2020-03-19 20:53:49 +00:00
|
|
|
#include "webfused/auth/pam_authenticator.h"
|
|
|
|
#include "webfused/auth/authenticator.h"
|
|
|
|
#include "webfused/config/settings.h"
|
|
|
|
#include "webfused/auth/factory.h"
|
|
|
|
|
2020-03-20 12:48:58 +00:00
|
|
|
#include "mock/credentials.hpp"
|
|
|
|
#include "mock/settings.hpp"
|
|
|
|
#include "mock/pam.hpp"
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
|
|
|
|
|
|
|
|
using ::webfused_test::MockSettings;
|
|
|
|
using ::webfused_test::MockCredentials;
|
|
|
|
using ::webfused_test::MockPam;
|
|
|
|
using ::testing::_;
|
|
|
|
using ::testing::Return;
|
|
|
|
using ::testing::StrEq;
|
|
|
|
using ::testing::Invoke;
|
|
|
|
using ::testing::StrictMock;
|
|
|
|
|
|
|
|
TEST(pam_authenticator, create)
|
|
|
|
{
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, create_via_factory)
|
|
|
|
{
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_authenticator_create("pam", nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, get_type)
|
|
|
|
{
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
ASSERT_STREQ("username", wfd_authenticator_get_type(authenticator));
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, authenticate)
|
|
|
|
{
|
|
|
|
MockPam pam;
|
2020-03-20 13:02:38 +00:00
|
|
|
EXPECT_CALL(pam, pam_start(StrEq("webfused"), nullptr, _, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_authenticate(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_acct_mgmt(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_end(_, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return("bob"));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return("secret"));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_TRUE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, authenticate_with_custom_service_name)
|
|
|
|
{
|
|
|
|
MockPam pam;
|
2020-03-20 13:02:38 +00:00
|
|
|
EXPECT_CALL(pam, pam_start(StrEq("brummni"), nullptr, _, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_authenticate(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_acct_mgmt(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_end(_, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
MockSettings settings;
|
2020-03-20 13:16:32 +00:00
|
|
|
EXPECT_CALL(settings, wfd_settings_get_string_or_default(_,StrEq("service_name"), StrEq("webfused")))
|
2020-03-19 20:53:49 +00:00
|
|
|
.Times(1).WillOnce(Return("brummni"));
|
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return("bob"));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return("secret"));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_TRUE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace
|
|
|
|
{
|
|
|
|
|
|
|
|
int valid_conversation(
|
|
|
|
char const * service_name,
|
|
|
|
char const * user,
|
|
|
|
struct pam_conv const * conv,
|
|
|
|
pam_handle_t * * handle)
|
|
|
|
{
|
|
|
|
(void) service_name;
|
|
|
|
(void) user;
|
|
|
|
(void) handle;
|
|
|
|
|
|
|
|
pam_message request_username = {PAM_PROMPT_ECHO_ON, "username"};
|
|
|
|
pam_message request_password = {PAM_PROMPT_ECHO_OFF, "password"};
|
|
|
|
pam_message const * messages[2] =
|
|
|
|
{
|
|
|
|
&request_username,
|
|
|
|
&request_password
|
|
|
|
};
|
|
|
|
pam_response * responses;
|
|
|
|
int rc = conv->conv(2, messages, &responses, conv->appdata_ptr);
|
|
|
|
if (PAM_SUCCESS == rc)
|
|
|
|
{
|
2020-03-20 08:52:56 +00:00
|
|
|
free(responses[0].resp);
|
|
|
|
free(responses[1].resp);
|
2020-03-19 20:53:49 +00:00
|
|
|
free(responses);
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, conversation_with_valid_messages)
|
|
|
|
{
|
|
|
|
MockPam pam;
|
2020-03-20 13:02:38 +00:00
|
|
|
EXPECT_CALL(pam, pam_start(StrEq("webfused"), nullptr, _, _))
|
2020-03-19 20:53:49 +00:00
|
|
|
.Times(1).WillOnce(Invoke(&valid_conversation));
|
2020-03-20 13:02:38 +00:00
|
|
|
EXPECT_CALL(pam, pam_authenticate(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_acct_mgmt(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_end(_, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return("bob"));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return("secret"));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_TRUE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace
|
|
|
|
{
|
|
|
|
|
|
|
|
int invalid_conversation(
|
|
|
|
char const * service_name,
|
|
|
|
char const * user,
|
|
|
|
struct pam_conv const * conv,
|
|
|
|
pam_handle_t * * handle)
|
|
|
|
{
|
|
|
|
(void) service_name;
|
|
|
|
(void) user;
|
|
|
|
(void) handle;
|
|
|
|
|
|
|
|
pam_message invalid_request = {-1, "invalid"};
|
|
|
|
pam_message const * messages[2] =
|
|
|
|
{
|
|
|
|
&invalid_request
|
|
|
|
};
|
|
|
|
pam_response * responses;
|
|
|
|
int rc = conv->conv(1, messages, &responses, conv->appdata_ptr);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, conversation_with_invalid_messages)
|
|
|
|
{
|
|
|
|
MockPam pam;
|
2020-03-20 13:02:38 +00:00
|
|
|
EXPECT_CALL(pam, pam_start(StrEq("webfused"), nullptr, _, _))
|
2020-03-19 20:53:49 +00:00
|
|
|
.Times(1).WillOnce(Invoke(&invalid_conversation));
|
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return("bob"));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return("secret"));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_FALSE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, authenticate_fail_authenticate)
|
|
|
|
{
|
|
|
|
MockPam pam;
|
2020-03-20 13:02:38 +00:00
|
|
|
EXPECT_CALL(pam, pam_start(StrEq("webfused"), nullptr, _, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_authenticate(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(-1));
|
|
|
|
EXPECT_CALL(pam, pam_end(_, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return("bob"));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return("secret"));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_FALSE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, authenticate_fail_acct_mgmt)
|
|
|
|
{
|
|
|
|
MockPam pam;
|
2020-03-20 13:02:38 +00:00
|
|
|
EXPECT_CALL(pam, pam_start(StrEq("webfused"), nullptr, _, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_authenticate(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
|
|
|
EXPECT_CALL(pam, pam_acct_mgmt(_, PAM_DISALLOW_NULL_AUTHTOK)).Times(1).WillOnce(Return(-1));
|
|
|
|
EXPECT_CALL(pam, pam_end(_, _)).Times(1).WillOnce(Return(PAM_SUCCESS));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return("bob"));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return("secret"));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_FALSE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, authenticate_fail_missing_username)
|
|
|
|
{
|
|
|
|
StrictMock<MockPam> pam;
|
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return(nullptr));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return("secret"));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_FALSE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(pam_authenticator, authenticate_fail_missing_password)
|
|
|
|
{
|
|
|
|
StrictMock<MockPam> pam;
|
|
|
|
|
|
|
|
wfd_authenticator authenticator;
|
|
|
|
bool success = wfd_pam_authenticator_create(nullptr, &authenticator);
|
|
|
|
ASSERT_TRUE(success);
|
|
|
|
|
|
|
|
MockCredentials creds;
|
2020-03-20 13:26:41 +00:00
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("username"))).Times(1).WillOnce(Return("bob"));
|
|
|
|
EXPECT_CALL(creds, wf_credentials_get(_,StrEq("password"))).Times(1).WillOnce(Return(nullptr));
|
2020-03-19 20:53:49 +00:00
|
|
|
|
|
|
|
bool is_authenticated = wfd_authenticator_authenticate(authenticator, nullptr);
|
|
|
|
ASSERT_FALSE(is_authenticated);
|
|
|
|
|
|
|
|
wfd_authenticator_dispose(authenticator);
|
|
|
|
}
|