mirror of
https://github.com/overleaf/overleaf.git
synced 2024-11-29 22:31:27 -05:00
0596e8d25c
[web] remove legacy registration aka the public-registration module GitOrigin-RevId: 5cbb7ecbc7da5cd0617bd1abd1f5c6eef4c05b3f
413 lines
12 KiB
JavaScript
413 lines
12 KiB
JavaScript
const { expect } = require('chai')
|
|
const async = require('async')
|
|
const metrics = require('./helpers/metrics')
|
|
const User = require('./helpers/User')
|
|
const UserPromises = require('./helpers/User').promises
|
|
const redis = require('./helpers/redis')
|
|
const Features = require('../../../app/src/infrastructure/Features')
|
|
|
|
// Expectations
|
|
const expectProjectAccess = function (user, projectId, callback) {
|
|
// should have access to project
|
|
user.openProject(projectId, err => {
|
|
expect(err).to.be.oneOf([null, undefined])
|
|
return callback()
|
|
})
|
|
}
|
|
|
|
const expectNoProjectAccess = function (user, projectId, callback) {
|
|
// should not have access to project page
|
|
user.openProject(projectId, err => {
|
|
expect(err).to.be.instanceof(Error)
|
|
return callback()
|
|
})
|
|
}
|
|
|
|
// Actions
|
|
const tryLoginThroughRegistrationForm = function (
|
|
user,
|
|
email,
|
|
password,
|
|
callback
|
|
) {
|
|
user.getCsrfToken(err => {
|
|
if (err != null) {
|
|
return callback(err)
|
|
}
|
|
user.request.post(
|
|
{
|
|
url: '/register',
|
|
json: {
|
|
email,
|
|
password,
|
|
},
|
|
},
|
|
callback
|
|
)
|
|
})
|
|
}
|
|
|
|
describe('Registration', function () {
|
|
describe('LoginRateLimit', function () {
|
|
let userA
|
|
beforeEach(function () {
|
|
userA = new UserPromises()
|
|
})
|
|
function loginRateLimited(line) {
|
|
return line.includes('rate_limit_hit') && line.includes('login')
|
|
}
|
|
async function getLoginRateLimitHitMetricValue() {
|
|
return await metrics.promises.getMetric(loginRateLimited)
|
|
}
|
|
let beforeCount
|
|
beforeEach('get baseline metric value', async function () {
|
|
beforeCount = await getLoginRateLimitHitMetricValue()
|
|
})
|
|
beforeEach('setup csrf token', async function () {
|
|
await userA.getCsrfToken()
|
|
})
|
|
|
|
describe('pushing an account just below the rate limit', function () {
|
|
async function doLoginAttempts(user, n, pushInto) {
|
|
while (n--) {
|
|
const { body } = await user.doRequest('POST', {
|
|
url: '/login',
|
|
json: {
|
|
email: user.email,
|
|
password: 'invalid-password',
|
|
'g-recaptcha-response': 'valid',
|
|
},
|
|
})
|
|
const message = body && body.message && body.message.key
|
|
pushInto.push(message)
|
|
}
|
|
}
|
|
|
|
let results = []
|
|
beforeEach('do 9 login attempts', async function () {
|
|
results = []
|
|
await doLoginAttempts(userA, 9, results)
|
|
})
|
|
|
|
it('should not record any rate limited requests', async function () {
|
|
const afterCount = await getLoginRateLimitHitMetricValue()
|
|
expect(afterCount).to.equal(beforeCount)
|
|
})
|
|
|
|
it('should produce the correct responses so far', function () {
|
|
expect(results.length).to.equal(9)
|
|
expect(results).to.deep.equal(
|
|
Array(9).fill('invalid-password-retry-or-reset')
|
|
)
|
|
})
|
|
|
|
describe('pushing the account past the limit', function () {
|
|
beforeEach('do 6 login attempts', async function () {
|
|
await doLoginAttempts(userA, 6, results)
|
|
})
|
|
|
|
it('should record 5 rate limited requests', async function () {
|
|
const afterCount = await getLoginRateLimitHitMetricValue()
|
|
expect(afterCount).to.equal(beforeCount + 5)
|
|
})
|
|
|
|
it('should produce the correct responses', function () {
|
|
expect(results.length).to.equal(15)
|
|
expect(results).to.deep.equal(
|
|
Array(10)
|
|
.fill('invalid-password-retry-or-reset')
|
|
.concat(Array(5).fill('to-many-login-requests-2-mins'))
|
|
)
|
|
})
|
|
|
|
describe('logging in with another user', function () {
|
|
let userB
|
|
beforeEach(function () {
|
|
userB = new UserPromises()
|
|
})
|
|
|
|
beforeEach('update baseline metric value', async function () {
|
|
beforeCount = await getLoginRateLimitHitMetricValue()
|
|
})
|
|
beforeEach('setup csrf token', async function () {
|
|
await userB.getCsrfToken()
|
|
})
|
|
|
|
let messages = []
|
|
beforeEach('do bad login', async function () {
|
|
messages = []
|
|
await doLoginAttempts(userB, 1, messages)
|
|
})
|
|
|
|
it('should not rate limit their request', function () {
|
|
expect(messages).to.deep.equal(['invalid-password-retry-or-reset'])
|
|
})
|
|
|
|
it('should not record any further rate limited requests', async function () {
|
|
const afterCount = await getLoginRateLimitHitMetricValue()
|
|
expect(afterCount).to.equal(beforeCount)
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('performing a valid login for clearing the limit', function () {
|
|
beforeEach('do login', async function () {
|
|
await userA.login()
|
|
})
|
|
|
|
it('should log the user in', async function () {
|
|
const { response } = await userA.doRequest('GET', '/project')
|
|
expect(response.statusCode).to.equal(200)
|
|
})
|
|
|
|
it('should not record any rate limited requests', async function () {
|
|
const afterCount = await getLoginRateLimitHitMetricValue()
|
|
expect(afterCount).to.equal(beforeCount)
|
|
})
|
|
|
|
describe('logging out and performing more invalid login requests', function () {
|
|
beforeEach('logout', async function () {
|
|
await userA.logout()
|
|
})
|
|
beforeEach('fetch new csrf token', async function () {
|
|
await userA.getCsrfToken()
|
|
})
|
|
|
|
let results = []
|
|
beforeEach('do 9 login attempts', async function () {
|
|
results = []
|
|
await doLoginAttempts(userA, 9, results)
|
|
})
|
|
|
|
it('should not record any rate limited requests yet', async function () {
|
|
const afterCount = await getLoginRateLimitHitMetricValue()
|
|
expect(afterCount).to.equal(beforeCount)
|
|
})
|
|
|
|
it('should not emit any rate limited responses yet', function () {
|
|
expect(results.length).to.equal(9)
|
|
expect(results).to.deep.equal(
|
|
Array(9).fill('invalid-password-retry-or-reset')
|
|
)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('CSRF protection', function () {
|
|
before(function () {
|
|
if (!Features.hasFeature('registration')) {
|
|
this.skip()
|
|
}
|
|
})
|
|
|
|
beforeEach(function () {
|
|
this.user = new User()
|
|
this.email = `test+${Math.random()}@example.com`
|
|
this.password = 'password11'
|
|
})
|
|
|
|
afterEach(function (done) {
|
|
this.user.fullDeleteUser(this.email, done)
|
|
})
|
|
|
|
it('should register with the csrf token', function (done) {
|
|
this.user.request.get('/login', (err, res, body) => {
|
|
expect(err).to.not.exist
|
|
this.user.getCsrfToken(error => {
|
|
expect(error).to.not.exist
|
|
this.user.request.post(
|
|
{
|
|
url: '/register',
|
|
json: {
|
|
email: this.email,
|
|
password: this.password,
|
|
},
|
|
headers: {
|
|
'x-csrf-token': this.user.csrfToken,
|
|
},
|
|
},
|
|
(error, response, body) => {
|
|
expect(error).to.not.exist
|
|
expect(response.statusCode).to.equal(200)
|
|
return done()
|
|
}
|
|
)
|
|
})
|
|
})
|
|
})
|
|
|
|
it('should fail with no csrf token', function (done) {
|
|
this.user.request.get('/login', (err, res, body) => {
|
|
expect(err).to.not.exist
|
|
this.user.getCsrfToken(error => {
|
|
expect(error).to.not.exist
|
|
this.user.request.post(
|
|
{
|
|
url: '/register',
|
|
json: {
|
|
email: this.email,
|
|
password: this.password,
|
|
},
|
|
headers: {
|
|
'x-csrf-token': '',
|
|
},
|
|
},
|
|
(error, response, body) => {
|
|
expect(error).to.not.exist
|
|
expect(response.statusCode).to.equal(403)
|
|
return done()
|
|
}
|
|
)
|
|
})
|
|
})
|
|
})
|
|
|
|
it('should fail with a stale csrf token', function (done) {
|
|
this.user.request.get('/login', (err, res, body) => {
|
|
expect(err).to.not.exist
|
|
this.user.getCsrfToken(error => {
|
|
expect(error).to.not.exist
|
|
const oldCsrfToken = this.user.csrfToken
|
|
this.user.logout(err => {
|
|
expect(err).to.not.exist
|
|
this.user.request.post(
|
|
{
|
|
url: '/register',
|
|
json: {
|
|
email: this.email,
|
|
password: this.password,
|
|
},
|
|
headers: {
|
|
'x-csrf-token': oldCsrfToken,
|
|
},
|
|
},
|
|
(error, response, body) => {
|
|
expect(error).to.not.exist
|
|
expect(response.statusCode).to.equal(403)
|
|
return done()
|
|
}
|
|
)
|
|
})
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('Register', function () {
|
|
before(function () {
|
|
if (!Features.hasFeature('registration')) {
|
|
this.skip()
|
|
}
|
|
})
|
|
|
|
beforeEach(function () {
|
|
this.user = new User()
|
|
})
|
|
|
|
it('Set emails attribute', function (done) {
|
|
this.user.register((error, user) => {
|
|
expect(error).to.not.exist
|
|
user.email.should.equal(this.user.email)
|
|
user.emails.should.exist
|
|
user.emails.should.be.a('array')
|
|
user.emails.length.should.equal(1)
|
|
user.emails[0].email.should.equal(this.user.email)
|
|
return done()
|
|
})
|
|
})
|
|
})
|
|
|
|
describe('LoginViaRegistration', function () {
|
|
beforeEach(function (done) {
|
|
this.timeout(60000)
|
|
this.user1 = new User()
|
|
this.user2 = new User()
|
|
async.series(
|
|
[
|
|
cb => this.user1.login(cb),
|
|
cb => this.user1.logout(cb),
|
|
cb => redis.clearUserSessions(this.user1, cb),
|
|
cb => this.user2.login(cb),
|
|
cb => this.user2.logout(cb),
|
|
cb => redis.clearUserSessions(this.user2, cb),
|
|
],
|
|
done
|
|
)
|
|
this.project_id = null
|
|
})
|
|
|
|
describe('[Security] Trying to register/login as another user', function () {
|
|
before(function () {
|
|
if (!Features.hasFeature('registration')) {
|
|
this.skip()
|
|
}
|
|
})
|
|
|
|
it('should not allow sign in with secondary email', function (done) {
|
|
const secondaryEmail = 'acceptance-test-secondary@example.com'
|
|
this.user1.addEmail(secondaryEmail, err => {
|
|
expect(err).to.not.exist
|
|
this.user1.loginWith(secondaryEmail, err => {
|
|
expect(err).to.match(/login failed: status=401/)
|
|
expect(err.info.body).to.deep.equal({
|
|
message: {
|
|
type: 'error',
|
|
key: 'invalid-password-retry-or-reset',
|
|
},
|
|
})
|
|
this.user1.isLoggedIn((err, isLoggedIn) => {
|
|
expect(err).to.not.exist
|
|
expect(isLoggedIn).to.equal(false)
|
|
return done()
|
|
})
|
|
})
|
|
})
|
|
})
|
|
|
|
it('should have user1 login and create a project, which user2 cannot access', function (done) {
|
|
let projectId
|
|
async.series(
|
|
[
|
|
// user1 logs in and creates a project which only they can access
|
|
cb => {
|
|
this.user1.login(err => {
|
|
expect(err).not.to.exist
|
|
cb()
|
|
})
|
|
},
|
|
cb => {
|
|
this.user1.createProject('Private Project', (err, id) => {
|
|
expect(err).not.to.exist
|
|
projectId = id
|
|
cb()
|
|
})
|
|
},
|
|
cb => expectProjectAccess(this.user1, projectId, cb),
|
|
cb => expectNoProjectAccess(this.user2, projectId, cb),
|
|
// should prevent user2 from login/register with user1 email address
|
|
cb => {
|
|
tryLoginThroughRegistrationForm(
|
|
this.user2,
|
|
this.user1.email,
|
|
'totally_not_the_right_password',
|
|
(err, response, body) => {
|
|
expect(err).to.not.exist
|
|
expect(body.redir != null).to.equal(false)
|
|
expect(body.message != null).to.equal(true)
|
|
expect(body.message).to.have.all.keys('type', 'text')
|
|
expect(body.message.type).to.equal('error')
|
|
cb()
|
|
}
|
|
)
|
|
},
|
|
// check user still can't access the project
|
|
cb => expectNoProjectAccess(this.user2, projectId, done),
|
|
],
|
|
done
|
|
)
|
|
})
|
|
})
|
|
})
|
|
})
|