|
$this->assertEquals(302, $badResponse->getStatusCode());
|
|
|
|
$this->assertRegExp('/Security\/login/', $badResponse->getHeader('Location'));
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->assertNull($this->session()->inst_get('loggedInAs'));
|
2008-04-26 08:31:52 +02:00
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* UNEXPIRED PASSWORD GO THROUGH WITHOUT A HITCH */
|
2008-08-12 01:04:25 +02:00
|
|
|
$goodResponse = $this->doTestLoginForm('sam@silverstripe.com' , '1nitialPassword');
|
2008-04-26 08:31:52 +02:00
|
|
|
$this->assertEquals(302, $goodResponse->getStatusCode());
|
|
|
|
$this->assertEquals(Director::baseURL() . 'test/link', $goodResponse->getHeader('Location'));
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->assertEquals($this->idFromFixture('Member', 'test'), $this->session()->inst_get('loggedInAs'));
|
2008-04-26 08:31:52 +02:00
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* EXPIRED PASSWORDS ARE SENT TO THE CHANGE PASSWORD FORM */
|
2008-08-12 01:04:25 +02:00
|
|
|
$expiredResponse = $this->doTestLoginForm('expired@silverstripe.com' , '1nitialPassword');
|
2008-04-26 08:32:05 +02:00
|
|
|
$this->assertEquals(302, $expiredResponse->getStatusCode());
|
|
|
|
$this->assertEquals(Director::baseURL() . 'Security/changepassword', $expiredResponse->getHeader('Location'));
|
2012-09-26 23:34:00 +02:00
|
|
|
$this->assertEquals($this->idFromFixture('Member', 'expiredpassword'),
|
|
|
|
$this->session()->inst_get('loggedInAs'));
|
2010-10-13 05:39:04 +02:00
|
|
|
|
|
|
|
// Make sure it redirects correctly after the password has been changed
|
|
|
|
$this->mainSession->followRedirection();
|
|
|
|
$changedResponse = $this->doTestChangepasswordForm('1nitialPassword', 'changedPassword');
|
|
|
|
$this->assertEquals(302, $changedResponse->getStatusCode());
|
|
|
|
$this->assertEquals(Director::baseURL() . 'test/link', $changedResponse->getHeader('Location'));
|
2008-04-26 08:32:05 +02:00
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testChangePasswordForLoggedInUsers() {
|
2010-10-13 05:39:04 +02:00
|
|
|
$goodResponse = $this->doTestLoginForm('sam@silverstripe.com' , '1nitialPassword');
|
|
|
|
|
|
|
|
// Change the password
|
|
|
|
$this->get('Security/changepassword?BackURL=test/back');
|
|
|
|
$changedResponse = $this->doTestChangepasswordForm('1nitialPassword', 'changedPassword');
|
|
|
|
$this->assertEquals(302, $changedResponse->getStatusCode());
|
|
|
|
$this->assertEquals(Director::baseURL() . 'test/back', $changedResponse->getHeader('Location'));
|
|
|
|
$this->assertEquals($this->idFromFixture('Member', 'test'), $this->session()->inst_get('loggedInAs'));
|
|
|
|
|
|
|
|
// Check if we can login with the new password
|
|
|
|
$goodResponse = $this->doTestLoginForm('sam@silverstripe.com' , 'changedPassword');
|
|
|
|
$this->assertEquals(302, $goodResponse->getStatusCode());
|
|
|
|
$this->assertEquals(Director::baseURL() . 'test/link', $goodResponse->getHeader('Location'));
|
|
|
|
$this->assertEquals($this->idFromFixture('Member', 'test'), $this->session()->inst_get('loggedInAs'));
|
|
|
|
}
|
2010-12-09 22:18:49 +01:00
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testChangePasswordFromLostPassword() {
|
2010-12-09 22:18:49 +01:00
|
|
|
$admin = $this->objFromFixture('Member', 'test');
|
|
|
|
|
|
|
|
$this->assertNull($admin->AutoLoginHash, 'Hash is empty before lost password');
|
|
|
|
|
|
|
|
// Request new password by email
|
|
|
|
$response = $this->get('Security/lostpassword');
|
2012-04-20 05:02:43 +02:00
|
|
|
$response = $this->post('Security/LostPasswordForm', array('Email' => 'sam@silverstripe.com'));
|
2010-12-09 22:18:49 +01:00
|
|
|
|
|
|
|
$this->assertEmailSent('sam@silverstripe.com');
|
|
|
|
|
|
|
|
// Load password link from email
|
|
|
|
$admin = DataObject::get_by_id('Member', $admin->ID);
|
|
|
|
$this->assertNotNull($admin->AutoLoginHash, 'Hash has been written after lost password');
|
|
|
|
$response = $this->get('Security/changepassword/?h=' . $admin->AutoLoginHash);
|
|
|
|
$this->assertEquals(302, $response->getStatusCode());
|
|
|
|
$this->assertEquals(Director::baseUrl() . 'Security/changepassword', $response->getHeader('Location'));
|
|
|
|
|
|
|
|
// Follow redirection to form without hash in GET parameter
|
|
|
|
$response = $this->get('Security/changepassword');
|
|
|
|
$changedResponse = $this->doTestChangepasswordForm('1nitialPassword', 'changedPassword');
|
|
|
|
$this->assertEquals($this->idFromFixture('Member', 'test'), $this->session()->inst_get('loggedInAs'));
|
|
|
|
|
|
|
|
// Check if we can login with the new password
|
|
|
|
$goodResponse = $this->doTestLoginForm('sam@silverstripe.com' , 'changedPassword');
|
|
|
|
$this->assertEquals(302, $goodResponse->getStatusCode());
|
|
|
|
$this->assertEquals($this->idFromFixture('Member', 'test'), $this->session()->inst_get('loggedInAs'));
|
|
|
|
}
|
2010-10-13 05:39:04 +02:00
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testRepeatedLoginAttemptsLockingPeopleOut() {
|
2010-10-19 00:33:41 +02:00
|
|
|
$local = i18n::get_locale();
|
|
|
|
i18n::set_locale('en_US');
|
|
|
|
|
2008-04-26 08:32:05 +02:00
|
|
|
Member::lock_out_after_incorrect_logins(5);
|
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* LOG IN WITH A BAD PASSWORD 7 TIMES */
|
2008-04-26 08:32:05 +02:00
|
|
|
|
|
|
|
for($i=1;$i<=7;$i++) {
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
2008-04-26 08:32:05 +02:00
|
|
|
$member = DataObject::get_by_id("Member", $this->idFromFixture('Member', 'test'));
|
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* THE FIRST 4 TIMES, THE MEMBER SHOULDN'T BE LOCKED OUT */
|
2008-04-26 08:32:05 +02:00
|
|
|
if($i < 5) {
|
|
|
|
$this->assertNull($member->LockedOutUntil);
|
2010-02-23 05:05:34 +01:00
|
|
|
$this->assertContains($this->loginErrorMessage(), _t('Member.ERRORWRONGCRED'));
|
2008-04-26 08:32:05 +02:00
|
|
|
}
|
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* AFTER THAT THE USER IS LOCKED OUT FOR 15 MINUTES */
|
2008-04-26 08:32:05 +02:00
|
|
|
|
|
|
|
//(we check for at least 14 minutes because we don't want a slow running test to report a failure.)
|
|
|
|
else {
|
|
|
|
$this->assertGreaterThan(time() + 14*60, strtotime($member->LockedOutUntil));
|
|
|
|
}
|
|
|
|
|
|
|
|
if($i > 5) {
|
2010-02-23 05:05:34 +01:00
|
|
|
$this->assertContains(_t('Member.ERRORLOCKEDOUT'), $this->loginErrorMessage());
|
|
|
|
// $this->assertTrue(false !== stripos($this->loginErrorMessage(), _t('Member.ERRORLOCKEDOUT')));
|
2008-04-26 08:32:05 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* THE USER CAN'T LOG IN NOW, EVEN IF THEY GET THE RIGHT PASSWORD */
|
2008-04-26 08:32:05 +02:00
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , '1nitialPassword');
|
|
|
|
$this->assertNull($this->session()->inst_get('loggedInAs'));
|
2008-04-26 08:32:05 +02:00
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* BUT, IF TIME PASSES, THEY CAN LOG IN */
|
2008-04-26 08:32:05 +02:00
|
|
|
|
|
|
|
// (We fake this by re-setting LockedOutUntil)
|
|
|
|
$member = DataObject::get_by_id("Member", $this->idFromFixture('Member', 'test'));
|
2008-07-21 14:21:53 +02:00
|
|
|
$member->LockedOutUntil = date('Y-m-d H:i:s', time() - 30);
|
2008-04-26 08:32:05 +02:00
|
|
|
$member->write();
|
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , '1nitialPassword');
|
|
|
|
$this->assertEquals($this->session()->inst_get('loggedInAs'), $member->ID);
|
2008-04-26 08:32:05 +02:00
|
|
|
|
|
|
|
// Log the user out
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->session()->inst_set('loggedInAs', null);
|
2008-04-26 08:32:05 +02:00
|
|
|
|
2008-04-26 08:32:52 +02:00
|
|
|
/* NOW THAT THE LOCK-OUT HAS EXPIRED, CHECK THAT WE ARE ALLOWED 4 FAILED ATTEMPTS BEFORE LOGGING IN */
|
2008-04-26 08:32:05 +02:00
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
|
|
|
$this->assertNull($this->session()->inst_get('loggedInAs'));
|
2008-10-10 04:20:33 +02:00
|
|
|
$this->assertTrue(false !== stripos($this->loginErrorMessage(), _t('Member.ERRORWRONGCRED')));
|
2008-08-12 01:04:25 +02:00
|
|
|
|
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , '1nitialPassword');
|
|
|
|
$this->assertEquals($this->session()->inst_get('loggedInAs'), $member->ID);
|
2010-10-19 00:33:41 +02:00
|
|
|
|
|
|
|
i18n::set_locale($local);
|
2008-04-26 08:32:05 +02:00
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testAlternatingRepeatedLoginAttempts() {
|
2008-04-26 08:32:05 +02:00
|
|
|
Member::lock_out_after_incorrect_logins(3);
|
|
|
|
|
|
|
|
// ATTEMPTING LOG-IN TWICE WITH ONE ACCOUNT AND TWICE WITH ANOTHER SHOULDN'T LOCK ANYBODY OUT
|
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
2008-04-26 08:32:05 +02:00
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('noexpiry@silverstripe.com' , 'incorrectpassword');
|
|
|
|
$this->doTestLoginForm('noexpiry@silverstripe.com' , 'incorrectpassword');
|
2008-04-26 08:32:05 +02:00
|
|
|
|
|
|
|
$member1 = DataObject::get_by_id("Member", $this->idFromFixture('Member', 'test'));
|
|
|
|
$member2 = DataObject::get_by_id("Member", $this->idFromFixture('Member', 'noexpiry'));
|
|
|
|
|
|
|
|
$this->assertNull($member1->LockedOutUntil);
|
|
|
|
$this->assertNull($member2->LockedOutUntil);
|
|
|
|
|
2012-09-26 23:34:00 +02:00
|
|
|
// BUT, DOING AN ADDITIONAL LOG-IN WITH EITHER OF THEM WILL LOCK OUT, SINCE THAT IS THE 3RD FAILURE IN
|
|
|
|
// THIS SESSION
|
2008-04-26 08:32:05 +02:00
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com' , 'incorrectpassword');
|
2008-04-26 08:32:05 +02:00
|
|
|
$member1 = DataObject::get_by_id("Member", $this->idFromFixture('Member', 'test'));
|
|
|
|
$this->assertNotNull($member1->LockedOutUntil);
|
|
|
|
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('noexpiry@silverstripe.com' , 'incorrectpassword');
|
2008-04-26 08:32:05 +02:00
|
|
|
$member2 = DataObject::get_by_id("Member", $this->idFromFixture('Member', 'noexpiry'));
|
|
|
|
$this->assertNotNull($member2->LockedOutUntil);
|
|
|
|
}
|
2008-08-11 02:14:48 +02:00
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testUnsuccessfulLoginAttempts() {
|
2008-08-11 02:14:48 +02:00
|
|
|
Security::set_login_recording(true);
|
|
|
|
|
|
|
|
/* UNSUCCESSFUL ATTEMPTS WITH WRONG PASSWORD FOR EXISTING USER ARE LOGGED */
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com', 'wrongpassword');
|
2008-11-24 10:31:14 +01:00
|
|
|
$attempt = DataObject::get_one('LoginAttempt', "\"Email\" = 'sam@silverstripe.com'");
|
2008-08-11 02:14:48 +02:00
|
|
|
$this->assertTrue(is_object($attempt));
|
2008-11-24 10:31:14 +01:00
|
|
|
$member = DataObject::get_one('Member', "\"Email\" = 'sam@silverstripe.com'");
|
2008-08-11 02:14:48 +02:00
|
|
|
$this->assertEquals($attempt->Status, 'Failure');
|
|
|
|
$this->assertEquals($attempt->Email, 'sam@silverstripe.com');
|
|
|
|
$this->assertEquals($attempt->Member(), $member);
|
|
|
|
|
|
|
|
/* UNSUCCESSFUL ATTEMPTS WITH NONEXISTING USER ARE LOGGED */
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('wronguser@silverstripe.com', 'wrongpassword');
|
2008-11-24 10:31:14 +01:00
|
|
|
$attempt = DataObject::get_one('LoginAttempt', "\"Email\" = 'wronguser@silverstripe.com'");
|
2008-08-11 02:14:48 +02:00
|
|
|
$this->assertTrue(is_object($attempt));
|
|
|
|
$this->assertEquals($attempt->Status, 'Failure');
|
|
|
|
$this->assertEquals($attempt->Email, 'wronguser@silverstripe.com');
|
2010-10-13 03:35:19 +02:00
|
|
|
$this->assertNotNull(
|
|
|
|
$this->loginErrorMessage(), 'An invalid email returns a message.'
|
|
|
|
);
|
2008-08-11 02:14:48 +02:00
|
|
|
}
|
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testSuccessfulLoginAttempts() {
|
2008-08-11 02:14:48 +02:00
|
|
|
Security::set_login_recording(true);
|
|
|
|
|
|
|
|
/* SUCCESSFUL ATTEMPTS ARE LOGGED */
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->doTestLoginForm('sam@silverstripe.com', '1nitialPassword');
|
2008-11-24 10:31:14 +01:00
|
|
|
$attempt = DataObject::get_one('LoginAttempt', "\"Email\" = 'sam@silverstripe.com'");
|
|
|
|
$member = DataObject::get_one('Member', "\"Email\" = 'sam@silverstripe.com'");
|
2008-08-11 02:14:48 +02:00
|
|
|
$this->assertTrue(is_object($attempt));
|
|
|
|
$this->assertEquals($attempt->Status, 'Success');
|
|
|
|
$this->assertEquals($attempt->Email, 'sam@silverstripe.com');
|
|
|
|
$this->assertEquals($attempt->Member(), $member);
|
|
|
|
}
|
2010-04-12 23:17:07 +02:00
|
|
|
|
2012-09-19 12:07:39 +02:00
|
|
|
public function testDatabaseIsReadyWithInsufficientMemberColumns() {
|
2010-12-06 00:12:44 +01:00
|
|
|
$old = Security::$force_database_is_ready;
|
|
|
|
Security::$force_database_is_ready = null;
|
|
|
|
|
2010-04-12 23:17:07 +02:00
|
|
|
// Assumption: The database has been built correctly by the test runner,
|
|
|
|
// and has all columns present in the ORM
|
|
|
|
DB::getConn()->renameField('Member', 'Email', 'Email_renamed');
|
|
|
|
|
|
|
|
// Email column is now missing, which means we're not ready to do permission checks
|
|
|
|
$this->assertFalse(Security::database_is_ready());
|
|
|
|
|
|
|
|
// Rebuild the database (which re-adds the Email column), and try again
|
|
|
|
$this->resetDBSchema(true);
|
|
|
|
$this->assertTrue(Security::database_is_ready());
|
2010-12-06 00:12:44 +01:00
|
|
|
|
|
|
|
Security::$force_database_is_ready = $old;
|
2010-04-12 23:17:07 +02:00
|
|
|
}
|
2008-04-26 08:32:05 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a log-in form using Director::test().
|
|
|
|
* Helper method for the tests above
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public function doTestLoginForm($email, $password, $backURL = 'test/link') {
|
2009-03-14 01:16:32 +01:00
|
|
|
$this->get('Security/logout');
|
2010-10-19 02:47:19 +02:00
|
|
|
$this->session()->inst_set('BackURL', $backURL);
|
2008-08-12 01:04:25 +02:00
|
|
|
$this->get('Security/login');
|
|
|
|
|
|
|
|
return $this->submitForm(
|
2008-08-11 02:14:48 +02:00
|
|
|
"MemberLoginForm_LoginForm",
|
|
|
|
null,
|
|
|
|
array(
|
|
|
|
'Email' => $email,
|
|
|
|
'Password' => $password,
|
|
|
|
'AuthenticationMethod' => 'MemberAuthenticator',
|
|
|
|
'action_dologin' => 1,
|
|
|
|
)
|
2010-10-19 02:47:19 +02:00
|
|
|
);
|
2008-08-11 02:14:48 +02:00
|
|
|
}
|
|
|
|
|
2010-10-13 05:39:04 +02:00
|
|
|
/**
|
|
|
|
* Helper method to execute a change password form
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public function doTestChangepasswordForm($oldPassword, $newPassword) {
|
2010-10-13 05:39:04 +02:00
|
|
|
return $this->submitForm(
|
|
|
|
"ChangePasswordForm_ChangePasswordForm",
|
|
|
|
null,
|
|
|
|
array(
|
|
|
|
'OldPassword' => $oldPassword,
|
|
|
|
'NewPassword1' => $newPassword,
|
|
|
|
'NewPassword2' => $newPassword,
|
|
|
|
'action_doChangePassword' => 1,
|
|
|
|
)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2008-04-26 08:32:05 +02:00
|
|
|
/**
|
|
|
|
* Get the error message on the login form
|
|
|
|
*/
|
2012-09-19 12:07:39 +02:00
|
|
|
public function loginErrorMessage() {
|
2008-08-12 01:04:25 +02:00
|
|
|
return $this->session()->inst_get('FormInfo.MemberLoginForm_LoginForm.formError.message');
|
2008-08-11 02:14:48 +02:00
|
|
|
}
|
2008-04-26 08:31:52 +02:00
|
|
|
|
2008-08-11 02:14:48 +02:00
|
|
|
}
|
2011-03-28 07:23:06 +02:00
|
|
|
|
|
|
|
class SecurityTest_SecuredController extends Controller implements TestOnly {
|
2012-09-19 12:07:39 +02:00
|
|
|
public function index() {
|
2011-03-28 07:23:06 +02:00
|
|
|
if(!Permission::check('ADMIN')) return Security::permissionFailure($this);
|
|
|
|
|
|
|
|
return 'Success';
|
|
|
|
}
|
2012-03-24 04:04:52 +01:00
|
|
|
}
|