mirror of
https://github.com/bitwarden/server.git
synced 2024-11-28 13:15:12 +01:00
fae8692d2a
* Move key rotation & validators to km ownership * Fix build errors * Fix build errors * Fix import ordering * Update validator namespace * Move key rotation data to km ownership * Fix linting * Fix namespaces * Fix namespace * Fix namespaces * Move rotateuserkeycommandtests to km ownership
86 lines
3.1 KiB
C#
86 lines
3.1 KiB
C#
using Bit.Core.Auth.Entities;
|
|
using Bit.Core.Auth.Repositories;
|
|
using Bit.Core.Entities;
|
|
using Bit.Core.KeyManagement.Models.Data;
|
|
using Bit.Core.KeyManagement.UserKey.Implementations;
|
|
using Bit.Core.Services;
|
|
using Bit.Test.Common.AutoFixture;
|
|
using Bit.Test.Common.AutoFixture.Attributes;
|
|
using Microsoft.AspNetCore.Identity;
|
|
using NSubstitute;
|
|
using Xunit;
|
|
|
|
namespace Bit.Core.Test.KeyManagement.UserFeatures.UserKey;
|
|
|
|
[SutProviderCustomize]
|
|
public class RotateUserKeyCommandTests
|
|
{
|
|
[Theory, BitAutoData]
|
|
public async Task RotateUserKeyAsync_Success(SutProvider<RotateUserKeyCommand> sutProvider, User user,
|
|
RotateUserKeyData model)
|
|
{
|
|
sutProvider.GetDependency<IUserService>().CheckPasswordAsync(user, model.MasterPasswordHash)
|
|
.Returns(true);
|
|
foreach (var webauthnCred in model.WebAuthnKeys)
|
|
{
|
|
var dbWebauthnCred = new WebAuthnCredential
|
|
{
|
|
EncryptedPublicKey = "encryptedPublicKey",
|
|
EncryptedUserKey = "encryptedUserKey"
|
|
};
|
|
sutProvider.GetDependency<IWebAuthnCredentialRepository>().GetByIdAsync(webauthnCred.Id, user.Id)
|
|
.Returns(dbWebauthnCred);
|
|
}
|
|
|
|
var result = await sutProvider.Sut.RotateUserKeyAsync(user, model);
|
|
|
|
Assert.Equal(IdentityResult.Success, result);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task RotateUserKeyAsync_InvalidMasterPasswordHash_ReturnsFailedIdentityResult(
|
|
SutProvider<RotateUserKeyCommand> sutProvider, User user, RotateUserKeyData model)
|
|
{
|
|
sutProvider.GetDependency<IUserService>().CheckPasswordAsync(user, model.MasterPasswordHash)
|
|
.Returns(false);
|
|
foreach (var webauthnCred in model.WebAuthnKeys)
|
|
{
|
|
var dbWebauthnCred = new WebAuthnCredential
|
|
{
|
|
EncryptedPublicKey = "encryptedPublicKey",
|
|
EncryptedUserKey = "encryptedUserKey"
|
|
};
|
|
sutProvider.GetDependency<IWebAuthnCredentialRepository>().GetByIdAsync(webauthnCred.Id, user.Id)
|
|
.Returns(dbWebauthnCred);
|
|
}
|
|
|
|
var result = await sutProvider.Sut.RotateUserKeyAsync(user, model);
|
|
|
|
Assert.False(result.Succeeded);
|
|
}
|
|
|
|
[Theory, BitAutoData]
|
|
public async Task RotateUserKeyAsync_LogsOutUser(
|
|
SutProvider<RotateUserKeyCommand> sutProvider, User user, RotateUserKeyData model)
|
|
{
|
|
sutProvider.GetDependency<IUserService>().CheckPasswordAsync(user, model.MasterPasswordHash)
|
|
.Returns(true);
|
|
foreach (var webauthnCred in model.WebAuthnKeys)
|
|
{
|
|
var dbWebauthnCred = new WebAuthnCredential
|
|
{
|
|
EncryptedPublicKey = "encryptedPublicKey",
|
|
EncryptedUserKey = "encryptedUserKey"
|
|
};
|
|
sutProvider.GetDependency<IWebAuthnCredentialRepository>().GetByIdAsync(webauthnCred.Id, user.Id)
|
|
.Returns(dbWebauthnCred);
|
|
}
|
|
|
|
await sutProvider.Sut.RotateUserKeyAsync(user, model);
|
|
|
|
await sutProvider.GetDependency<IPushNotificationService>().ReceivedWithAnyArgs()
|
|
.PushLogOutAsync(default, default);
|
|
}
|
|
|
|
}
|