parent
bf5b693549
commit
d6d0d89ff8
|
@ -1,391 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2002-2015 the original author or authors.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* https://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
package org.springframework.security.config.annotation.web.configurers
|
|
||||||
|
|
||||||
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
|
|
||||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
|
||||||
import org.springframework.security.config.annotation.web.configuration.BaseWebConfig;
|
|
||||||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
|
||||||
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter
|
|
||||||
import org.springframework.security.web.authentication.logout.LogoutHandler;
|
|
||||||
|
|
||||||
import javax.servlet.http.Cookie
|
|
||||||
|
|
||||||
import org.springframework.context.annotation.Bean;
|
|
||||||
import org.springframework.context.annotation.Configuration
|
|
||||||
import org.springframework.mock.web.MockFilterChain
|
|
||||||
import org.springframework.mock.web.MockHttpServletRequest;
|
|
||||||
import org.springframework.mock.web.MockHttpServletResponse
|
|
||||||
import org.springframework.mock.web.MockHttpSession
|
|
||||||
import org.springframework.security.authentication.AuthenticationManager
|
|
||||||
import org.springframework.security.authentication.RememberMeAuthenticationToken;
|
|
||||||
import org.springframework.security.config.annotation.BaseSpringSpec
|
|
||||||
import org.springframework.security.core.authority.AuthorityUtils;
|
|
||||||
import org.springframework.security.core.context.SecurityContext
|
|
||||||
import org.springframework.security.core.userdetails.UserDetailsService
|
|
||||||
import org.springframework.security.web.FilterChainProxy
|
|
||||||
import org.springframework.security.web.authentication.AuthenticationSuccessHandler
|
|
||||||
import org.springframework.security.web.authentication.RememberMeServices
|
|
||||||
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter
|
|
||||||
import org.springframework.security.web.authentication.rememberme.AbstractRememberMeServices
|
|
||||||
import org.springframework.security.web.authentication.rememberme.PersistentTokenBasedRememberMeServices;
|
|
||||||
import org.springframework.security.web.authentication.rememberme.PersistentTokenRepository;
|
|
||||||
import org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter
|
|
||||||
import org.springframework.security.web.context.HttpRequestResponseHolder
|
|
||||||
import org.springframework.security.web.context.HttpSessionSecurityContextRepository
|
|
||||||
import org.springframework.test.util.ReflectionTestUtils;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Tests to verify that all the functionality of <anonymous> attributes is present
|
|
||||||
*
|
|
||||||
* @author Rob Winch
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
public class NamespaceRememberMeTests extends BaseSpringSpec {
|
|
||||||
|
|
||||||
def "http/remember-me"() {
|
|
||||||
setup:
|
|
||||||
loadConfig(RememberMeConfig)
|
|
||||||
when: "login with remember me"
|
|
||||||
super.setup()
|
|
||||||
request.servletPath = "/login"
|
|
||||||
request.method = "POST"
|
|
||||||
request.parameters.username = ["user"] as String[]
|
|
||||||
request.parameters.password = ["password"] as String[]
|
|
||||||
request.parameters.'remember-me' = ["true"] as String[]
|
|
||||||
springSecurityFilterChain.doFilter(request,response,chain)
|
|
||||||
Cookie rememberMeCookie = getRememberMeCookie()
|
|
||||||
then: "response contains remember me cookie"
|
|
||||||
rememberMeCookie != null
|
|
||||||
when: "session expires"
|
|
||||||
super.setup()
|
|
||||||
request.setCookies(rememberMeCookie)
|
|
||||||
request.requestURI = "/abc"
|
|
||||||
springSecurityFilterChain.doFilter(request,response,chain)
|
|
||||||
MockHttpSession session = request.getSession()
|
|
||||||
then: "initialized to RememberMeAuthenticationToken"
|
|
||||||
SecurityContext context = new HttpSessionSecurityContextRepository().loadContext(new HttpRequestResponseHolder(request, response))
|
|
||||||
context.getAuthentication() instanceof RememberMeAuthenticationToken
|
|
||||||
when: "logout"
|
|
||||||
super.setup()
|
|
||||||
request.setSession(session)
|
|
||||||
super.setupCsrf()
|
|
||||||
request.setCookies(rememberMeCookie)
|
|
||||||
request.servletPath = "/logout"
|
|
||||||
request.method = "POST"
|
|
||||||
springSecurityFilterChain.doFilter(request,response,chain)
|
|
||||||
rememberMeCookie = getRememberMeCookie()
|
|
||||||
then: "logout cookie expired"
|
|
||||||
response.getRedirectedUrl() == "/login?logout"
|
|
||||||
rememberMeCookie.maxAge == 0
|
|
||||||
when: "use remember me after logout"
|
|
||||||
super.setup()
|
|
||||||
request.setCookies(rememberMeCookie)
|
|
||||||
request.requestURI = "/abc"
|
|
||||||
springSecurityFilterChain.doFilter(request,response,chain)
|
|
||||||
then: "sent to default login page"
|
|
||||||
response.getRedirectedUrl() == "http://localhost/login"
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class RememberMeConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.authorizeRequests()
|
|
||||||
.anyRequest().hasRole("USER")
|
|
||||||
.and()
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// See SEC-3170
|
|
||||||
static interface RememberMeServicesLogoutHandler extends RememberMeServices, LogoutHandler{}
|
|
||||||
|
|
||||||
def "http/remember-me@services-ref"() {
|
|
||||||
setup:
|
|
||||||
RememberMeServicesRefConfig.REMEMBER_ME_SERVICES = Mock(RememberMeServicesLogoutHandler)
|
|
||||||
when: "use custom remember-me services"
|
|
||||||
loadConfig(RememberMeServicesRefConfig)
|
|
||||||
then: "custom remember-me services used"
|
|
||||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices == RememberMeServicesRefConfig.REMEMBER_ME_SERVICES
|
|
||||||
findFilter(UsernamePasswordAuthenticationFilter).rememberMeServices == RememberMeServicesRefConfig.REMEMBER_ME_SERVICES
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class RememberMeServicesRefConfig extends BaseWebConfig {
|
|
||||||
static RememberMeServices REMEMBER_ME_SERVICES
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.rememberMeServices(REMEMBER_ME_SERVICES)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me@authentication-success-handler-ref"() {
|
|
||||||
setup:
|
|
||||||
AuthSuccessConfig.SUCCESS_HANDLER = Mock(AuthenticationSuccessHandler)
|
|
||||||
when: "use custom success handler"
|
|
||||||
loadConfig(AuthSuccessConfig)
|
|
||||||
then: "custom remember-me success handler is used"
|
|
||||||
findFilter(RememberMeAuthenticationFilter).successHandler == AuthSuccessConfig.SUCCESS_HANDLER
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class AuthSuccessConfig extends BaseWebConfig {
|
|
||||||
static AuthenticationSuccessHandler SUCCESS_HANDLER
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.authenticationSuccessHandler(SUCCESS_HANDLER)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// http/remember-me@data-source-ref is not supported directly. Instead use http/remember-me@token-repository-ref example
|
|
||||||
|
|
||||||
def "http/remember-me@key"() {
|
|
||||||
when: "use custom key"
|
|
||||||
loadConfig(KeyConfig)
|
|
||||||
AuthenticationManager authManager = context.getBean(AuthenticationManager)
|
|
||||||
then: "custom key services used"
|
|
||||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.key == "KeyConfig"
|
|
||||||
authManager.authenticate(new RememberMeAuthenticationToken("KeyConfig", "user", AuthorityUtils.createAuthorityList("ROLE_USER")))
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class KeyConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.key("KeyConfig")
|
|
||||||
}
|
|
||||||
|
|
||||||
@Bean
|
|
||||||
@Override
|
|
||||||
public AuthenticationManager authenticationManagerBean()
|
|
||||||
throws Exception {
|
|
||||||
return super.authenticationManagerBean();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// http/remember-me@services-alias is not supported use standard aliasing instead (i.e. @Bean("alias"))
|
|
||||||
|
|
||||||
def "http/remember-me@token-repository-ref"() {
|
|
||||||
setup:
|
|
||||||
TokenRepositoryRefConfig.TOKEN_REPOSITORY = Mock(PersistentTokenRepository)
|
|
||||||
when: "use custom token services"
|
|
||||||
loadConfig(TokenRepositoryRefConfig)
|
|
||||||
then: "custom token services used with PersistentTokenBasedRememberMeServices"
|
|
||||||
PersistentTokenBasedRememberMeServices rememberMeServices = findFilter(RememberMeAuthenticationFilter).rememberMeServices
|
|
||||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.tokenRepository == TokenRepositoryRefConfig.TOKEN_REPOSITORY
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class TokenRepositoryRefConfig extends BaseWebConfig {
|
|
||||||
static PersistentTokenRepository TOKEN_REPOSITORY
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
// JdbcTokenRepositoryImpl tokenRepository = new JdbcTokenRepositoryImpl()
|
|
||||||
// tokenRepository.setDataSource(dataSource);
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.tokenRepository(TOKEN_REPOSITORY)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me@token-validity-seconds"() {
|
|
||||||
when: "use token validity"
|
|
||||||
loadConfig(TokenValiditySecondsConfig)
|
|
||||||
then: "custom token validity used"
|
|
||||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.tokenValiditySeconds == 1
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class TokenValiditySecondsConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.tokenValiditySeconds(1)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me@token-validity-seconds default"() {
|
|
||||||
when: "use token validity"
|
|
||||||
loadConfig(DefaultTokenValiditySecondsConfig)
|
|
||||||
then: "custom token validity used"
|
|
||||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.tokenValiditySeconds == AbstractRememberMeServices.TWO_WEEKS_S
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class DefaultTokenValiditySecondsConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me@use-secure-cookie"() {
|
|
||||||
when: "use secure cookies = true"
|
|
||||||
loadConfig(UseSecureCookieConfig)
|
|
||||||
then: "secure cookies will be used"
|
|
||||||
ReflectionTestUtils.getField(findFilter(RememberMeAuthenticationFilter).rememberMeServices, "useSecureCookie") == true
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class UseSecureCookieConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.useSecureCookie(true)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me@remember-me-parameter"() {
|
|
||||||
when: "use custom rememberMeParameter"
|
|
||||||
loadConfig(RememberMeParameterConfig)
|
|
||||||
then: "custom rememberMeParameter will be used"
|
|
||||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.parameter == "rememberMe"
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class RememberMeParameterConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.rememberMeParameter("rememberMe")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// SEC-2880
|
|
||||||
def "http/remember-me@remember-me-cookie"() {
|
|
||||||
when: "use custom rememberMeCookieName"
|
|
||||||
loadConfig(RememberMeCookieNameConfig)
|
|
||||||
then: "custom rememberMeCookieName will be used"
|
|
||||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.cookieName == "rememberMe"
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class RememberMeCookieNameConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.rememberMeCookieName("rememberMe")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me@use-secure-cookie defaults"() {
|
|
||||||
when: "use secure cookies not specified"
|
|
||||||
loadConfig(DefaultUseSecureCookieConfig)
|
|
||||||
then: "secure cookies will be null (use secure if the request is secure)"
|
|
||||||
ReflectionTestUtils.getField(findFilter(RememberMeAuthenticationFilter).rememberMeServices, "useSecureCookie") == null
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class DefaultUseSecureCookieConfig extends BaseWebConfig {
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me defaults UserDetailsService with custom UserDetailsService"() {
|
|
||||||
setup:
|
|
||||||
DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE = Mock(UserDetailsService)
|
|
||||||
loadConfig(DefaultsUserDetailsServiceWithDaoConfig)
|
|
||||||
when:
|
|
||||||
request.setCookies(createRememberMeCookie())
|
|
||||||
springSecurityFilterChain.doFilter(request, response, chain)
|
|
||||||
then: "RememberMeServices defaults to the custom UserDetailsService"
|
|
||||||
1 * DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE.loadUserByUsername("user")
|
|
||||||
}
|
|
||||||
|
|
||||||
@EnableWebSecurity
|
|
||||||
static class DefaultsUserDetailsServiceWithDaoConfig extends WebSecurityConfigurerAdapter {
|
|
||||||
static UserDetailsService USERDETAILS_SERVICE
|
|
||||||
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
}
|
|
||||||
|
|
||||||
protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
|
||||||
auth
|
|
||||||
.userDetailsService(USERDETAILS_SERVICE);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def "http/remember-me@user-service-ref"() {
|
|
||||||
setup:
|
|
||||||
UserServiceRefConfig.USERDETAILS_SERVICE = Mock(UserDetailsService)
|
|
||||||
when: "use custom UserDetailsService"
|
|
||||||
loadConfig(UserServiceRefConfig)
|
|
||||||
then: "custom UserDetailsService is used"
|
|
||||||
ReflectionTestUtils.getField(findFilter(RememberMeAuthenticationFilter).rememberMeServices, "userDetailsService") == UserServiceRefConfig.USERDETAILS_SERVICE
|
|
||||||
}
|
|
||||||
|
|
||||||
@Configuration
|
|
||||||
static class UserServiceRefConfig extends BaseWebConfig {
|
|
||||||
static UserDetailsService USERDETAILS_SERVICE
|
|
||||||
protected void configure(HttpSecurity http) throws Exception {
|
|
||||||
http
|
|
||||||
.formLogin()
|
|
||||||
.and()
|
|
||||||
.rememberMe()
|
|
||||||
.userDetailsService(USERDETAILS_SERVICE)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
Cookie createRememberMeCookie() {
|
|
||||||
MockHttpServletRequest request = new MockHttpServletRequest("GET", "")
|
|
||||||
MockHttpServletResponse response = new MockHttpServletResponse()
|
|
||||||
super.setupCsrf("CSRF_TOKEN", request, response)
|
|
||||||
|
|
||||||
MockFilterChain chain = new MockFilterChain()
|
|
||||||
request.servletPath = "/login"
|
|
||||||
request.method = "POST"
|
|
||||||
request.parameters.username = ["user"] as String[]
|
|
||||||
request.parameters.password = ["password"] as String[]
|
|
||||||
request.parameters.'remember-me' = ["true"] as String[]
|
|
||||||
springSecurityFilterChain.doFilter(request, response, chain)
|
|
||||||
response.getCookie("remember-me")
|
|
||||||
}
|
|
||||||
|
|
||||||
Cookie getRememberMeCookie(String cookieName="remember-me") {
|
|
||||||
response.getCookie(cookieName)
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -0,0 +1,515 @@
|
||||||
|
/*
|
||||||
|
* Copyright 2002-2019 the original author or authors.
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* https://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.springframework.security.config.annotation.web.configurers;
|
||||||
|
|
||||||
|
import javax.servlet.http.Cookie;
|
||||||
|
import javax.servlet.http.HttpServletRequest;
|
||||||
|
import javax.servlet.http.HttpServletResponse;
|
||||||
|
|
||||||
|
import org.junit.Rule;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
import org.springframework.beans.factory.annotation.Autowired;
|
||||||
|
import org.springframework.context.annotation.Bean;
|
||||||
|
import org.springframework.context.annotation.Configuration;
|
||||||
|
import org.springframework.core.annotation.Order;
|
||||||
|
import org.springframework.mock.web.MockHttpSession;
|
||||||
|
import org.springframework.security.authentication.RememberMeAuthenticationToken;
|
||||||
|
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
|
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
||||||
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
|
||||||
|
import org.springframework.security.config.test.SpringTestRule;
|
||||||
|
import org.springframework.security.core.Authentication;
|
||||||
|
import org.springframework.security.core.authority.AuthorityUtils;
|
||||||
|
import org.springframework.security.core.userdetails.User;
|
||||||
|
import org.springframework.security.core.userdetails.UserDetailsService;
|
||||||
|
import org.springframework.security.provisioning.InMemoryUserDetailsManager;
|
||||||
|
import org.springframework.security.web.authentication.AuthenticationSuccessHandler;
|
||||||
|
import org.springframework.security.web.authentication.RememberMeServices;
|
||||||
|
import org.springframework.security.web.authentication.rememberme.AbstractRememberMeServices;
|
||||||
|
import org.springframework.security.web.authentication.rememberme.PersistentRememberMeToken;
|
||||||
|
import org.springframework.security.web.authentication.rememberme.PersistentTokenRepository;
|
||||||
|
import org.springframework.test.web.servlet.MockMvc;
|
||||||
|
import org.springframework.test.web.servlet.MvcResult;
|
||||||
|
import org.springframework.test.web.servlet.request.RequestPostProcessor;
|
||||||
|
import org.springframework.web.bind.annotation.GetMapping;
|
||||||
|
import org.springframework.web.bind.annotation.RestController;
|
||||||
|
|
||||||
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
|
import static org.mockito.ArgumentMatchers.any;
|
||||||
|
import static org.mockito.Mockito.mock;
|
||||||
|
import static org.mockito.Mockito.verify;
|
||||||
|
import static org.mockito.Mockito.verifyZeroInteractions;
|
||||||
|
import static org.mockito.Mockito.when;
|
||||||
|
import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf;
|
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
|
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post;
|
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.content;
|
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.redirectedUrl;
|
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Tests to verify that all the functionality of <anonymous> attributes is present
|
||||||
|
*
|
||||||
|
* @author Rob Winch
|
||||||
|
* @author Josh Cummings
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
public class NamespaceRememberMeTests {
|
||||||
|
|
||||||
|
@Rule
|
||||||
|
public final SpringTestRule spring = new SpringTestRule();
|
||||||
|
|
||||||
|
@Autowired
|
||||||
|
MockMvc mvc;
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenUsingDefaultsThenMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(RememberMeConfig.class, SecurityController.class).autowire();
|
||||||
|
MvcResult result = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andReturn();
|
||||||
|
|
||||||
|
MockHttpSession session = (MockHttpSession) result.getRequest().getSession();
|
||||||
|
Cookie rememberMe = result.getResponse().getCookie("remember-me");
|
||||||
|
assertThat(rememberMe).isNotNull();
|
||||||
|
this.mvc.perform(get("/authentication-class")
|
||||||
|
.cookie(rememberMe))
|
||||||
|
.andExpect(content().string(RememberMeAuthenticationToken.class.getName()));
|
||||||
|
|
||||||
|
result = this.mvc.perform(post("/logout").with(csrf())
|
||||||
|
.session(session)
|
||||||
|
.cookie(rememberMe))
|
||||||
|
.andExpect(redirectedUrl("/login?logout"))
|
||||||
|
.andReturn();
|
||||||
|
|
||||||
|
rememberMe = result.getResponse().getCookie("remember-me");
|
||||||
|
assertThat(rememberMe).isNotNull().extracting("maxAge").containsExactly(0);
|
||||||
|
|
||||||
|
this.mvc.perform(post("/authentication-class").with(csrf())
|
||||||
|
.cookie(rememberMe))
|
||||||
|
.andExpect(redirectedUrl("http://localhost/login"))
|
||||||
|
.andReturn();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class RememberMeConfig extends UsersConfig {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.authorizeRequests()
|
||||||
|
.anyRequest().hasRole("USER")
|
||||||
|
.and()
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe();
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// SEC-3170 - RememberMeService implementations should not have to also implement LogoutHandler
|
||||||
|
@Test
|
||||||
|
public void logoutWhenCustomRememberMeServicesDeclaredThenUses() throws Exception {
|
||||||
|
RememberMeServicesRefConfig.REMEMBER_ME_SERVICES = mock(RememberMeServicesWithoutLogoutHandler.class);
|
||||||
|
this.spring.register(RememberMeServicesRefConfig.class).autowire();
|
||||||
|
|
||||||
|
this.mvc.perform(get("/"));
|
||||||
|
verify(RememberMeServicesRefConfig.REMEMBER_ME_SERVICES)
|
||||||
|
.autoLogin(any(HttpServletRequest.class), any(HttpServletResponse.class));
|
||||||
|
|
||||||
|
this.mvc.perform(post("/login").with(csrf()));
|
||||||
|
verify(RememberMeServicesRefConfig.REMEMBER_ME_SERVICES)
|
||||||
|
.loginFail(any(HttpServletRequest.class), any(HttpServletResponse.class));
|
||||||
|
}
|
||||||
|
|
||||||
|
interface RememberMeServicesWithoutLogoutHandler extends RememberMeServices {}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class RememberMeServicesRefConfig extends WebSecurityConfigurerAdapter {
|
||||||
|
static RememberMeServices REMEMBER_ME_SERVICES;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.rememberMeServices(REMEMBER_ME_SERVICES);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenAuthenticationSuccessHandlerDeclaredThenUses() throws Exception {
|
||||||
|
AuthSuccessConfig.SUCCESS_HANDLER = mock(AuthenticationSuccessHandler.class);
|
||||||
|
this.spring.register(AuthSuccessConfig.class).autowire();
|
||||||
|
|
||||||
|
MvcResult result = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andReturn();
|
||||||
|
|
||||||
|
verifyZeroInteractions(AuthSuccessConfig.SUCCESS_HANDLER);
|
||||||
|
|
||||||
|
Cookie rememberMe = result.getResponse().getCookie("remember-me");
|
||||||
|
assertThat(rememberMe).isNotNull();
|
||||||
|
this.mvc.perform(get("/somewhere")
|
||||||
|
.cookie(rememberMe));
|
||||||
|
|
||||||
|
verify(AuthSuccessConfig.SUCCESS_HANDLER).onAuthenticationSuccess
|
||||||
|
(any(HttpServletRequest.class), any(HttpServletResponse.class), any(Authentication.class));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class AuthSuccessConfig extends UsersConfig {
|
||||||
|
static AuthenticationSuccessHandler SUCCESS_HANDLER;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.authenticationSuccessHandler(SUCCESS_HANDLER);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenKeyDeclaredThenMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(WithoutKeyConfig.class, KeyConfig.class, SecurityController.class).autowire();
|
||||||
|
Cookie withoutKey = this.mvc.perform(post("/without-key/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andExpect(redirectedUrl("/"))
|
||||||
|
.andReturn().getResponse().getCookie("remember-me");
|
||||||
|
|
||||||
|
this.mvc.perform(get("/somewhere")
|
||||||
|
.cookie(withoutKey))
|
||||||
|
.andExpect(status().isFound())
|
||||||
|
.andExpect(redirectedUrl("http://localhost/login"));
|
||||||
|
|
||||||
|
Cookie withKey = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andReturn().getResponse().getCookie("remember-me");
|
||||||
|
this.mvc.perform(get("/somewhere")
|
||||||
|
.cookie(withKey))
|
||||||
|
.andExpect(status().isNotFound());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
@Order(0)
|
||||||
|
static class WithoutKeyConfig extends UsersConfig {
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.antMatcher("/without-key/**")
|
||||||
|
.formLogin()
|
||||||
|
.loginProcessingUrl("/without-key/login")
|
||||||
|
.and()
|
||||||
|
.rememberMe();
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class KeyConfig extends UsersConfig {
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.authorizeRequests()
|
||||||
|
.anyRequest().authenticated()
|
||||||
|
.and()
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.key("KeyConfig");
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// http/remember-me@services-alias is not supported use standard aliasing instead (i.e. @Bean("alias"))
|
||||||
|
|
||||||
|
// http/remember-me@data-source-ref is not supported directly. Instead use http/remember-me@token-repository-ref example
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenDeclaredTokenRepositoryThenMatchesNamespace() throws Exception {
|
||||||
|
TokenRepositoryRefConfig.TOKEN_REPOSITORY = mock(PersistentTokenRepository.class);
|
||||||
|
this.spring.register(TokenRepositoryRefConfig.class).autowire();
|
||||||
|
|
||||||
|
this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()));
|
||||||
|
|
||||||
|
verify(TokenRepositoryRefConfig.TOKEN_REPOSITORY).createNewToken(any(PersistentRememberMeToken.class));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class TokenRepositoryRefConfig extends UsersConfig {
|
||||||
|
static PersistentTokenRepository TOKEN_REPOSITORY;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// JdbcTokenRepositoryImpl tokenRepository = new JdbcTokenRepositoryImpl()
|
||||||
|
// tokenRepository.setDataSource(dataSource);
|
||||||
|
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.tokenRepository(TOKEN_REPOSITORY);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenTokenValidityDeclaredThenMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(TokenValiditySecondsConfig.class).autowire();
|
||||||
|
Cookie expiredRememberMe = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andReturn().getResponse().getCookie("remember-me");
|
||||||
|
|
||||||
|
assertThat(expiredRememberMe).extracting("maxAge").containsExactly(314);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class TokenValiditySecondsConfig extends UsersConfig {
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.authorizeRequests()
|
||||||
|
.anyRequest().authenticated()
|
||||||
|
.and()
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.tokenValiditySeconds(314);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenUsingDefaultsThenCookieMaxAgeMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(RememberMeConfig.class).autowire();
|
||||||
|
Cookie expiredRememberMe = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andReturn().getResponse().getCookie("remember-me");
|
||||||
|
|
||||||
|
assertThat(expiredRememberMe).extracting("maxAge")
|
||||||
|
.containsExactly(AbstractRememberMeServices.TWO_WEEKS_S);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenUsingSecureCookieThenMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(UseSecureCookieConfig.class).autowire();
|
||||||
|
Cookie secureCookie = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andReturn().getResponse().getCookie("remember-me");
|
||||||
|
|
||||||
|
assertThat(secureCookie).extracting("secure").containsExactly(true);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class UseSecureCookieConfig extends UsersConfig {
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.useSecureCookie(true);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenUsingDefaultsThenCookieSecurityMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(RememberMeConfig.class).autowire();
|
||||||
|
Cookie secureCookie = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin())
|
||||||
|
.secure(true))
|
||||||
|
.andReturn().getResponse().getCookie("remember-me");
|
||||||
|
|
||||||
|
assertThat(secureCookie).extracting("secure").containsExactly(true);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenParameterSpecifiedThenMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(RememberMeParameterConfig.class).autowire();
|
||||||
|
Cookie rememberMe = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin("rememberMe", true)))
|
||||||
|
.andReturn().getResponse().getCookie("remember-me");
|
||||||
|
|
||||||
|
assertThat(rememberMe).isNotNull();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class RememberMeParameterConfig extends UsersConfig {
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.rememberMeParameter("rememberMe");
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// SEC-2880
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenCookieNameDeclaredThenMatchesNamespace() throws Exception {
|
||||||
|
this.spring.register(RememberMeCookieNameConfig.class).autowire();
|
||||||
|
Cookie rememberMe = this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()))
|
||||||
|
.andReturn().getResponse().getCookie("rememberMe");
|
||||||
|
|
||||||
|
assertThat(rememberMe).isNotNull();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class RememberMeCookieNameConfig extends UsersConfig {
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.rememberMeCookieName("rememberMe");
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenGlobalUserDetailsServiceDeclaredThenMatchesNamespace() throws Exception {
|
||||||
|
DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE = mock(UserDetailsService.class);
|
||||||
|
this.spring.register(DefaultsUserDetailsServiceWithDaoConfig.class).autowire();
|
||||||
|
|
||||||
|
this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()));
|
||||||
|
|
||||||
|
verify(DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE)
|
||||||
|
.loadUserByUsername("user");
|
||||||
|
}
|
||||||
|
|
||||||
|
@EnableWebSecurity
|
||||||
|
@Configuration
|
||||||
|
static class DefaultsUserDetailsServiceWithDaoConfig extends WebSecurityConfigurerAdapter {
|
||||||
|
static UserDetailsService USERDETAILS_SERVICE;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe();
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(AuthenticationManagerBuilder auth) throws Exception {
|
||||||
|
auth
|
||||||
|
.userDetailsService(USERDETAILS_SERVICE);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void rememberMeLoginWhenUserDetailsServiceDeclaredThenMatchesNamespace() throws Exception {
|
||||||
|
UserServiceRefConfig.USERDETAILS_SERVICE = mock(UserDetailsService.class);
|
||||||
|
this.spring.register(UserServiceRefConfig.class).autowire();
|
||||||
|
|
||||||
|
when(UserServiceRefConfig.USERDETAILS_SERVICE.loadUserByUsername("user"))
|
||||||
|
.thenReturn(new User("user", "password", AuthorityUtils.createAuthorityList("ROLE_USER")));
|
||||||
|
|
||||||
|
this.mvc.perform(post("/login")
|
||||||
|
.with(rememberMeLogin()));
|
||||||
|
|
||||||
|
verify(UserServiceRefConfig.USERDETAILS_SERVICE)
|
||||||
|
.loadUserByUsername("user");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Configuration
|
||||||
|
@EnableWebSecurity
|
||||||
|
static class UserServiceRefConfig extends UsersConfig {
|
||||||
|
static UserDetailsService USERDETAILS_SERVICE;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected void configure(HttpSecurity http) throws Exception {
|
||||||
|
// @formatter:off
|
||||||
|
http
|
||||||
|
.formLogin()
|
||||||
|
.and()
|
||||||
|
.rememberMe()
|
||||||
|
.userDetailsService(USERDETAILS_SERVICE);
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static RequestPostProcessor rememberMeLogin() {
|
||||||
|
return rememberMeLogin("remember-me", true);
|
||||||
|
}
|
||||||
|
|
||||||
|
static RequestPostProcessor rememberMeLogin(String parameterName, boolean parameterValue) {
|
||||||
|
return request -> {
|
||||||
|
csrf().postProcessRequest(request);
|
||||||
|
request.setParameter("username", "user");
|
||||||
|
request.setParameter("password", "password");
|
||||||
|
request.setParameter(parameterName, String.valueOf(parameterValue));
|
||||||
|
return request;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
||||||
|
static class UsersConfig extends WebSecurityConfigurerAdapter {
|
||||||
|
@Override
|
||||||
|
@Bean
|
||||||
|
public UserDetailsService userDetailsService() {
|
||||||
|
return new InMemoryUserDetailsManager(
|
||||||
|
User.withDefaultPasswordEncoder()
|
||||||
|
.username("user")
|
||||||
|
.password("password")
|
||||||
|
.roles("USER")
|
||||||
|
.build());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
@RestController
|
||||||
|
static class SecurityController {
|
||||||
|
@GetMapping("/authentication-class")
|
||||||
|
String authenticationClass(Authentication authentication) {
|
||||||
|
return authentication.getClass().getName();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue