Merge pull request #1109 from nextcloud/add-more-secrets-to-password-reset-link
Use mail for encrypting the password reset token as well
This commit is contained in:
commit
ac61f64190
|
@ -44,6 +44,7 @@ class Application extends App {
|
|||
parent::__construct('core');
|
||||
|
||||
$container = $this->getContainer();
|
||||
|
||||
$container->registerService('defaultMailAddress', function() {
|
||||
return Util::getDefaultEmailAddress('lostpassword-noreply');
|
||||
});
|
||||
|
|
|
@ -40,6 +40,7 @@ use \OCP\IL10N;
|
|||
use \OCP\IConfig;
|
||||
use OCP\IUserManager;
|
||||
use OCP\Mail\IMailer;
|
||||
use OCP\Security\ICrypto;
|
||||
use OCP\Security\ISecureRandom;
|
||||
|
||||
/**
|
||||
|
@ -71,6 +72,8 @@ class LostController extends Controller {
|
|||
protected $mailer;
|
||||
/** @var ITimeFactory */
|
||||
protected $timeFactory;
|
||||
/** @var ICrypto */
|
||||
protected $crypto;
|
||||
|
||||
/**
|
||||
* @param string $appName
|
||||
|
@ -85,6 +88,7 @@ class LostController extends Controller {
|
|||
* @param IManager $encryptionManager
|
||||
* @param IMailer $mailer
|
||||
* @param ITimeFactory $timeFactory
|
||||
* @param ICrypto $crypto
|
||||
*/
|
||||
public function __construct($appName,
|
||||
IRequest $request,
|
||||
|
@ -97,7 +101,8 @@ class LostController extends Controller {
|
|||
$defaultMailAddress,
|
||||
IManager $encryptionManager,
|
||||
IMailer $mailer,
|
||||
ITimeFactory $timeFactory) {
|
||||
ITimeFactory $timeFactory,
|
||||
ICrypto $crypto) {
|
||||
parent::__construct($appName, $request);
|
||||
$this->urlGenerator = $urlGenerator;
|
||||
$this->userManager = $userManager;
|
||||
|
@ -109,6 +114,7 @@ class LostController extends Controller {
|
|||
$this->config = $config;
|
||||
$this->mailer = $mailer;
|
||||
$this->timeFactory = $timeFactory;
|
||||
$this->crypto = $crypto;
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -150,8 +156,19 @@ class LostController extends Controller {
|
|||
*/
|
||||
private function checkPasswordResetToken($token, $userId) {
|
||||
$user = $this->userManager->get($userId);
|
||||
if($user === null) {
|
||||
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
|
||||
}
|
||||
|
||||
$splittedToken = explode(':', $this->config->getUserValue($userId, 'core', 'lostpassword', null));
|
||||
try {
|
||||
$encryptedToken = $this->config->getUserValue($userId, 'core', 'lostpassword', null);
|
||||
$mailAddress = !is_null($user->getEMailAddress()) ? $user->getEMailAddress() : '';
|
||||
$decryptedToken = $this->crypto->decrypt($encryptedToken, $mailAddress.$this->config->getSystemValue('secret'));
|
||||
} catch (\Exception $e) {
|
||||
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
|
||||
}
|
||||
|
||||
$splittedToken = explode(':', $decryptedToken);
|
||||
if(count($splittedToken) !== 2) {
|
||||
throw new \Exception($this->l10n->t('Couldn\'t reset password because the token is invalid'));
|
||||
}
|
||||
|
@ -249,11 +266,20 @@ class LostController extends Controller {
|
|||
);
|
||||
}
|
||||
|
||||
$token = $this->secureRandom->generate(21,
|
||||
// Generate the token. It is stored encrypted in the database with the
|
||||
// secret being the users' email address appended with the system secret.
|
||||
// This makes the token automatically invalidate once the user changes
|
||||
// their email address.
|
||||
$token = $this->secureRandom->generate(
|
||||
21,
|
||||
ISecureRandom::CHAR_DIGITS.
|
||||
ISecureRandom::CHAR_LOWER.
|
||||
ISecureRandom::CHAR_UPPER);
|
||||
$this->config->setUserValue($user, 'core', 'lostpassword', $this->timeFactory->getTime() .':'. $token);
|
||||
ISecureRandom::CHAR_UPPER
|
||||
);
|
||||
$tokenValue = $this->timeFactory->getTime() .':'. $token;
|
||||
$mailAddress = !is_null($userObject->getEMailAddress()) ? $userObject->getEMailAddress() : '';
|
||||
$encryptedValue = $this->crypto->encrypt($tokenValue, $mailAddress.$this->config->getSystemValue('secret'));
|
||||
$this->config->setUserValue($user, 'core', 'lostpassword', $encryptedValue);
|
||||
|
||||
$link = $this->urlGenerator->linkToRouteAbsolute('core.lost.resetform', array('userId' => $user, 'token' => $token));
|
||||
|
||||
|
|
|
@ -22,6 +22,7 @@
|
|||
namespace Tests\Core\Controller;
|
||||
|
||||
use OC\Core\Controller\LostController;
|
||||
use OC\Mail\Message;
|
||||
use OCP\AppFramework\Http\TemplateResponse;
|
||||
use OCP\AppFramework\Utility\ITimeFactory;
|
||||
use OCP\Encryption\IManager;
|
||||
|
@ -32,6 +33,7 @@ use OCP\IURLGenerator;
|
|||
use OCP\IUser;
|
||||
use OCP\IUserManager;
|
||||
use OCP\Mail\IMailer;
|
||||
use OCP\Security\ICrypto;
|
||||
use OCP\Security\ISecureRandom;
|
||||
use PHPUnit_Framework_MockObject_MockObject;
|
||||
|
||||
|
@ -66,22 +68,21 @@ class LostControllerTest extends \Test\TestCase {
|
|||
private $timeFactory;
|
||||
/** @var IRequest */
|
||||
private $request;
|
||||
/** @var ICrypto|\PHPUnit_Framework_MockObject_MockObject */
|
||||
private $crypto;
|
||||
|
||||
protected function setUp() {
|
||||
parent::setUp();
|
||||
|
||||
$this->existingUser = $this->getMockBuilder('OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
|
||||
$this->existingUser
|
||||
->expects($this->any())
|
||||
->method('getEMailAddress')
|
||||
$this->existingUser = $this->createMock(IUser::class);
|
||||
$this->existingUser->method('getEMailAddress')
|
||||
->willReturn('test@example.com');
|
||||
|
||||
$this->config = $this->getMockBuilder('\OCP\IConfig')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$this->l10n = $this->getMockBuilder('\OCP\IL10N')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$this->config = $this->createMock(IConfig::class);
|
||||
$this->config->method('getSystemValue')
|
||||
->with('secret', null)
|
||||
->willReturn('SECRET');
|
||||
$this->l10n = $this->createMock(IL10N::class);
|
||||
$this->l10n
|
||||
->expects($this->any())
|
||||
->method('t')
|
||||
|
@ -107,6 +108,7 @@ class LostControllerTest extends \Test\TestCase {
|
|||
$this->encryptionManager->expects($this->any())
|
||||
->method('isEnabled')
|
||||
->willReturn(true);
|
||||
$this->crypto = $this->createMock(ICrypto::class);
|
||||
$this->lostController = new LostController(
|
||||
'Core',
|
||||
$this->request,
|
||||
|
@ -119,45 +121,45 @@ class LostControllerTest extends \Test\TestCase {
|
|||
'lostpassword-noreply@localhost',
|
||||
$this->encryptionManager,
|
||||
$this->mailer,
|
||||
$this->timeFactory
|
||||
$this->timeFactory,
|
||||
$this->crypto
|
||||
);
|
||||
}
|
||||
|
||||
public function testResetFormInvalidToken() {
|
||||
$userId = 'admin';
|
||||
$token = 'MySecretToken';
|
||||
$response = $this->lostController->resetform($token, $userId);
|
||||
$expectedResponse = new TemplateResponse('core',
|
||||
public function testResetFormWithNotExistingUser() {
|
||||
$this->userManager->method('get')
|
||||
->with('NotExistingUser')
|
||||
->willReturn(null);
|
||||
|
||||
$expectedResponse = new TemplateResponse(
|
||||
'core',
|
||||
'error',
|
||||
[
|
||||
'errors' => [
|
||||
['error' => 'Couldn\'t reset password because the token is invalid'],
|
||||
]
|
||||
],
|
||||
'guest');
|
||||
$this->assertEquals($expectedResponse, $response);
|
||||
'guest'
|
||||
);
|
||||
$this->assertEquals($expectedResponse, $this->lostController->resetform('MySecretToken', 'NotExistingUser'));
|
||||
}
|
||||
|
||||
public function testResetFormInvalidTokenMatch() {
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
$user = $this->getMockBuilder('\OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$user
|
||||
->expects($this->once())
|
||||
->method('getLastLogin')
|
||||
->willReturn('encryptedToken');
|
||||
$this->existingUser->method('getLastLogin')
|
||||
->will($this->returnValue(12344));
|
||||
$this->userManager
|
||||
->expects($this->once())
|
||||
->method('get')
|
||||
$this->userManager->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->will($this->returnValue($user));
|
||||
$userId = 'ValidTokenUser';
|
||||
$token = '12345:MySecretToken';
|
||||
$response = $this->lostController->resetform($token, $userId);
|
||||
->willReturn($this->existingUser);
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('encryptedToken'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
|
||||
$response = $this->lostController->resetform('12345:MySecretToken', 'ValidTokenUser');
|
||||
$expectedResponse = new TemplateResponse('core',
|
||||
'error',
|
||||
[
|
||||
|
@ -171,25 +173,25 @@ class LostControllerTest extends \Test\TestCase {
|
|||
|
||||
|
||||
public function testResetFormExpiredToken() {
|
||||
$user = $this->getMockBuilder('\OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$this->userManager
|
||||
->expects($this->once())
|
||||
->method('get')
|
||||
$this->userManager->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->will($this->returnValue($user));
|
||||
$this->timeFactory
|
||||
->expects($this->once())
|
||||
->method('getTime')
|
||||
->will($this->returnValue(12345*60*60*12));
|
||||
$userId = 'ValidTokenUser';
|
||||
$token = 'TheOnlyAndOnlyOneTokenToResetThePassword';
|
||||
->willReturn($this->existingUser);
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
$response = $this->lostController->resetform($token, $userId);
|
||||
->will($this->returnValue('encryptedToken'));
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('encryptedToken'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
$this->timeFactory
|
||||
->expects($this->once())
|
||||
->method('getTime')
|
||||
->willReturn(999999);
|
||||
|
||||
$response = $this->lostController->resetform('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser');
|
||||
$expectedResponse = new TemplateResponse('core',
|
||||
'error',
|
||||
[
|
||||
|
@ -202,35 +204,32 @@ class LostControllerTest extends \Test\TestCase {
|
|||
}
|
||||
|
||||
public function testResetFormValidToken() {
|
||||
$user = $this->getMockBuilder('\OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$user
|
||||
->expects($this->once())
|
||||
->method('getLastLogin')
|
||||
->will($this->returnValue(12344));
|
||||
$this->userManager
|
||||
->expects($this->once())
|
||||
->method('get')
|
||||
$this->existingUser->method('getLastLogin')
|
||||
->willReturn(12344);
|
||||
$this->userManager->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->will($this->returnValue($user));
|
||||
->willReturn($this->existingUser);
|
||||
$this->timeFactory
|
||||
->expects($this->once())
|
||||
->method('getTime')
|
||||
->will($this->returnValue(12348));
|
||||
$userId = 'ValidTokenUser';
|
||||
$token = 'TheOnlyAndOnlyOneTokenToResetThePassword';
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
->willReturn(12348);
|
||||
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
->willReturn('encryptedToken');
|
||||
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('encryptedToken'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
$this->urlGenerator
|
||||
->expects($this->once())
|
||||
->method('linkToRouteAbsolute')
|
||||
->with('core.lost.setPassword', array('userId' => 'ValidTokenUser', 'token' => 'TheOnlyAndOnlyOneTokenToResetThePassword'))
|
||||
->will($this->returnValue('https://example.tld/index.php/lostpassword/'));
|
||||
|
||||
$response = $this->lostController->resetform($token, $userId);
|
||||
$response = $this->lostController->resetform('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser');
|
||||
$expectedResponse = new TemplateResponse('core',
|
||||
'lostpassword/resetpassword',
|
||||
array(
|
||||
|
@ -296,7 +295,7 @@ class LostControllerTest extends \Test\TestCase {
|
|||
$this->config
|
||||
->expects($this->once())
|
||||
->method('setUserValue')
|
||||
->with('ExistingUser', 'core', 'lostpassword', '12348:ThisIsMaybeANotSoSecretToken!');
|
||||
->with('ExistingUser', 'core', 'lostpassword', 'encryptedToken');
|
||||
$this->urlGenerator
|
||||
->expects($this->once())
|
||||
->method('linkToRouteAbsolute')
|
||||
|
@ -329,6 +328,16 @@ class LostControllerTest extends \Test\TestCase {
|
|||
->method('send')
|
||||
->with($message);
|
||||
|
||||
$this->config->method('getSystemValue')
|
||||
->with('secret', '')
|
||||
->willReturn('SECRET');
|
||||
|
||||
$this->crypto->method('encrypt')
|
||||
->with(
|
||||
$this->equalTo('12348:ThisIsMaybeANotSoSecretToken!'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('encryptedToken');
|
||||
|
||||
$response = $this->lostController->email('ExistingUser');
|
||||
$expectedResponse = array('status' => 'success');
|
||||
$this->assertSame($expectedResponse, $response);
|
||||
|
@ -353,7 +362,7 @@ class LostControllerTest extends \Test\TestCase {
|
|||
$this->config
|
||||
->expects($this->once())
|
||||
->method('setUserValue')
|
||||
->with('ExistingUser', 'core', 'lostpassword', '12348:ThisIsMaybeANotSoSecretToken!');
|
||||
->with('ExistingUser', 'core', 'lostpassword', 'encryptedToken');
|
||||
$this->timeFactory
|
||||
->expects($this->once())
|
||||
->method('getTime')
|
||||
|
@ -363,8 +372,7 @@ class LostControllerTest extends \Test\TestCase {
|
|||
->method('linkToRouteAbsolute')
|
||||
->with('core.lost.resetform', array('userId' => 'ExistingUser', 'token' => 'ThisIsMaybeANotSoSecretToken!'))
|
||||
->will($this->returnValue('https://example.tld/index.php/lostpassword/'));
|
||||
$message = $this->getMockBuilder('\OC\Mail\Message')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$message = $this->createMock(Message::class);
|
||||
$message
|
||||
->expects($this->at(0))
|
||||
->method('setTo')
|
||||
|
@ -391,85 +399,95 @@ class LostControllerTest extends \Test\TestCase {
|
|||
->with($message)
|
||||
->will($this->throwException(new \Exception()));
|
||||
|
||||
$this->config->method('getSystemValue')
|
||||
->with('secret', '')
|
||||
->willReturn('SECRET');
|
||||
|
||||
$this->crypto->method('encrypt')
|
||||
->with(
|
||||
$this->equalTo('12348:ThisIsMaybeANotSoSecretToken!'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('encryptedToken');
|
||||
|
||||
$response = $this->lostController->email('ExistingUser');
|
||||
$expectedResponse = ['status' => 'error', 'msg' => 'Couldn\'t send reset email. Please contact your administrator.'];
|
||||
$this->assertSame($expectedResponse, $response);
|
||||
}
|
||||
|
||||
public function testSetPasswordUnsuccessful() {
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
->with('InvalidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->willReturn('encryptedData');
|
||||
$this->existingUser->method('getLastLogin')
|
||||
->will($this->returnValue(12344));
|
||||
$this->existingUser->expects($this->once())
|
||||
->method('setPassword')
|
||||
->with('NewPassword')
|
||||
->willReturn(false);
|
||||
$this->userManager->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->willReturn($this->existingUser);
|
||||
$this->config->expects($this->never())
|
||||
->method('deleteUserValue');
|
||||
$this->timeFactory->method('getTime')
|
||||
->will($this->returnValue(12348));
|
||||
|
||||
// With an invalid token
|
||||
$userName = 'InvalidTokenUser';
|
||||
$response = $this->lostController->setPassword('wrongToken', $userName, 'NewPassword', true);
|
||||
$expectedResponse = [
|
||||
'status' => 'error',
|
||||
'msg' => 'Couldn\'t reset password because the token is invalid'
|
||||
];
|
||||
$this->assertSame($expectedResponse, $response);
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('encryptedData'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
|
||||
// With a valid token and no proceed
|
||||
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword!', $userName, 'NewPassword', false);
|
||||
$expectedResponse = ['status' => 'error', 'msg' => '', 'encryption' => true];
|
||||
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
|
||||
$expectedResponse = array('status' => 'error', 'msg' => '');
|
||||
$this->assertSame($expectedResponse, $response);
|
||||
}
|
||||
|
||||
public function testSetPasswordSuccessful() {
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
$user = $this->getMockBuilder('\OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$user
|
||||
->expects($this->once())
|
||||
->method('getLastLogin')
|
||||
->willReturn('encryptedData');
|
||||
$this->existingUser->method('getLastLogin')
|
||||
->will($this->returnValue(12344));
|
||||
$user->expects($this->once())
|
||||
$this->existingUser->expects($this->once())
|
||||
->method('setPassword')
|
||||
->with('NewPassword')
|
||||
->will($this->returnValue(true));
|
||||
$this->userManager
|
||||
->expects($this->exactly(2))
|
||||
->method('get')
|
||||
->willReturn(true);
|
||||
$this->userManager->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->will($this->returnValue($user));
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->willReturn($this->existingUser);
|
||||
$this->config->expects($this->once())
|
||||
->method('deleteUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword');
|
||||
$this->timeFactory
|
||||
->expects($this->once())
|
||||
->method('getTime')
|
||||
$this->timeFactory->method('getTime')
|
||||
->will($this->returnValue(12348));
|
||||
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('encryptedData'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
|
||||
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
|
||||
$expectedResponse = array('status' => 'success');
|
||||
$this->assertSame($expectedResponse, $response);
|
||||
}
|
||||
|
||||
public function testSetPasswordExpiredToken() {
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
$user = $this->getMockBuilder('\OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$this->userManager
|
||||
->expects($this->once())
|
||||
->method('get')
|
||||
->willReturn('encryptedData');
|
||||
$this->userManager->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->will($this->returnValue($user));
|
||||
$this->timeFactory
|
||||
->expects($this->once())
|
||||
->method('getTime')
|
||||
->will($this->returnValue(55546));
|
||||
->willReturn($this->existingUser);
|
||||
$this->timeFactory->method('getTime')
|
||||
->willReturn(55546);
|
||||
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('encryptedData'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
|
||||
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
|
||||
$expectedResponse = [
|
||||
|
@ -480,18 +498,19 @@ class LostControllerTest extends \Test\TestCase {
|
|||
}
|
||||
|
||||
public function testSetPasswordInvalidDataInDb() {
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
$user = $this->getMockBuilder('\OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
->willReturn('invalidEncryptedData');
|
||||
$this->userManager
|
||||
->expects($this->once())
|
||||
->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->will($this->returnValue($user));
|
||||
->willReturn($this->existingUser);
|
||||
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('invalidEncryptedData'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
|
||||
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
|
||||
$expectedResponse = [
|
||||
|
@ -502,27 +521,25 @@ class LostControllerTest extends \Test\TestCase {
|
|||
}
|
||||
|
||||
public function testSetPasswordExpiredTokenDueToLogin() {
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue('12345:TheOnlyAndOnlyOneTokenToResetThePassword'));
|
||||
$user = $this->getMockBuilder('\OCP\IUser')
|
||||
->disableOriginalConstructor()->getMock();
|
||||
$user
|
||||
->expects($this->once())
|
||||
->method('getLastLogin')
|
||||
->willReturn('encryptedData');
|
||||
$this->existingUser->method('getLastLogin')
|
||||
->will($this->returnValue(12346));
|
||||
$this->userManager
|
||||
->expects($this->once())
|
||||
->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->will($this->returnValue($user));
|
||||
->willReturn($this->existingUser);
|
||||
$this->timeFactory
|
||||
->expects($this->once())
|
||||
->method('getTime')
|
||||
->will($this->returnValue(12345));
|
||||
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo('encryptedData'),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willReturn('12345:TheOnlyAndOnlyOneTokenToResetThePassword');
|
||||
|
||||
$response = $this->lostController->setPassword('TheOnlyAndOnlyOneTokenToResetThePassword', 'ValidTokenUser', 'NewPassword', true);
|
||||
$expectedResponse = [
|
||||
'status' => 'error',
|
||||
|
@ -532,11 +549,18 @@ class LostControllerTest extends \Test\TestCase {
|
|||
}
|
||||
|
||||
public function testIsSetPasswordWithoutTokenFailing() {
|
||||
$this->config
|
||||
->expects($this->once())
|
||||
->method('getUserValue')
|
||||
$this->config->method('getUserValue')
|
||||
->with('ValidTokenUser', 'core', 'lostpassword', null)
|
||||
->will($this->returnValue(null));
|
||||
$this->userManager->method('get')
|
||||
->with('ValidTokenUser')
|
||||
->willReturn($this->existingUser);
|
||||
|
||||
$this->crypto->method('decrypt')
|
||||
->with(
|
||||
$this->equalTo(''),
|
||||
$this->equalTo('test@example.comSECRET')
|
||||
)->willThrowException(new \Exception());
|
||||
|
||||
$response = $this->lostController->setPassword('', 'ValidTokenUser', 'NewPassword', true);
|
||||
$expectedResponse = [
|
||||
|
@ -546,4 +570,24 @@ class LostControllerTest extends \Test\TestCase {
|
|||
$this->assertSame($expectedResponse, $response);
|
||||
}
|
||||
|
||||
public function testSendEmailNoEmail() {
|
||||
$user = $this->createMock(IUser::class);
|
||||
$this->userManager->method('userExists')
|
||||
->with('ExistingUser')
|
||||
->willReturn(true);
|
||||
$this->userManager->method('get')
|
||||
->with('ExistingUser')
|
||||
->willReturn($user);
|
||||
|
||||
$response = $this->lostController->email('ExistingUser');
|
||||
$expectedResponse = ['status' => 'error', 'msg' => 'Could not send reset email because there is no email address for this username. Please contact your administrator.'];
|
||||
$this->assertSame($expectedResponse, $response);
|
||||
}
|
||||
|
||||
public function testSetPasswordEncryptionDontProceed() {
|
||||
$response = $this->lostController->setPassword('myToken', 'user', 'newpass', false);
|
||||
$expectedResponse = ['status' => 'error', 'msg' => '', 'encryption' => true];
|
||||
$this->assertSame($expectedResponse, $response);
|
||||
}
|
||||
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue