/*
* #%L
* Wisdom-Framework
* %%
* Copyright (C) 2013 - 2015 Wisdom Framework
* %%
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
* #L%
*/
package org.wisdom.framework.csrf.unit;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
import org.wisdom.api.Controller;
import org.wisdom.api.DefaultController;
import org.wisdom.api.annotations.FormParameter;
import org.wisdom.api.configuration.Configuration;
import org.wisdom.api.crypto.Crypto;
import org.wisdom.api.crypto.Hash;
import org.wisdom.api.http.*;
import org.wisdom.api.interception.Filter;
import org.wisdom.api.interception.Interceptor;
import org.wisdom.api.interception.RequestContext;
import org.wisdom.api.router.Route;
import org.wisdom.crypto.CryptoServiceSingleton;
import org.wisdom.framework.csrf.AddCSRFTokenInterceptor;
import org.wisdom.framework.csrf.CSRFServiceImpl;
import org.wisdom.framework.csrf.api.AddCSRFToken;
import org.wisdom.test.parents.FakeContext;
import java.util.Collections;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
public class AddCSRFTokenInterceptorTest {
AddCSRFToken add = mock(AddCSRFToken.class);
AddCSRFTokenInterceptor interceptor = new AddCSRFTokenInterceptor();
CSRFServiceImpl service;
private Route route;
private Controller controller = new DefaultController() {
public Result doSomething(@FormParameter("key") String value) {
return ok(value);
}
};
@Before
public void setUp() {
service = new CSRFServiceImpl();
service.crypto = new CryptoServiceSingleton(CSRFServiceImplTest.SECRET,
Hash.MD5, 128, Crypto.AES_CBC_ALGORITHM, 20);
service.configuration = mock(Configuration.class);
interceptor.csrf = service;
}
@After
public void tearDown() {
Context.CONTEXT.remove();
}
@Test
public void testAnnotation() throws Exception {
assertThat(interceptor.annotation()).isEqualTo(AddCSRFToken.class);
}
@Test
public void testThatWeAddTokenWhenNotThere() throws Exception {
FakeContext context = new FakeContext();
when(service.configuration.getWithDefault("token.name", "csrfToken")).thenReturn(
CSRFServiceImplTest.CSRF_TOKEN);
route = new Route(HttpMethod.GET, "/", controller, controller.getClass().getMethod("doSomething", String
.class));
context
.setParameter("key", "value")
.setHeader(HeaderNames.CONTENT_TYPE, MimeTypes.FORM)
.route(route);
Context.CONTEXT.set(context);
RequestContext rc = new RequestContext(route,
Collections.<Filter>emptyList(), Collections.<Interceptor<?>, Object>emptyMap(),
new Object[]{"value"}, null);
Result result = interceptor.call(add, rc);
assertThat(result.getStatusCode()).isEqualTo(Status.OK);
assertThat(context.session().get(CSRFServiceImplTest.CSRF_TOKEN)).isNotNull().isNotEmpty();
}
@Test
public void testThatWeDoNotAddTokenWhenThereIsOne() throws Exception {
FakeContext context = new FakeContext();
String token = service.crypto.generateToken();
route = new Route(HttpMethod.POST, "/", controller, controller.getClass().getMethod("doSomething", String.class));
context
.setFormField("key", "value")
.setHeader(HeaderNames.CONTENT_TYPE, MimeTypes.FORM)
.addToSession(CSRFServiceImplTest.CSRF_TOKEN, token)
.route(route);
Context.CONTEXT.set(context);
RequestContext rc = new RequestContext(route,
Collections.<Filter>emptyList(), Collections.<Interceptor<?>, Object>emptyMap(),
new Object[]{"value"}, null);
Result result = interceptor.call(add, rc);
assertThat(result.getStatusCode()).isEqualTo(Status.OK);
assertThat(context.session().get(CSRFServiceImplTest.CSRF_TOKEN)).isEqualTo(token);
}
@Test
public void testThatWeDoNotAddATokenOnANonEligibleRequest() throws Exception {
FakeContext context = new FakeContext();
route = new Route(HttpMethod.POST, "/", controller, controller.getClass().getMethod("doSomething", String.class));
context
.setFormField("key", "value")
.setHeader(HeaderNames.CONTENT_TYPE, MimeTypes.FORM)
.setHeader(HeaderNames.ACCEPT, MimeTypes.JSON)
.route(route);
Context.CONTEXT.set(context);
RequestContext rc = new RequestContext(route,
Collections.<Filter>emptyList(), Collections.<Interceptor<?>, Object>emptyMap(),
new Object[]{"value"}, null);
Result result = interceptor.call(add, rc);
assertThat(result.getStatusCode()).isEqualTo(Status.OK);
assertThat(context.session().get(CSRFServiceImplTest.CSRF_TOKEN)).isNull();
}
@Test
public void testThatTokenAreDifferentForEachRequest() throws Exception {
when(add.newTokenOnEachRequest()).thenReturn(true);
FakeContext context = new FakeContext();
when(service.configuration.getBooleanWithDefault("token.sign", true)).thenReturn(true);
when(service.configuration.getWithDefault("token.name", "csrfToken"))
.thenReturn(CSRFServiceImplTest.CSRF_TOKEN);
final String token = service.crypto.generateSignedToken();
route = new Route(HttpMethod.GET, "/", controller, controller.getClass().getMethod("doSomething", String.class));
context
.setParameter("key", "value")
.setHeader(HeaderNames.CONTENT_TYPE, MimeTypes.FORM)
.addToSession(CSRFServiceImplTest.CSRF_TOKEN, token)
.setHeader(HeaderNames.CACHE_CONTROL, HeaderNames.NOCACHE_VALUE)
.setHeader(HeaderNames.ACCEPT, MimeTypes.HTML)
.route(route);
assertThat(service.eligibleForCSRF(context)).isTrue();
Context.CONTEXT.set(context);
RequestContext rc = new RequestContext(route,
Collections.<Filter>emptyList(), Collections.<Interceptor<?>, Object>emptyMap(),
new Object[]{"value"}, null);
Result result = interceptor.call(add, rc);
assertThat(result.getStatusCode()).isEqualTo(Status.OK);
assertThat(context.session().get(CSRFServiceImplTest.CSRF_TOKEN)).isNotEqualTo(token);
}
@Test
public void testThatTokensAreNotAddedToRequestThatSetCacheHeaders() throws Exception {
when(add.newTokenOnEachRequest()).thenReturn(true);
FakeContext context = new FakeContext();
when(service.configuration.getBooleanWithDefault("token.sign", true)).thenReturn(true);
when(service.configuration.getWithDefault("token.name", "csrfToken"))
.thenReturn(CSRFServiceImplTest.CSRF_TOKEN);
final String token = service.crypto.generateSignedToken();
route = new Route(HttpMethod.GET, "/", controller, controller.getClass().getMethod("doSomething", String.class));
context
.setParameter("key", "value")
.setHeader(HeaderNames.CONTENT_TYPE, MimeTypes.FORM)
.setHeader(HeaderNames.CACHE_CONTROL, "public, max-age=3600")
.setHeader(HeaderNames.ACCEPT, MimeTypes.HTML)
.route(route);
assertThat(service.eligibleForCSRF(context)).isTrue();
Context.CONTEXT.set(context);
RequestContext rc = new RequestContext(route,
Collections.<Filter>emptyList(), Collections.<Interceptor<?>, Object>emptyMap(),
new Object[]{"value"}, null);
Result result = interceptor.call(add, rc);
assertThat(result.getStatusCode()).isEqualTo(Status.OK);
assertThat(context.session().get(CSRFServiceImplTest.CSRF_TOKEN)).isNull();
}
@Test
public void testThatTokensAreAddedToRequestThatSetCacheHeadersToNoCache() throws Exception {
when(add.newTokenOnEachRequest()).thenReturn(true);
FakeContext context = new FakeContext();
when(service.configuration.getBooleanWithDefault("token.sign", true)).thenReturn(true);
when(service.configuration.getWithDefault("token.name", "csrfToken"))
.thenReturn(CSRFServiceImplTest.CSRF_TOKEN);
route = new Route(HttpMethod.GET, "/", controller, controller.getClass().getMethod("doSomething", String.class));
context
.setParameter("key", "value")
.setHeader(HeaderNames.CONTENT_TYPE, MimeTypes.FORM)
.setHeader(HeaderNames.CACHE_CONTROL, HeaderNames.NOCACHE_VALUE)
.setHeader(HeaderNames.ACCEPT, MimeTypes.HTML)
.route(route);
assertThat(service.eligibleForCSRF(context)).isTrue();
Context.CONTEXT.set(context);
RequestContext rc = new RequestContext(route,
Collections.<Filter>emptyList(), Collections.<Interceptor<?>, Object>emptyMap(),
new Object[]{"value"}, null);
Result result = interceptor.call(add, rc);
assertThat(result.getStatusCode()).isEqualTo(Status.OK);
assertThat(context.session().get(CSRFServiceImplTest.CSRF_TOKEN)).isNotEmpty();
}
@Test
public void testThatHeadRequestAcceptingHTMLAreEligible() throws Exception {
FakeContext context = new FakeContext();
when(service.configuration.getBooleanWithDefault("token.sign", true)).thenReturn(true);
when(service.configuration.getWithDefault("token.name", "csrfToken"))
.thenReturn(CSRFServiceImplTest.CSRF_TOKEN);
route = new Route(HttpMethod.HEAD, "/", controller, controller.getClass().getMethod("doSomething", String.class));
context.setHeader(HeaderNames.ACCEPT, MimeTypes.HTML).route(route);
assertThat(service.eligibleForCSRF(context)).isTrue();
}
@Test
public void testThatHeadRequestNotAcceptingHTMLAreNotEligible() throws Exception {
FakeContext context = new FakeContext();
when(service.configuration.getBooleanWithDefault("token.sign", true)).thenReturn(true);
when(service.configuration.getWithDefault("token.name", "csrfToken"))
.thenReturn(CSRFServiceImplTest.CSRF_TOKEN);
route = new Route(HttpMethod.HEAD, "/", controller, controller.getClass().getMethod("doSomething", String.class));
context.setHeader(HeaderNames.ACCEPT, MimeTypes.JSON).route(route);
assertThat(service.eligibleForCSRF(context)).isFalse();
}
}