Added an service for generating Backup codes and added some tests.

This commit is contained in:
Jan Böhmer 2019-12-27 15:20:06 +01:00
parent 452fc3e78a
commit fba5f9794f
16 changed files with 245 additions and 7 deletions

View file

@ -120,6 +120,11 @@ services:
arguments:
$mimeTypes: '@mime_types'
App\Services\TFA\BackupCodeGenerator:
arguments:
$code_length: 8
$code_count: 10
App\Services\TranslationExtractor\PermissionExtractor:
tags:
- { name: 'translation.extractor', alias: 'permissionExtractor'}

View file

@ -191,7 +191,7 @@ class User extends AttachmentContainingDBElement implements UserInterface, HasPe
* @var string[]|null A list of backup codes that can be used, if the user has no access to its Google Authenticator device
* @ORM\Column(type="json")
*/
protected $backupCodes;
protected $backupCodes = [];
/** @var \DateTime The time when the backup codes were generated
* @ORM\Column(type="datetime", nullable=true)
@ -201,7 +201,7 @@ class User extends AttachmentContainingDBElement implements UserInterface, HasPe
/** @var int The version of the trusted device cookie. Used to invalidate all trusted device cookies at once.
* @ORM\Column(type="integer")
*/
protected $trustedDeviceCookieVersion;
protected $trustedDeviceCookieVersion = 0;
/** @var Collection<TwoFactorKeyInterface>
* @ORM\OneToMany(targetEntity="App\Entity\UserSystem\U2FKey", mappedBy="user")
@ -775,15 +775,19 @@ class User extends AttachmentContainingDBElement implements UserInterface, HasPe
public function setBackupCodes(array $codes) : self
{
$this->backupCodes = $codes;
$this->backupCodesGenerationDate = new \DateTime();
if(empty($codes)) {
$this->backupCodesGenerationDate = null;
} else {
$this->backupCodesGenerationDate = new \DateTime();
}
return $this;
}
/**
* Return the date when the backup codes were generated.
* @return \DateTime
* @return \DateTime|null
*/
public function getBackupCodesGenerationDate() : \DateTime
public function getBackupCodesGenerationDate() : ?\DateTime
{
return $this->backupCodesGenerationDate;
}
@ -806,24 +810,39 @@ class User extends AttachmentContainingDBElement implements UserInterface, HasPe
$this->trustedDeviceCookieVersion++;
}
/**
* Check if U2F is enabled
* @return bool
*/
public function isU2FAuthEnabled(): bool
{
return count($this->u2fKeys) > 0;
}
/** @return Collection<TwoFactorKeyInterface> */
/**
* Get all U2F Keys that are associated with this user
* @return Collection<TwoFactorKeyInterface>
*/
public function getU2FKeys(): Collection
{
return $this->u2fKeys;
}
/**
* Add a U2F key to this user.
* @param TwoFactorKeyInterface $key
*/
public function addU2FKey(TwoFactorKeyInterface $key): void
{
$this->u2fKeys->add($key);
}
/**
* Remove a U2F key from this user.
* @param TwoFactorKeyInterface $key
*/
public function removeU2FKey(TwoFactorKeyInterface $key): void
{
$this->u2fKeys->remove($key);
$this->u2fKeys->removeElement($key);
}
}

View file

@ -0,0 +1,60 @@
<?php
namespace App\Services\TFA;
/**
* This class generates random backup codes for two factor authentication
* @package App\Services\TFA
*/
class BackupCodeGenerator
{
protected $code_length;
protected $code_count;
/**
* BackupCodeGenerator constructor.
* @param int $code_length How many characters a single code should have.
* @param int $code_count How many codes are generated for a whole backup set.
*/
public function __construct(int $code_length, int $code_count)
{
if ($code_length > 32) {
throw new \RuntimeException('Backup code can have maximum 32 digits!');
}
if ($code_length < 6) {
throw new \RuntimeException('Code must have at least 6 digits to ensure security!');
}
$this->code_count = $code_count;
$this->code_length = $code_length;
}
/**
* Generates a single backup code.
* It is a random hexadecimal value with the digit count configured in constructor
* @return string The generated backup code (e.g. 1f3870be2)
* @throws \Exception If no entropy source is available.
*/
public function generateSingleCode() : string
{
$bytes = random_bytes(32);
return substr(md5($bytes), 0, $this->code_length);
}
/**
* Returns a full backup code set. The code count can be configured in the constructor
* @return string[] An array containing different backup codes.
* @throws \Exception If no entropy source is available
*/
public function generateCodeSet() : array
{
$array = [];
for($n=0; $n<$this->code_count; $n++) {
$array[] = $this->generateSingleCode();
}
return $array;
}
}

View file

@ -26,6 +26,7 @@ use Symfony\Component\Security\Core\Exception\AccessDeniedException;
/**
* @group slow
* @group DB
*/
abstract class AbstractAdminControllerTest extends WebTestCase
{

View file

@ -25,6 +25,7 @@ use App\Entity\Attachments\AttachmentType;
/**
* @group slow
* @group DB
*/
class AttachmentTypeControllerTest extends AbstractAdminControllerTest
{

View file

@ -25,6 +25,7 @@ use App\Entity\Parts\Category;
/**
* @group slow
* @group DB
*/
class CategoryControllerTest extends AbstractAdminControllerTest
{

View file

@ -25,6 +25,7 @@ use App\Entity\Devices\Device;
/**
* @group slow
* @group DB
*/
class DeviceControllerTest extends AbstractAdminControllerTest
{

View file

@ -25,6 +25,7 @@ use App\Entity\Parts\Footprint;
/**
* @group slow
* @group DB
*/
class FootprintControllerTest extends AbstractAdminControllerTest
{

View file

@ -25,6 +25,7 @@ use App\Entity\Parts\Manufacturer;
/**
* @group slow
* @group DB
*/
class ManufacturerControllerTest extends AbstractAdminControllerTest
{

View file

@ -25,6 +25,7 @@ use App\Entity\Parts\MeasurementUnit;
/**
* @group slow
* @group DB
*/
class MeasurementUnitControllerTest extends AbstractAdminControllerTest
{

View file

@ -25,6 +25,7 @@ use App\Entity\Parts\Storelocation;
/**
* @group slow
* @group DB
*/
class StorelocationControllerTest extends AbstractAdminControllerTest
{

View file

@ -25,6 +25,7 @@ use App\Entity\Parts\Supplier;
/**
* @group slow
* @group DB
*/
class SupplierControllerTest extends AbstractAdminControllerTest
{

View file

@ -27,6 +27,7 @@ use Symfony\Bundle\FrameworkBundle\Test\WebTestCase;
/**
* @group slow
* @group DB
*/
class RedirectControllerTest extends WebTestCase
{

View file

@ -21,6 +21,7 @@
namespace App\Tests\Entity\UserSystem;
use App\Entity\UserSystem\U2FKey;
use App\Entity\UserSystem\User;
use PHPUnit\Framework\TestCase;
@ -36,4 +37,88 @@ class UserTest extends TestCase
$this->assertEquals('John Doe', $user->getFullName(false));
$this->assertEquals('John Doe (username)', $user->getFullName(true));
}
public function googleAuthenticatorEnabledDataProvider() : array
{
return [
[null, false],
['', false],
['SSSk38498', true]
];
}
/**
* @dataProvider googleAuthenticatorEnabledDataProvider
*/
public function testIsGoogleAuthenticatorEnabled(?string $secret, bool $expected)
{
$user = new User();
$user->setGoogleAuthenticatorSecret($secret);
$this->assertSame($expected ,$user->isGoogleAuthenticatorEnabled());
}
public function testSetBackupCodes()
{
$user = new User();
$codes = ["test", "invalid", "test"];
$user->setBackupCodes($codes);
// Backup Codes generation date must be changed!
$this->assertEquals(new \DateTime(), $user->getBackupCodesGenerationDate(), '', 0.1);
$this->assertEquals($codes, $user->getBackupCodes());
//Test what happens if we delete the backup keys
$user->setBackupCodes([]);
$this->assertEmpty($user->getBackupCodes());
$this->assertNull($user->getBackupCodesGenerationDate());
}
public function testIsBackupCode()
{
$user = new User();
$codes = ['aaaa', 'bbbb', 'cccc', 'dddd'];
$user->setBackupCodes($codes);
$this->assertTrue($user->isBackupCode('aaaa'));
$this->assertTrue($user->isBackupCode('cccc'));
$this->assertFalse($user->isBackupCode(''));
$this->assertFalse($user->isBackupCode('zzzz'));
}
public function testInvalidateBackupCode()
{
$user = new User();
$codes = ['aaaa', 'bbbb', 'cccc', 'dddd'];
$user->setBackupCodes($codes);
//Ensure the code is valid
$this->assertTrue($user->isBackupCode('aaaa'));
$this->assertTrue($user->isBackupCode('bbbb'));
//Invalidate code, afterwards the code has to be invalid!
$user->invalidateBackupCode('bbbb');
$this->assertFalse($user->isBackupCode('bbbb'));
$this->assertTrue($user->isBackupCode('aaaa'));
//No exception must happen, when we try to invalidate an not existing backup key!
$user->invalidateBackupCode('zzzz');
}
public function testInvalidateTrustedDeviceTokens()
{
$user = new User();
$old_value = $user->getTrustedTokenVersion();
//To invalidate the token, the new value must be bigger than the old value
$user->invalidateTrustedDeviceTokens();
$this->assertGreaterThan($old_value, $user->getTrustedTokenVersion());
}
public function testIsU2fEnabled()
{
$user = new User();
$user->addU2FKey(new U2FKey());
$this->assertTrue($user->isU2FAuthEnabled());
$user->getU2FKeys()->clear();
$this->assertFalse($user->isU2FAuthEnabled());
}
}

View file

@ -28,6 +28,9 @@ use App\Services\ElementTypeNameGenerator;
use App\Services\EntityImporter;
use Symfony\Bundle\FrameworkBundle\Test\WebTestCase;
/**
* @group DB
*/
class EntityImporterTest extends WebTestCase
{
/**

View file

@ -0,0 +1,56 @@
<?php
namespace App\Tests\Services\TFA;
use App\Services\TFA\BackupCodeGenerator;
use PHPUnit\Framework\TestCase;
class BackupCodeGeneratorTest extends TestCase
{
/**
* Test if an exception is thrown if you are using a too high code length
*/
public function testLengthUpperLimit()
{
$this->expectException(\RuntimeException::class);
new BackupCodeGenerator(33, 10);
}
/**
* Test if an exception is thrown if you are using a too high code length
*/
public function testLengthLowerLimit()
{
$this->expectException(\RuntimeException::class);
new BackupCodeGenerator(4, 10);
}
public function codeLengthDataProvider()
{
return [[6], [8], [10], [16]];
}
/**
* @dataProvider codeLengthDataProvider
*/
public function testGenerateSingleCode(int $code_length)
{
$generator = new BackupCodeGenerator($code_length, 10);
$this->assertRegExp("/^([a-f0-9]){{$code_length}}\$/", $generator->generateSingleCode());
}
public function codeCountDataProvider()
{
return [[2], [8], [10]];
}
/**
* @dataProvider codeCountDataProvider
*/
public function testGenerateCodeSet(int $code_count)
{
$generator = new BackupCodeGenerator(8, $code_count);
$this->assertCount($code_count, $generator->generateCodeSet());
}
}