mirror of
https://github.com/bitwarden/server.git
synced 2024-12-05 14:23:30 +01:00
88dd745070
* [PM-1188] add sso project to auth * [PM-1188] move sso api models to auth * [PM-1188] fix sso api model namespace & imports * [PM-1188] move core files to auth * [PM-1188] fix core sso namespace & models * [PM-1188] move sso repository files to auth * [PM-1188] fix sso repo files namespace & imports * [PM-1188] move sso sql files to auth folder * [PM-1188] move sso test files to auth folders * [PM-1188] fix sso tests namespace & imports * [PM-1188] move auth api files to auth folder * [PM-1188] fix auth api files namespace & imports * [PM-1188] move auth core files to auth folder * [PM-1188] fix auth core files namespace & imports * [PM-1188] move auth email templates to auth folder * [PM-1188] move auth email folder back into shared directory * [PM-1188] fix auth email names * [PM-1188] move auth core models to auth folder * [PM-1188] fix auth model namespace & imports * [PM-1188] add entire Identity project to auth codeowners * [PM-1188] fix auth orm files namespace & imports * [PM-1188] move auth orm files to auth folder * [PM-1188] move auth sql files to auth folder * [PM-1188] move auth tests to auth folder * [PM-1188] fix auth test files namespace & imports * [PM-1188] move emergency access api files to auth folder * [PM-1188] fix emergencyaccess api files namespace & imports * [PM-1188] move emergency access core files to auth folder * [PM-1188] fix emergency access core files namespace & imports * [PM-1188] move emergency access orm files to auth folder * [PM-1188] fix emergency access orm files namespace & imports * [PM-1188] move emergency access sql files to auth folder * [PM-1188] move emergencyaccess test files to auth folder * [PM-1188] fix emergency access test files namespace & imports * [PM-1188] move captcha files to auth folder * [PM-1188] fix captcha files namespace & imports * [PM-1188] move auth admin files into auth folder * [PM-1188] fix admin auth files namespace & imports - configure mvc to look in auth folders for views * [PM-1188] remove extra imports and formatting * [PM-1188] fix ef auth model imports * [PM-1188] fix DatabaseContextModelSnapshot paths * [PM-1188] fix grant import in ef * [PM-1188] update sqlproj * [PM-1188] move missed sqlproj files * [PM-1188] move auth ef models out of auth folder * [PM-1188] fix auth ef models namespace * [PM-1188] remove auth ef models unused imports * [PM-1188] fix imports for auth ef models * [PM-1188] fix more ef model imports * [PM-1188] fix file encodings
145 lines
5.7 KiB
C#
145 lines
5.7 KiB
C#
using System.Text.Json;
|
|
using Bit.Core.Auth.Enums;
|
|
using Bit.Core.Auth.Models;
|
|
using Bit.Core.Entities;
|
|
using Bit.Test.Common.Helpers;
|
|
using Xunit;
|
|
|
|
namespace Bit.Core.Test.Entities;
|
|
|
|
public class UserTests
|
|
{
|
|
// KB MB GB
|
|
public const long Multiplier = 1024 * 1024 * 1024;
|
|
|
|
[Fact]
|
|
public void StorageBytesRemaining_HasMax_DoesNotHaveStorage_ReturnsMaxAsBytes()
|
|
{
|
|
short maxStorageGb = 1;
|
|
|
|
var user = new User
|
|
{
|
|
MaxStorageGb = maxStorageGb,
|
|
Storage = null,
|
|
};
|
|
|
|
var bytesRemaining = user.StorageBytesRemaining();
|
|
|
|
Assert.Equal(bytesRemaining, maxStorageGb * Multiplier);
|
|
}
|
|
|
|
[Theory]
|
|
[InlineData(2, 1 * Multiplier, 1 * Multiplier)]
|
|
|
|
public void StorageBytesRemaining_HasMax_HasStorage_ReturnRemainingStorage(short maxStorageGb, long storageBytes, long expectedRemainingBytes)
|
|
{
|
|
var user = new User
|
|
{
|
|
MaxStorageGb = maxStorageGb,
|
|
Storage = storageBytes,
|
|
};
|
|
|
|
var bytesRemaining = user.StorageBytesRemaining();
|
|
|
|
Assert.Equal(expectedRemainingBytes, bytesRemaining);
|
|
}
|
|
|
|
private static readonly Dictionary<TwoFactorProviderType, TwoFactorProvider> _testTwoFactorConfig = new Dictionary<TwoFactorProviderType, TwoFactorProvider>
|
|
{
|
|
[TwoFactorProviderType.WebAuthn] = new TwoFactorProvider
|
|
{
|
|
Enabled = true,
|
|
MetaData = new Dictionary<string, object>
|
|
{
|
|
["Item"] = "thing",
|
|
},
|
|
},
|
|
[TwoFactorProviderType.Email] = new TwoFactorProvider
|
|
{
|
|
Enabled = false,
|
|
MetaData = new Dictionary<string, object>
|
|
{
|
|
["Email"] = "test@email.com",
|
|
},
|
|
},
|
|
};
|
|
|
|
[Fact]
|
|
public void SetTwoFactorProviders_Success()
|
|
{
|
|
var user = new User();
|
|
user.SetTwoFactorProviders(_testTwoFactorConfig);
|
|
|
|
using var jsonDocument = JsonDocument.Parse(user.TwoFactorProviders);
|
|
var root = jsonDocument.RootElement;
|
|
|
|
var webAuthn = AssertHelper.AssertJsonProperty(root, "7", JsonValueKind.Object);
|
|
AssertHelper.AssertJsonProperty(webAuthn, "Enabled", JsonValueKind.True);
|
|
var webMetaData = AssertHelper.AssertJsonProperty(webAuthn, "MetaData", JsonValueKind.Object);
|
|
AssertHelper.AssertJsonProperty(webMetaData, "Item", JsonValueKind.String);
|
|
|
|
var email = AssertHelper.AssertJsonProperty(root, "1", JsonValueKind.Object);
|
|
AssertHelper.AssertJsonProperty(email, "Enabled", JsonValueKind.False);
|
|
var emailMetaData = AssertHelper.AssertJsonProperty(email, "MetaData", JsonValueKind.Object);
|
|
AssertHelper.AssertJsonProperty(emailMetaData, "Email", JsonValueKind.String);
|
|
}
|
|
|
|
[Fact]
|
|
public void GetTwoFactorProviders_Success()
|
|
{
|
|
// This is to get rid of the cached dictionary the SetTwoFactorProviders keeps so we can fully test the JSON reading
|
|
// It intent is to mimic a storing of the entity in the database and it being read later
|
|
var tempUser = new User();
|
|
tempUser.SetTwoFactorProviders(_testTwoFactorConfig);
|
|
var user = new User
|
|
{
|
|
TwoFactorProviders = tempUser.TwoFactorProviders,
|
|
};
|
|
|
|
var twoFactorProviders = user.GetTwoFactorProviders();
|
|
|
|
var webAuthn = Assert.Contains(TwoFactorProviderType.WebAuthn, (IDictionary<TwoFactorProviderType, TwoFactorProvider>)twoFactorProviders);
|
|
Assert.True(webAuthn.Enabled);
|
|
Assert.NotNull(webAuthn.MetaData);
|
|
var webAuthnMetaDataItem = Assert.Contains("Item", (IDictionary<string, object>)webAuthn.MetaData);
|
|
Assert.Equal("thing", webAuthnMetaDataItem);
|
|
|
|
var email = Assert.Contains(TwoFactorProviderType.Email, (IDictionary<TwoFactorProviderType, TwoFactorProvider>)twoFactorProviders);
|
|
Assert.False(email.Enabled);
|
|
Assert.NotNull(email.MetaData);
|
|
var emailMetaDataEmail = Assert.Contains("Email", (IDictionary<string, object>)email.MetaData);
|
|
Assert.Equal("test@email.com", emailMetaDataEmail);
|
|
}
|
|
|
|
[Fact]
|
|
public void GetTwoFactorProviders_SavedWithName_Success()
|
|
{
|
|
var user = new User();
|
|
// This should save items with the string name of the enum and we will validate that we can read
|
|
// from that just incase some users have it saved that way.
|
|
user.TwoFactorProviders = JsonSerializer.Serialize(_testTwoFactorConfig);
|
|
|
|
// Preliminary Asserts to make sure we are testing what we want to be testing
|
|
using var jsonDocument = JsonDocument.Parse(user.TwoFactorProviders);
|
|
var root = jsonDocument.RootElement;
|
|
// This means it saved the enum as its string name
|
|
AssertHelper.AssertJsonProperty(root, "WebAuthn", JsonValueKind.Object);
|
|
AssertHelper.AssertJsonProperty(root, "Email", JsonValueKind.Object);
|
|
|
|
// Actual checks
|
|
var twoFactorProviders = user.GetTwoFactorProviders();
|
|
|
|
var webAuthn = Assert.Contains(TwoFactorProviderType.WebAuthn, (IDictionary<TwoFactorProviderType, TwoFactorProvider>)twoFactorProviders);
|
|
Assert.True(webAuthn.Enabled);
|
|
Assert.NotNull(webAuthn.MetaData);
|
|
var webAuthnMetaDataItem = Assert.Contains("Item", (IDictionary<string, object>)webAuthn.MetaData);
|
|
Assert.Equal("thing", webAuthnMetaDataItem);
|
|
|
|
var email = Assert.Contains(TwoFactorProviderType.Email, (IDictionary<TwoFactorProviderType, TwoFactorProvider>)twoFactorProviders);
|
|
Assert.False(email.Enabled);
|
|
Assert.NotNull(email.MetaData);
|
|
var emailMetaDataEmail = Assert.Contains("Email", (IDictionary<string, object>)email.MetaData);
|
|
Assert.Equal("test@email.com", emailMetaDataEmail);
|
|
}
|
|
}
|