2015-02-21 15:58:13 +01:00
|
|
|
/**
|
|
|
|
|
* Copyright (c) 2014, Sebastian Sdorra
|
|
|
|
|
* All rights reserved.
|
|
|
|
|
*
|
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
|
*
|
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
|
* 3. Neither the name of SCM-Manager; nor the names of its
|
|
|
|
|
* contributors may be used to endorse or promote products derived from this
|
|
|
|
|
* software without specific prior written permission.
|
|
|
|
|
*
|
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
|
|
|
|
|
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
|
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
|
|
|
|
|
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
*
|
|
|
|
|
* http://bitbucket.org/sdorra/scm-manager
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
package sonia.scm.security;
|
|
|
|
|
|
|
|
|
|
//~--- non-JDK imports --------------------------------------------------------
|
|
|
|
|
|
2017-01-16 15:04:44 +01:00
|
|
|
import com.google.common.collect.ImmutableList;
|
2017-01-12 22:04:19 +01:00
|
|
|
import com.google.common.collect.Sets;
|
2015-02-21 15:58:13 +01:00
|
|
|
import io.jsonwebtoken.Claims;
|
|
|
|
|
import io.jsonwebtoken.JwsHeader;
|
|
|
|
|
import io.jsonwebtoken.Jwts;
|
|
|
|
|
import io.jsonwebtoken.SignatureAlgorithm;
|
|
|
|
|
import org.apache.shiro.authc.AuthenticationException;
|
|
|
|
|
import org.apache.shiro.authc.AuthenticationInfo;
|
|
|
|
|
import org.apache.shiro.authc.UsernamePasswordToken;
|
|
|
|
|
import org.apache.shiro.subject.PrincipalCollection;
|
2018-08-08 09:20:08 +02:00
|
|
|
import org.hamcrest.Matchers;
|
2015-02-21 15:58:13 +01:00
|
|
|
import org.junit.Before;
|
2018-08-08 09:20:08 +02:00
|
|
|
import org.junit.Rule;
|
2015-02-21 15:58:13 +01:00
|
|
|
import org.junit.Test;
|
2018-08-08 09:20:08 +02:00
|
|
|
import org.junit.rules.ExpectedException;
|
2015-02-21 15:58:13 +01:00
|
|
|
import org.junit.runner.RunWith;
|
2018-08-08 09:20:08 +02:00
|
|
|
import org.mockito.InjectMocks;
|
2015-02-21 15:58:13 +01:00
|
|
|
import org.mockito.Mock;
|
2018-08-08 09:20:08 +02:00
|
|
|
import org.mockito.Mockito;
|
|
|
|
|
import org.mockito.junit.MockitoJUnitRunner;
|
2015-02-21 15:58:13 +01:00
|
|
|
import sonia.scm.group.GroupDAO;
|
|
|
|
|
import sonia.scm.user.User;
|
|
|
|
|
import sonia.scm.user.UserDAO;
|
|
|
|
|
import sonia.scm.user.UserTestData;
|
|
|
|
|
|
2018-08-08 09:20:08 +02:00
|
|
|
import javax.crypto.spec.SecretKeySpec;
|
2015-02-21 15:58:13 +01:00
|
|
|
import java.util.Date;
|
2017-01-12 22:04:19 +01:00
|
|
|
import java.util.Set;
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2018-08-08 09:20:08 +02:00
|
|
|
import static org.junit.Assert.assertEquals;
|
|
|
|
|
import static org.junit.Assert.assertNotNull;
|
|
|
|
|
import static org.junit.Assert.assertThat;
|
|
|
|
|
import static org.junit.Assert.assertTrue;
|
|
|
|
|
import static org.mockito.Mockito.any;
|
|
|
|
|
import static org.mockito.Mockito.when;
|
2018-11-30 11:26:23 +01:00
|
|
|
import static sonia.scm.security.SecureKeyTestUtil.createSecureKey;
|
2018-08-08 09:20:08 +02:00
|
|
|
|
2015-02-21 15:58:13 +01:00
|
|
|
/**
|
2017-01-13 20:22:49 +01:00
|
|
|
* Unit tests for {@link BearerRealm}.
|
|
|
|
|
*
|
2015-02-21 15:58:13 +01:00
|
|
|
* @author Sebastian Sdorra
|
|
|
|
|
*/
|
2017-01-13 20:22:49 +01:00
|
|
|
@SuppressWarnings("unchecked")
|
2015-02-21 15:58:13 +01:00
|
|
|
@RunWith(MockitoJUnitRunner.class)
|
|
|
|
|
public class BearerRealmTest
|
|
|
|
|
{
|
2017-01-12 22:04:19 +01:00
|
|
|
|
|
|
|
|
@Rule
|
|
|
|
|
public ExpectedException expectedException = ExpectedException.none();
|
2015-02-21 15:58:13 +01:00
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Method description
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
@Test
|
|
|
|
|
public void testDoGetAuthenticationInfo()
|
|
|
|
|
{
|
|
|
|
|
SecureKey key = createSecureKey();
|
|
|
|
|
|
|
|
|
|
User marvin = UserTestData.createMarvin();
|
|
|
|
|
|
|
|
|
|
when(userDAO.get(marvin.getName())).thenReturn(marvin);
|
|
|
|
|
|
|
|
|
|
resolveKey(key);
|
|
|
|
|
|
|
|
|
|
String compact = createCompactToken(marvin.getName(), key);
|
|
|
|
|
|
2017-01-17 15:54:32 +01:00
|
|
|
BearerToken token = BearerToken.valueOf(compact);
|
2015-02-21 15:58:13 +01:00
|
|
|
AuthenticationInfo info = realm.doGetAuthenticationInfo(token);
|
|
|
|
|
|
|
|
|
|
assertNotNull(info);
|
|
|
|
|
|
|
|
|
|
PrincipalCollection principals = info.getPrincipals();
|
|
|
|
|
|
|
|
|
|
assertEquals(marvin.getName(), principals.getPrimaryPrincipal());
|
|
|
|
|
assertEquals(marvin, principals.oneByType(User.class));
|
2017-01-16 15:04:44 +01:00
|
|
|
assertNotNull(principals.oneByType(Scope.class));
|
|
|
|
|
assertTrue(principals.oneByType(Scope.class).isEmpty());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Test {@link BearerRealm#doGetAuthenticationInfo(AuthenticationToken)} with scope.
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
@Test
|
|
|
|
|
public void testDoGetAuthenticationInfoWithScope()
|
|
|
|
|
{
|
|
|
|
|
SecureKey key = createSecureKey();
|
|
|
|
|
|
|
|
|
|
User marvin = UserTestData.createMarvin();
|
|
|
|
|
|
|
|
|
|
when(userDAO.get(marvin.getName())).thenReturn(marvin);
|
|
|
|
|
|
|
|
|
|
resolveKey(key);
|
|
|
|
|
|
|
|
|
|
String compact = createCompactToken(
|
|
|
|
|
marvin.getName(),
|
|
|
|
|
key,
|
|
|
|
|
new Date(System.currentTimeMillis() + 60000),
|
|
|
|
|
Scope.valueOf("repo:*", "user:*")
|
|
|
|
|
);
|
|
|
|
|
|
2017-01-17 15:54:32 +01:00
|
|
|
AuthenticationInfo info = realm.doGetAuthenticationInfo(BearerToken.valueOf(compact));
|
2017-01-16 15:04:44 +01:00
|
|
|
Scope scope = info.getPrincipals().oneByType(Scope.class);
|
|
|
|
|
assertThat(scope, Matchers.containsInAnyOrder("repo:*", "user:*"));
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
2017-01-12 22:04:19 +01:00
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Test {@link BearerRealm#doGetAuthenticationInfo(AuthenticationToken)} with a failed
|
|
|
|
|
* claims validation.
|
|
|
|
|
*/
|
|
|
|
|
@Test
|
|
|
|
|
public void testDoGetAuthenticationInfoWithInvalidClaims()
|
|
|
|
|
{
|
|
|
|
|
SecureKey key = createSecureKey();
|
|
|
|
|
User marvin = UserTestData.createMarvin();
|
|
|
|
|
|
|
|
|
|
resolveKey(key);
|
|
|
|
|
|
|
|
|
|
String compact = createCompactToken(marvin.getName(), key);
|
|
|
|
|
|
|
|
|
|
// treat claims as invalid
|
|
|
|
|
when(validator.validate(Mockito.anyMap())).thenReturn(false);
|
|
|
|
|
|
|
|
|
|
// expect exception
|
|
|
|
|
expectedException.expect(AuthenticationException.class);
|
|
|
|
|
expectedException.expectMessage(Matchers.containsString("claims"));
|
|
|
|
|
|
|
|
|
|
// kick authentication
|
2017-01-17 15:54:32 +01:00
|
|
|
realm.doGetAuthenticationInfo(BearerToken.valueOf(compact));
|
2017-01-12 22:04:19 +01:00
|
|
|
}
|
2015-02-21 15:58:13 +01:00
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Method description
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
@Test(expected = AuthenticationException.class)
|
|
|
|
|
public void testDoGetAuthenticationInfoWithExpiredToken()
|
|
|
|
|
{
|
|
|
|
|
User trillian = UserTestData.createTrillian();
|
|
|
|
|
|
|
|
|
|
SecureKey key = createSecureKey();
|
|
|
|
|
|
|
|
|
|
resolveKey(key);
|
|
|
|
|
|
|
|
|
|
Date exp = new Date(System.currentTimeMillis() - 600l);
|
2017-01-16 15:04:44 +01:00
|
|
|
String compact = createCompactToken(trillian.getName(), key, exp, Scope.empty());
|
2015-02-21 15:58:13 +01:00
|
|
|
|
2017-01-17 15:54:32 +01:00
|
|
|
realm.doGetAuthenticationInfo(BearerToken.valueOf(compact));
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Method description
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
@Test(expected = AuthenticationException.class)
|
|
|
|
|
public void testDoGetAuthenticationInfoWithInvalidSignature()
|
|
|
|
|
{
|
|
|
|
|
resolveKey(createSecureKey());
|
|
|
|
|
|
|
|
|
|
User trillian = UserTestData.createTrillian();
|
|
|
|
|
String compact = createCompactToken(trillian.getName(), createSecureKey());
|
|
|
|
|
|
2017-01-17 15:54:32 +01:00
|
|
|
realm.doGetAuthenticationInfo(BearerToken.valueOf(compact));
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Method description
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
@Test(expected = AuthenticationException.class)
|
|
|
|
|
public void testDoGetAuthenticationInfoWithoutSignature()
|
|
|
|
|
{
|
|
|
|
|
String compact = Jwts.builder().setSubject("test").compact();
|
|
|
|
|
|
2017-01-17 15:54:32 +01:00
|
|
|
realm.doGetAuthenticationInfo(BearerToken.valueOf(compact));
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Method description
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
@Test(expected = IllegalArgumentException.class)
|
|
|
|
|
public void testDoGetAuthenticationInfoWrongToken()
|
|
|
|
|
{
|
|
|
|
|
realm.doGetAuthenticationInfo(new UsernamePasswordToken("test", "test"));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//~--- set methods ----------------------------------------------------------
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Method description
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
@Before
|
|
|
|
|
public void setUp()
|
|
|
|
|
{
|
2017-01-12 22:04:19 +01:00
|
|
|
when(validator.validate(Mockito.anyMap())).thenReturn(true);
|
|
|
|
|
Set<TokenClaimsValidator> validators = Sets.newHashSet(validator);
|
2017-01-15 20:27:06 +01:00
|
|
|
realm = new BearerRealm(helperFactory, keyResolver, validators);
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//~--- methods --------------------------------------------------------------
|
|
|
|
|
|
2017-01-16 15:04:44 +01:00
|
|
|
private String createCompactToken(String subject, SecureKey key) {
|
|
|
|
|
return createCompactToken(subject, key, Scope.empty());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private String createCompactToken(String subject, SecureKey key, Scope scope) {
|
|
|
|
|
return createCompactToken(subject, key, new Date(System.currentTimeMillis() + 60000), scope);
|
2015-02-21 15:58:13 +01:00
|
|
|
}
|
|
|
|
|
|
2017-01-16 15:04:44 +01:00
|
|
|
private String createCompactToken(String subject, SecureKey key, Date exp, Scope scope) {
|
2015-02-21 15:58:13 +01:00
|
|
|
return Jwts.builder()
|
2017-01-16 15:04:44 +01:00
|
|
|
.claim(Scopes.CLAIMS_KEY, ImmutableList.copyOf(scope))
|
2015-02-21 15:58:13 +01:00
|
|
|
.setSubject(subject)
|
|
|
|
|
.setExpiration(exp)
|
|
|
|
|
.signWith(SignatureAlgorithm.HS256, key.getBytes())
|
|
|
|
|
.compact();
|
|
|
|
|
}
|
|
|
|
|
|
2017-01-16 15:04:44 +01:00
|
|
|
private void resolveKey(SecureKey key) {
|
2015-02-21 15:58:13 +01:00
|
|
|
when(
|
|
|
|
|
keyResolver.resolveSigningKey(
|
|
|
|
|
any(JwsHeader.class),
|
|
|
|
|
any(Claims.class)
|
|
|
|
|
)
|
|
|
|
|
)
|
|
|
|
|
.thenReturn(
|
|
|
|
|
new SecretKeySpec(
|
|
|
|
|
key.getBytes(),
|
2018-11-30 10:29:08 +01:00
|
|
|
SignatureAlgorithm.HS256.getJcaName()
|
2015-02-21 15:58:13 +01:00
|
|
|
)
|
|
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//~--- fields ---------------------------------------------------------------
|
2017-01-12 22:04:19 +01:00
|
|
|
|
2017-01-15 20:27:06 +01:00
|
|
|
@InjectMocks
|
|
|
|
|
private DAORealmHelperFactory helperFactory;
|
|
|
|
|
|
|
|
|
|
@Mock
|
|
|
|
|
private LoginAttemptHandler loginAttemptHandler;
|
|
|
|
|
|
2017-01-12 22:04:19 +01:00
|
|
|
@Mock
|
|
|
|
|
private TokenClaimsValidator validator;
|
|
|
|
|
|
2015-02-21 15:58:13 +01:00
|
|
|
/** Field description */
|
|
|
|
|
@Mock
|
|
|
|
|
private GroupDAO groupDAO;
|
|
|
|
|
|
|
|
|
|
/** Field description */
|
|
|
|
|
@Mock
|
|
|
|
|
private SecureKeyResolver keyResolver;
|
|
|
|
|
|
|
|
|
|
/** Field description */
|
|
|
|
|
private BearerRealm realm;
|
|
|
|
|
|
|
|
|
|
/** Field description */
|
|
|
|
|
@Mock
|
|
|
|
|
private UserDAO userDAO;
|
|
|
|
|
}
|