You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
348 lines
14 KiB
348 lines
14 KiB
<?php
|
|
// This file is part of Moodle - http://moodle.org/
|
|
//
|
|
// Moodle is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// Moodle is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Moodle. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
/**
|
|
* Authentication related tests.
|
|
*
|
|
* @package core_auth
|
|
* @category phpunit
|
|
* @copyright 2012 Petr Skoda {@link http://skodak.org}
|
|
* @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
|
|
*/
|
|
|
|
defined('MOODLE_INTERNAL') || die();
|
|
|
|
|
|
/**
|
|
* Functional test for authentication related APIs.
|
|
*/
|
|
class core_authlib_testcase extends advanced_testcase {
|
|
public function test_lockout() {
|
|
global $CFG;
|
|
require_once("$CFG->libdir/authlib.php");
|
|
|
|
$this->resetAfterTest();
|
|
|
|
$oldlog = ini_get('error_log');
|
|
ini_set('error_log', "$CFG->dataroot/testlog.log"); // Prevent standard logging.
|
|
|
|
unset_config('noemailever');
|
|
|
|
set_config('lockoutthreshold', 0);
|
|
set_config('lockoutwindow', 60*20);
|
|
set_config('lockoutduration', 60*30);
|
|
|
|
$user = $this->getDataGenerator()->create_user();
|
|
|
|
// Test lockout is disabled when threshold not set.
|
|
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
|
|
// Test lockout threshold works.
|
|
|
|
set_config('lockoutthreshold', 3);
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
$sink = $this->redirectEmails();
|
|
login_attempt_failed($user);
|
|
$this->assertCount(1, $sink->get_messages());
|
|
$sink->close();
|
|
$this->assertTrue(login_is_lockedout($user));
|
|
|
|
// Test unlock works.
|
|
|
|
login_unlock_account($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
|
|
// Test lockout window works.
|
|
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
set_user_preference('login_failed_last', time()-60*20-10, $user);
|
|
login_attempt_failed($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
|
|
// Test valid login resets window.
|
|
|
|
login_attempt_valid($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
|
|
// Test lock duration works.
|
|
|
|
$sink = $this->redirectEmails();
|
|
login_attempt_failed($user);
|
|
$this->assertCount(1, $sink->get_messages());
|
|
$sink->close();
|
|
$this->assertTrue(login_is_lockedout($user));
|
|
set_user_preference('login_lockout', time()-60*30+10, $user);
|
|
$this->assertTrue(login_is_lockedout($user));
|
|
set_user_preference('login_lockout', time()-60*30-10, $user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
|
|
// Test lockout ignored pref works.
|
|
|
|
set_user_preference('login_lockout_ignored', 1, $user);
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
login_attempt_failed($user);
|
|
$this->assertFalse(login_is_lockedout($user));
|
|
|
|
ini_set('error_log', $oldlog);
|
|
}
|
|
|
|
public function test_authenticate_user_login() {
|
|
global $CFG;
|
|
|
|
$this->resetAfterTest();
|
|
|
|
$oldlog = ini_get('error_log');
|
|
ini_set('error_log', "$CFG->dataroot/testlog.log"); // Prevent standard logging.
|
|
|
|
unset_config('noemailever');
|
|
|
|
set_config('lockoutthreshold', 0);
|
|
set_config('lockoutwindow', 60*20);
|
|
set_config('lockoutduration', 60*30);
|
|
|
|
$_SERVER['HTTP_USER_AGENT'] = 'no browser'; // Hack around missing user agent in CLI scripts.
|
|
|
|
$user1 = $this->getDataGenerator()->create_user(array('username'=>'username1', 'password'=>'password1', 'email'=>'email1@example.com'));
|
|
$user2 = $this->getDataGenerator()->create_user(array('username'=>'username2', 'password'=>'password2', 'email'=>'email2@example.com', 'suspended'=>1));
|
|
$user3 = $this->getDataGenerator()->create_user(array('username'=>'username3', 'password'=>'password3', 'email'=>'email2@example.com', 'auth'=>'nologin'));
|
|
|
|
// Normal login.
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username1', 'password1');
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$this->assertEmpty($events);
|
|
$this->assertInstanceOf('stdClass', $result);
|
|
$this->assertEquals($user1->id, $result->id);
|
|
|
|
// Normal login with reason.
|
|
$reason = null;
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username1', 'password1', false, $reason);
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$this->assertEmpty($events);
|
|
$this->assertInstanceOf('stdClass', $result);
|
|
$this->assertEquals(AUTH_LOGIN_OK, $reason);
|
|
|
|
// Test login via email
|
|
$reason = null;
|
|
$this->assertEmpty($CFG->authloginviaemail);
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('email1@example.com', 'password1', false, $reason);
|
|
$sink->close();
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_NOUSER, $reason);
|
|
|
|
set_config('authloginviaemail', 1);
|
|
$this->assertNotEmpty($CFG->authloginviaemail);
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('email1@example.com', 'password1');
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$this->assertEmpty($events);
|
|
$this->assertInstanceOf('stdClass', $result);
|
|
$this->assertEquals($user1->id, $result->id);
|
|
|
|
$reason = null;
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('email2@example.com', 'password2', false, $reason);
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_NOUSER, $reason);
|
|
set_config('authloginviaemail', 0);
|
|
|
|
$reason = null;
|
|
// Capture failed login event.
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username1', 'nopass', false, $reason);
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$event = array_pop($events);
|
|
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_FAILED, $reason);
|
|
// Test Event.
|
|
$this->assertInstanceOf('\core\event\user_login_failed', $event);
|
|
$expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username1');
|
|
$this->assertEventLegacyLogData($expectedlogdata, $event);
|
|
$eventdata = $event->get_data();
|
|
$this->assertSame($eventdata['other']['username'], 'username1');
|
|
$this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_FAILED);
|
|
$this->assertEventContextNotUsed($event);
|
|
|
|
// Capture failed login token.
|
|
unset($CFG->alternateloginurl);
|
|
unset($CFG->disablelogintoken);
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username1', 'password1', false, $reason, 'invalidtoken');
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$event = array_pop($events);
|
|
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_FAILED, $reason);
|
|
// Test Event.
|
|
$this->assertInstanceOf('\core\event\user_login_failed', $event);
|
|
$expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username1');
|
|
$this->assertEventLegacyLogData($expectedlogdata, $event);
|
|
$eventdata = $event->get_data();
|
|
$this->assertSame($eventdata['other']['username'], 'username1');
|
|
$this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_FAILED);
|
|
$this->assertEventContextNotUsed($event);
|
|
|
|
// Login should work with invalid token if CFG login token settings override it.
|
|
$CFG->alternateloginurl = 'http://localhost/';
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username1', 'password1', false, $reason, 'invalidtoken');
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$this->assertEmpty($events);
|
|
$this->assertInstanceOf('stdClass', $result);
|
|
$this->assertEquals(AUTH_LOGIN_OK, $reason);
|
|
|
|
unset($CFG->alternateloginurl);
|
|
$CFG->disablelogintoken = true;
|
|
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username1', 'password1', false, $reason, 'invalidtoken');
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$this->assertEmpty($events);
|
|
$this->assertInstanceOf('stdClass', $result);
|
|
$this->assertEquals(AUTH_LOGIN_OK, $reason);
|
|
|
|
unset($CFG->disablelogintoken);
|
|
// Normal login with valid token.
|
|
$reason = null;
|
|
$token = \core\session\manager::get_login_token();
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username1', 'password1', false, $reason, $token);
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$this->assertEmpty($events);
|
|
$this->assertInstanceOf('stdClass', $result);
|
|
$this->assertEquals(AUTH_LOGIN_OK, $reason);
|
|
|
|
$reason = null;
|
|
// Capture failed login event.
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username2', 'password2', false, $reason);
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$event = array_pop($events);
|
|
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_SUSPENDED, $reason);
|
|
// Test Event.
|
|
$this->assertInstanceOf('\core\event\user_login_failed', $event);
|
|
$expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username2');
|
|
$this->assertEventLegacyLogData($expectedlogdata, $event);
|
|
$eventdata = $event->get_data();
|
|
$this->assertSame($eventdata['other']['username'], 'username2');
|
|
$this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_SUSPENDED);
|
|
$this->assertEventContextNotUsed($event);
|
|
|
|
$reason = null;
|
|
// Capture failed login event.
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username3', 'password3', false, $reason);
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$event = array_pop($events);
|
|
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_SUSPENDED, $reason);
|
|
// Test Event.
|
|
$this->assertInstanceOf('\core\event\user_login_failed', $event);
|
|
$expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username3');
|
|
$this->assertEventLegacyLogData($expectedlogdata, $event);
|
|
$eventdata = $event->get_data();
|
|
$this->assertSame($eventdata['other']['username'], 'username3');
|
|
$this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_SUSPENDED);
|
|
$this->assertEventContextNotUsed($event);
|
|
|
|
$reason = null;
|
|
// Capture failed login event.
|
|
$sink = $this->redirectEvents();
|
|
$result = authenticate_user_login('username4', 'password3', false, $reason);
|
|
$events = $sink->get_events();
|
|
$sink->close();
|
|
$event = array_pop($events);
|
|
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_NOUSER, $reason);
|
|
// Test Event.
|
|
$this->assertInstanceOf('\core\event\user_login_failed', $event);
|
|
$expectedlogdata = array(SITEID, 'login', 'error', 'index.php', 'username4');
|
|
$this->assertEventLegacyLogData($expectedlogdata, $event);
|
|
$eventdata = $event->get_data();
|
|
$this->assertSame($eventdata['other']['username'], 'username4');
|
|
$this->assertSame($eventdata['other']['reason'], AUTH_LOGIN_NOUSER);
|
|
$this->assertEventContextNotUsed($event);
|
|
|
|
set_config('lockoutthreshold', 3);
|
|
|
|
$reason = null;
|
|
$result = authenticate_user_login('username1', 'nopass', false, $reason);
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_FAILED, $reason);
|
|
$result = authenticate_user_login('username1', 'nopass', false, $reason);
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_FAILED, $reason);
|
|
$sink = $this->redirectEmails();
|
|
$result = authenticate_user_login('username1', 'nopass', false, $reason);
|
|
$this->assertCount(1, $sink->get_messages());
|
|
$sink->close();
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_FAILED, $reason);
|
|
|
|
$result = authenticate_user_login('username1', 'password1', false, $reason);
|
|
$this->assertFalse($result);
|
|
$this->assertEquals(AUTH_LOGIN_LOCKOUT, $reason);
|
|
|
|
$result = authenticate_user_login('username1', 'password1', true, $reason);
|
|
$this->assertInstanceOf('stdClass', $result);
|
|
$this->assertEquals(AUTH_LOGIN_OK, $reason);
|
|
|
|
ini_set('error_log', $oldlog);
|
|
}
|
|
|
|
public function test_user_loggedin_event_exceptions() {
|
|
try {
|
|
$event = \core\event\user_loggedin::create(array('objectid' => 1));
|
|
$this->fail('\core\event\user_loggedin requires other[\'username\']');
|
|
} catch(Exception $e) {
|
|
$this->assertInstanceOf('coding_exception', $e);
|
|
}
|
|
}
|
|
}
|
|
|