mirror of
https://github.com/portainer/portainer.git
synced 2025-07-21 22:39:41 +02:00
* feat(internal-auth): ability to set minimum password length [EE-3175] * pass props to react component * fixes + WIP slider * fix slider updating + add styles * remove nested ternary * fix slider updating + add remind me later button * add length to settings + value & onchange method * finish my account view * fix slider updating * slider styles * update style * move slider in * update size of slider * allow admin to browse to authentication view * use feather icons instead of font awesome * feat(settings): add colors to password rules * clean up tooltip styles * more style changes * styles * fixes + use requiredLength in password field for icon logic * simplify logic * simplify slider logic and remove debug code * use required length for logic to display pwd length warning * fix slider styles * use requiredPasswordLength to determine if password is valid * style tooltip based on theme * reset skips when password is changed * misc cleanup * reset skips when required length is changed * fix formatting * fix issues * implement some suggestions * simplify logic * update broken test * pick min password length from DB * fix suggestions * set up min password length in the DB * fix test after migration * fix formatting issue * fix bug with icon * refactored migration * fix typo * fixes * fix logic * set skips per user * reset skips for all users on length change Co-authored-by: Chaim Lev-Ari <chiptus@gmail.com> Co-authored-by: Dmitry Salakhov <to@dimasalakhov.com>
57 lines
1.7 KiB
Go
57 lines
1.7 KiB
Go
package users
|
|
|
|
import (
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
"time"
|
|
|
|
portainer "github.com/portainer/portainer/api"
|
|
"github.com/portainer/portainer/api/apikey"
|
|
"github.com/portainer/portainer/api/datastore"
|
|
"github.com/portainer/portainer/api/http/security"
|
|
"github.com/portainer/portainer/api/jwt"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
func Test_deleteUserRemovesAccessTokens(t *testing.T) {
|
|
is := assert.New(t)
|
|
|
|
_, store, teardown := datastore.MustNewTestStore(true, true)
|
|
defer teardown()
|
|
|
|
// create standard user
|
|
user := &portainer.User{ID: 2, Username: "standard", Role: portainer.StandardUserRole}
|
|
err := store.User().Create(user)
|
|
is.NoError(err, "error creating user")
|
|
|
|
// setup services
|
|
jwtService, err := jwt.NewService("1h", store)
|
|
is.NoError(err, "Error initiating jwt service")
|
|
apiKeyService := apikey.NewAPIKeyService(store.APIKeyRepository(), store.User())
|
|
requestBouncer := security.NewRequestBouncer(store, jwtService, apiKeyService)
|
|
rateLimiter := security.NewRateLimiter(10, 1*time.Second, 1*time.Hour)
|
|
passwordChecker := security.NewPasswordStrengthChecker(store.SettingsService)
|
|
|
|
h := NewHandler(requestBouncer, rateLimiter, apiKeyService, nil, passwordChecker)
|
|
h.DataStore = store
|
|
|
|
t.Run("standard user deletion removes all associated access tokens", func(t *testing.T) {
|
|
_, _, err := apiKeyService.GenerateApiKey(*user, "test-user-token")
|
|
is.NoError(err)
|
|
|
|
keys, err := apiKeyService.GetAPIKeys(user.ID)
|
|
is.NoError(err)
|
|
is.Len(keys, 1)
|
|
|
|
rr := httptest.NewRecorder()
|
|
|
|
h.deleteUser(rr, user)
|
|
|
|
is.Equal(http.StatusNoContent, rr.Code)
|
|
|
|
keys, err = apiKeyService.GetAPIKeys(user.ID)
|
|
is.NoError(err)
|
|
is.Equal(0, len(keys))
|
|
})
|
|
}
|