oca-ocb-security/odoo-bringout-oca-ocb-auth_totp/auth_totp/static/tests/totp_flow.js
Ernad Husremovic c0efcc53f5 19.0 vanilla
2026-03-09 09:32:28 +01:00

424 lines
12 KiB
JavaScript

import { WORKER_STATE } from "@bus/workers/websocket_worker";
import { rpc } from "@web/core/network/rpc";
import { registry } from "@web/core/registry";
import { stepUtils } from "@web_tour/tour_utils";
import { whenReady } from "@odoo/owl";
function openRoot() {
return [{
content: "return to client root to avoid race condition",
trigger: 'body',
run() {
document.querySelector("body").classList.add("wait");
window.location = '/odoo';
},
expectUnloadPage: true,
}, {
content: "wait for client reload",
trigger: 'body:not(.wait)',
}];
}
function openUserPreferencesAtSecurityTab() {
return [{
content: 'Open user account menu',
trigger: '.o_user_menu .dropdown-toggle',
run: 'click',
}, {
content: "Open My Preferences",
trigger: '[data-menu=preferences]',
run: 'click',
}, {
content: "wait for security tab",
trigger: 'a[role=tab]:contains("Security")',
}, {
content: "Switch to security tab",
trigger: 'a[role=tab]:contains("Security")',
run: 'click',
}];
}
/**
* Checks that the TOTP button is in the specified state (true = enabled =
* can disable, false = disabled = can enable), then closes the preferences dialog
* if it's one (= hr not installed).
*
* If no totp state is provided, just checks that the toggle exists.
*/
function closePreferencesDialog({content, totp_state}) {
let trigger;
switch (totp_state) {
case true: trigger = 'button[name=action_totp_disable]'; break;
case false: trigger = 'button[name=action_totp_enable_wizard]'; break;
case undefined: trigger = 'div:contains("Two-factor Authentication") + button'; break;
default: throw new Error(`Invalid totp state ${totp_state}`)
}
return [{
content,
trigger: 'a[role=tab]:contains("Security").active',
},
{
trigger,
async run(helpers) {
const modal = document.querySelector(".o_dialog");
if (modal) {
modal.querySelector("button[name=preference_cancel]").click();
}
}
},
{
trigger: 'body:not(:has(.o_dialog))',
}];
}
registry.category("web_tour.tours").add('totp_tour_setup', {
url: '/odoo',
steps: () => [
...openUserPreferencesAtSecurityTab(),
{
content: "Open totp wizard",
trigger: 'a[role=tab]:contains("Security").active',
},
{
trigger: "button[name=action_totp_enable_wizard]",
run: "click",
},
{
trigger: ".modal div:contains(Enter your current password)",
},
{
content: "Check that we have to enter enhanced security mode and input password",
trigger: '[name=password] input',
run: 'edit test_user',
}, {
content: "Confirm",
trigger: "button:contains(Confirm Password)",
run: "click",
}, {
content: "Check the wizard has opened",
trigger: '.modal:contains("Two-Factor Authentication Activation")',
}, {
content: "Get secret from collapsed div",
trigger: `.modal a:contains("Cannot scan it?")`,
async run(helpers) {
const secret = this.anchor
.closest("div")
.querySelector("[name=secret] span:first-child");
const copyBtn = secret.querySelector("button");
if (copyBtn) {
copyBtn.remove();
}
const token = await rpc('/totphook', {
secret: secret.textContent,
offset: 0,
});
await helpers.edit(token, '[name=code] input');
}
},
{
trigger: ".modal button.btn-primary:contains(Enable Two-Factor Authentication)",
run: "click",
},
{
trigger: ".o_notification_content:contains(2-Factor authentication is now enabled)",
},
...openRoot(),
...openUserPreferencesAtSecurityTab(),
...closePreferencesDialog({
content: "Check that the button has changed",
totp_state: true,
}),
]});
registry.category("web_tour.tours").add('totp_login_enabled', {
url: '/',
steps: () => [{
content: "check that we're on the login page or go to it",
isActive: ["body:not(:has(input#login))"],
trigger: "a:contains(Sign in)",
run: "click",
expectUnloadPage: true,
}, {
content: "input login",
trigger: 'input#login',
run: "edit test_user",
}, {
content: 'input password',
trigger: 'input#password',
run: "edit test_user",
}, {
content: "click da button",
trigger: 'button:contains("Log in")',
run: "click",
expectUnloadPage: true,
}, {
content: "expect totp screen",
trigger: 'label:contains(Authentication Code)',
run: "click",
}, {
content: "input incorrect code",
trigger: 'input[name=totp_token]',
async run(helpers) {
// set the offset in the past, so the token will be always wrong
await rpc("/totphook", { offset: -2 });
helpers.edit("123456");
}
}, {
trigger: `button:contains("Log in")`,
run: "click",
expectUnloadPage: true,
}, {
content: "using an incorrect token should fail",
trigger: "p.alert.alert-danger:contains(Verification failed, please double-check the 6-digit code)",
}, {
content: "reuse same code",
trigger: 'input[name=totp_token]',
async run(helpers) {
// send the same token as the one last one from the setup tour
const token = await rpc("/totphook", { offset: 0 });
helpers.edit(token);
}
}, {
trigger: `button:contains("Log in")`,
run: "click",
expectUnloadPage: true,
}, {
content: "reusing the same token should fail",
trigger: "p.alert.alert-danger:contains(Verification failed, please use the latest 6-digit code)",
}, {
content: "input code",
trigger: 'input[name=totp_token]',
async run(helpers) {
const token = await rpc('/totphook', { offset: 1 });
helpers.edit(token);
}
},
{
trigger: `button:contains("Log in")`,
run: "click",
expectUnloadPage: true,
}, {
content: "check we're logged in",
trigger: ".o_user_menu .dropdown-toggle",
}]});
registry.category("web_tour.tours").add('totp_login_device', {
url: '/',
steps: () => [{
content: "check that we're on the login page or go to it",
isActive: ["body:not(:has(input#login))"],
trigger: "a:contains(Sign in)",
run: "click",
expectUnloadPage: true,
}, {
content: "input login",
trigger: 'input#login',
run: "edit test_user",
}, {
content: 'input password',
trigger: 'input#password',
run: "edit test_user",
}, {
content: "click da button",
trigger: 'button:contains("Log in")',
run: "click",
expectUnloadPage: true,
}, {
content: "expect totp screen",
trigger: 'label:contains(Authentication Code)',
run: "click",
}, {
content: "check remember device box",
trigger: 'label[for=switch-remember]',
run: "click",
}, {
content: "input code",
trigger: 'input[name=totp_token]',
async run(helpers) {
const token = await rpc('/totphook', { offset: 2 });
helpers.edit(token);
}
},
{
trigger: "button:contains(Log in)",
run: "click",
expectUnloadPage: true,
},
{
trigger: ".o_web_client .o_navbar",
async run() {
await whenReady();
}
},
{
trigger: ".o_web_client .o_navbar",
async run() {
await new Promise((resolve) => {
const bus = odoo.__WOWL_DEBUG__.root.env.services.bus_service;
bus.addEventListener("BUS:CONNECT", resolve, { once: true });
if (bus.workerState === WORKER_STATE.CONNECTED) {
resolve();
}
});
},
},
{
content: "check we're logged in",
trigger: ".o_user_menu .dropdown-toggle",
run: 'click',
}, {
content: "click the Log out button",
trigger: '.dropdown-item[data-menu=logout]',
run: "click",
expectUnloadPage: true,
}, {
content: "check that we're back on the login page or go to it",
trigger: 'input#login, a:contains(Log in)',
run: "edit Test",
}, {
content: "input login again",
trigger: 'input#login',
run: "edit test_user",
}, {
content: 'input password again',
trigger: 'input#password',
run: "edit test_user",
}, {
content: "click da button again",
trigger: 'button:contains("Log in")',
run: "click",
expectUnloadPage: true,
}, {
content: "check we're logged in without 2FA",
trigger: ".o_user_menu .dropdown-toggle",
},
// now go and disable two-factor authentication would be annoying to do in a separate tour
// because we'd need to login & totp again as HttpCase.authenticate can't
// succeed w/ totp enabled
...openUserPreferencesAtSecurityTab(),
{
content: "Open totp wizard",
trigger: 'a[role=tab]:contains("Security").active',
},
{
trigger: "button[name=action_totp_disable]",
run: "click",
},
{
trigger: ".modal div:contains(Enter your current password)",
},
{
content: "Check that we have to enter enhanced security mode and input password",
trigger: '.modal [name=password] input',
run: "edit test_user",
}, {
content: "Confirm",
trigger: ".modal button:contains(Confirm Password)",
run: "click",
},
{
trigger:".o_notification_content:contains(Two-factor authentication disabled)",
},
...openRoot(),
...openUserPreferencesAtSecurityTab(),
...closePreferencesDialog({
content: "Check that the button has changed",
totp_state: false
}),
]});
registry.category("web_tour.tours").add('totp_login_disabled', {
url: '/',
steps: () => [{
content: "check that we're on the login page or go to it",
isActive: ["body:not(:has(input#login))"],
trigger: "a:contains(Sign in)",
run: "click",
expectUnloadPage: true,
}, {
content: "input login",
trigger: 'input#login',
run: "edit test_user",
}, {
content: 'input password',
trigger: 'input#password',
run: "edit test_user",
}, {
content: "click da button",
trigger: 'button:contains("Log in")',
run: "click",
expectUnloadPage: true,
},
// normally we'd end the tour here as it's all we care about but there are a
// bunch of ongoing queries from the loading of the web client which cause
// issues, so go and open the preferences screen to make sure
// everything settles down
...openUserPreferencesAtSecurityTab(),
// close the dialog if that makes sense
...closePreferencesDialog({})
]});
registry.category("web_tour.tours").add('totp_admin_disables', {
url: '/odoo',
steps: () => [stepUtils.showAppsMenuItem(), {
content: 'Go to settings',
trigger: '[data-menu-xmlid="base.menu_administration"]',
run: "click",
}, {
content: 'Wait for page',
trigger: '.o_menu_brand:contains("Settings")',
}, {
content: "Open Users menu",
trigger: '[data-menu-xmlid="base.menu_users"]',
run: "click",
}, {
content: "Open Users view",
trigger: '[data-menu-xmlid="base.menu_action_res_users"]',
run: "click",
}, {
content: "Find test_user User",
trigger: 'tr:has(td.o_data_cell:contains("test_user")) ' +
'.o_list_record_selector input[type=checkbox]',
run: "click",
}, {
content: "Open Actions menu",
trigger: 'button.dropdown-toggle:contains("Action")',
run: "click",
}, {
content: "Select totp remover",
trigger: 'span.dropdown-item:contains(Disable two-factor authentication)',
run: "click",
},
{
trigger: ".modal div:contains(Enter your current password)",
},
{ // enhanced security yo
content: "Check that we have to enter enhanced security mode & input password",
trigger: '.modal [name=password] input',
run: "edit admin",
}, {
content: "Confirm",
trigger: ".modal button:contains(Confirm Password)",
run: "click",
},
{
content: "Wait for user to be unchecked (~ action done)",
trigger: 'tr:has(td.o_data_cell:contains(test_user)) ' +
'.o_list_record_selector input[type=checkbox]:not(:checked)',
},
{
content: "open the user's form",
trigger: "td.o_data_cell:contains(test_user)",
run: "click",
}, {
content: "wait for Security Tab to appear",
trigger: "a.nav-link:contains(Security)",
},{
content: "go to Security Tab",
trigger: "a.nav-link:contains(Security)",
run: "click",
}, {
content: "check 2FA button: should be disabled",
trigger: 'body:not(:has(button[name=action_totp_enable_wizard]))',
}
]})