mirror of
https://github.com/scm-manager/scm-manager.git
synced 2026-02-22 06:26:56 +01:00
* prepare license-maven-plugin for license migration * added license mapping for tsx files and added some more excludes * Changeover to MIT license * Fix build problems * Delete old remaining licenses * Add more exclude path for license checker * Rename included netbeans license, add exclude .m2/repository/ * Specify .m2 exclude because not only repository/, also wrapper/ must match * Add .cache/ exclude for license check * Modify formatting of license in java classes to comply with convention and IDE * Add IntelliJ documentation for license configuration * Update CHANGELOG.md * Exclude tmp/workspace/ dir for license check * Edit README.md Co-authored-by: Sebastian Sdorra <sebastian.sdorra@cloudogu.com>
153 lines
4.5 KiB
Java
153 lines
4.5 KiB
Java
/*
|
|
* MIT License
|
|
*
|
|
* Copyright (c) 2020-present Cloudogu GmbH and Contributors
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
* in the Software without restriction, including without limitation the rights
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
* furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
* copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
* SOFTWARE.
|
|
*/
|
|
|
|
package sonia.scm.security;
|
|
|
|
|
|
import org.junit.jupiter.api.BeforeEach;
|
|
import org.junit.jupiter.api.Nested;
|
|
import org.junit.jupiter.api.Test;
|
|
import org.junit.jupiter.api.extension.ExtendWith;
|
|
import org.junit.jupiter.params.ParameterizedTest;
|
|
import org.junit.jupiter.params.provider.CsvSource;
|
|
import org.junit.jupiter.params.provider.EnumSource;
|
|
import org.mockito.Mock;
|
|
import org.mockito.junit.jupiter.MockitoExtension;
|
|
|
|
import javax.servlet.http.HttpServletRequest;
|
|
import javax.ws.rs.GET;
|
|
import java.util.Optional;
|
|
|
|
import static org.junit.Assert.assertFalse;
|
|
import static org.junit.Assert.assertTrue;
|
|
import static org.mockito.Mockito.lenient;
|
|
import static org.mockito.Mockito.when;
|
|
|
|
/**
|
|
* Tests {@link XsrfAccessTokenValidator}.
|
|
*
|
|
* @author Sebastian Sdorra
|
|
*/
|
|
@ExtendWith(MockitoExtension.class)
|
|
class XsrfAccessTokenValidatorTest {
|
|
|
|
@Mock
|
|
private HttpServletRequest request;
|
|
|
|
@Mock
|
|
private AccessToken accessToken;
|
|
|
|
private XsrfAccessTokenValidator validator;
|
|
|
|
/**
|
|
* Prepare object under test.
|
|
*/
|
|
@BeforeEach
|
|
void prepareObjectUnderTest() {
|
|
validator = new XsrfAccessTokenValidator(() -> request);
|
|
}
|
|
|
|
@Nested
|
|
class RequestMethodPost {
|
|
|
|
@BeforeEach
|
|
void setRequestMethod() {
|
|
lenient().when(request.getMethod()).thenReturn("POST");
|
|
}
|
|
|
|
/**
|
|
* Tests {@link XsrfAccessTokenValidator#validate(AccessToken)}.
|
|
*/
|
|
@Test
|
|
void testValidate() {
|
|
// prepare
|
|
when(accessToken.getCustom(Xsrf.TOKEN_KEY)).thenReturn(Optional.of("abc"));
|
|
when(request.getHeader(Xsrf.HEADER_KEY)).thenReturn("abc");
|
|
|
|
// execute and assert
|
|
assertTrue(validator.validate(accessToken));
|
|
}
|
|
|
|
/**
|
|
* Tests {@link XsrfAccessTokenValidator#validate(AccessToken)} with wrong header.
|
|
*/
|
|
@Test
|
|
void testValidateWithWrongHeader() {
|
|
// prepare
|
|
when(accessToken.getCustom(Xsrf.TOKEN_KEY)).thenReturn(Optional.of("abc"));
|
|
when(request.getHeader(Xsrf.HEADER_KEY)).thenReturn("123");
|
|
|
|
// execute and assert
|
|
assertFalse(validator.validate(accessToken));
|
|
}
|
|
|
|
/**
|
|
* Tests {@link XsrfAccessTokenValidator#validate(AccessToken)} without header.
|
|
*/
|
|
@Test
|
|
void testValidateWithoutHeader() {
|
|
// prepare
|
|
when(accessToken.getCustom(Xsrf.TOKEN_KEY)).thenReturn(Optional.of("abc"));
|
|
|
|
// execute and assert
|
|
assertFalse(validator.validate(accessToken));
|
|
}
|
|
|
|
/**
|
|
* Tests {@link XsrfAccessTokenValidator#validate(AccessToken)} without claims key.
|
|
*/
|
|
@Test
|
|
void testValidateWithoutClaimsKey() {
|
|
// prepare
|
|
when(accessToken.getCustom(Xsrf.TOKEN_KEY)).thenReturn(Optional.empty());
|
|
|
|
// execute and assert
|
|
assertTrue(validator.validate(accessToken));
|
|
}
|
|
|
|
}
|
|
|
|
@ParameterizedTest
|
|
@CsvSource({"GET", "HEAD", "OPTIONS"})
|
|
void shouldNotValidateReadRequests(String method) {
|
|
// prepare
|
|
when(request.getMethod()).thenReturn(method);
|
|
when(accessToken.getCustom(Xsrf.TOKEN_KEY)).thenReturn(Optional.of("abc"));
|
|
|
|
// execute and assert
|
|
assertTrue(validator.validate(accessToken));
|
|
}
|
|
|
|
@ParameterizedTest
|
|
@CsvSource({"POST", "PUT", "DELETE", "PATCH"})
|
|
void shouldFailValidationOfWriteRequests(String method) {
|
|
// prepare
|
|
when(request.getMethod()).thenReturn(method);
|
|
when(accessToken.getCustom(Xsrf.TOKEN_KEY)).thenReturn(Optional.of("abc"));
|
|
|
|
// execute and assert
|
|
assertFalse(validator.validate(accessToken));
|
|
}
|
|
}
|