Browse Source
Previously if a MockMvc instance was setup with a user and then again with no user, then the original user would be setup. This commit ensures that if a user is setup and then no user is setup no user is used.pull/188/head
3 changed files with 183 additions and 7 deletions
@ -0,0 +1,164 @@
@@ -0,0 +1,164 @@
|
||||
/* |
||||
* Copyright 2002-2015 the original author or authors. |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.springframework.security.test.web.servlet.request; |
||||
|
||||
import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.user; |
||||
import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.authenticated; |
||||
import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.unauthenticated; |
||||
import static org.springframework.security.test.web.servlet.setup.SecurityMockMvcConfigurers.springSecurity; |
||||
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; |
||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; |
||||
|
||||
import org.junit.Before; |
||||
import org.junit.Ignore; |
||||
import org.junit.Test; |
||||
import org.junit.runner.RunWith; |
||||
import org.springframework.beans.factory.annotation.Autowired; |
||||
import org.springframework.context.annotation.Configuration; |
||||
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; |
||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
||||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
||||
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; |
||||
import org.springframework.security.test.context.support.WithMockUser; |
||||
import org.springframework.test.context.ContextConfiguration; |
||||
import org.springframework.test.context.junit4.SpringJUnit4ClassRunner; |
||||
import org.springframework.test.context.web.WebAppConfiguration; |
||||
import org.springframework.test.web.servlet.MockMvc; |
||||
import org.springframework.test.web.servlet.setup.MockMvcBuilders; |
||||
import org.springframework.web.context.WebApplicationContext; |
||||
|
||||
/** |
||||
* @author Rob Winch |
||||
*/ |
||||
|
||||
|
||||
@RunWith(SpringJUnit4ClassRunner.class) |
||||
@ContextConfiguration |
||||
@WebAppConfiguration |
||||
public class Sec2935Tests { |
||||
|
||||
@Autowired |
||||
WebApplicationContext context; |
||||
|
||||
MockMvc mvc; |
||||
|
||||
@Before |
||||
public void setup() { |
||||
mvc = MockMvcBuilders.webAppContextSetup(context) |
||||
.apply(springSecurity()) |
||||
.build(); |
||||
} |
||||
|
||||
// SEC-2935
|
||||
@Test |
||||
public void postProcessorUserNoUser() throws Exception { |
||||
mvc |
||||
.perform(get("/admin/abc").with(user("user").roles("ADMIN","USER"))) |
||||
.andExpect(status().isNotFound()) |
||||
.andExpect(authenticated().withUsername("user")); |
||||
|
||||
mvc |
||||
.perform(get("/admin/abc")) |
||||
.andExpect(status().isUnauthorized()) |
||||
.andExpect(unauthenticated()); |
||||
} |
||||
|
||||
@Test |
||||
public void postProcessorUserOtherUser() throws Exception { |
||||
mvc |
||||
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||
.andExpect(status().isNotFound()) |
||||
.andExpect(authenticated().withUsername("user1")); |
||||
|
||||
mvc |
||||
.perform(get("/admin/abc").with(user("user2").roles("USER"))) |
||||
.andExpect(status().isForbidden()) |
||||
.andExpect(authenticated().withUsername("user2")); |
||||
} |
||||
|
||||
@WithMockUser |
||||
@Test |
||||
public void postProcessorUserWithMockUser() throws Exception { |
||||
mvc |
||||
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||
.andExpect(status().isNotFound()) |
||||
.andExpect(authenticated().withUsername("user1")); |
||||
|
||||
mvc |
||||
.perform(get("/admin/abc")) |
||||
.andExpect(status().isForbidden()) |
||||
.andExpect(authenticated().withUsername("user")); |
||||
} |
||||
|
||||
@Ignore |
||||
@Test |
||||
public void defaultRequest() throws Exception { |
||||
mvc = MockMvcBuilders.webAppContextSetup(context) |
||||
.apply(springSecurity()) |
||||
.defaultRequest(get("/").with(user("default"))) |
||||
.build(); |
||||
|
||||
mvc |
||||
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||
.andExpect(status().isNotFound()) |
||||
.andExpect(authenticated().withUsername("user1")); |
||||
|
||||
mvc |
||||
.perform(get("/admin/abc")) |
||||
.andExpect(status().isForbidden()) |
||||
.andExpect(authenticated().withUsername("default")); |
||||
} |
||||
|
||||
@Ignore |
||||
@WithMockUser |
||||
@Test |
||||
public void defaultRequestOverridesWithMockUser() throws Exception { |
||||
mvc = MockMvcBuilders.webAppContextSetup(context) |
||||
.apply(springSecurity()) |
||||
.defaultRequest(get("/").with(user("default"))) |
||||
.build(); |
||||
|
||||
mvc |
||||
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||
.andExpect(status().isNotFound()) |
||||
.andExpect(authenticated().withUsername("user1")); |
||||
|
||||
mvc |
||||
.perform(get("/admin/abc")) |
||||
.andExpect(status().isForbidden()) |
||||
.andExpect(authenticated().withUsername("default")); |
||||
} |
||||
|
||||
@EnableWebSecurity |
||||
@Configuration |
||||
static class Config extends WebSecurityConfigurerAdapter { |
||||
|
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.authorizeRequests() |
||||
.antMatchers("/admin/**").hasRole("ADMIN") |
||||
.anyRequest().authenticated() |
||||
.and() |
||||
.httpBasic(); |
||||
} |
||||
|
||||
@Autowired |
||||
public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception { |
||||
auth.inMemoryAuthentication(); |
||||
} |
||||
} |
||||
} |
||||
Loading…
Reference in new issue