Browse Source
Previously if a MockMvc instance was setup with a user and then again with no user, then the original user would be setup. This commit ensures that if a user is setup and then no user is setup no user is used.pull/188/head
3 changed files with 183 additions and 7 deletions
@ -0,0 +1,164 @@ |
|||||||
|
/* |
||||||
|
* Copyright 2002-2015 the original author or authors. |
||||||
|
* |
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||||
|
* you may not use this file except in compliance with the License. |
||||||
|
* You may obtain a copy of the License at |
||||||
|
* |
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
* |
||||||
|
* Unless required by applicable law or agreed to in writing, software |
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS, |
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||||
|
* See the License for the specific language governing permissions and |
||||||
|
* limitations under the License. |
||||||
|
*/ |
||||||
|
package org.springframework.security.test.web.servlet.request; |
||||||
|
|
||||||
|
import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.user; |
||||||
|
import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.authenticated; |
||||||
|
import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.unauthenticated; |
||||||
|
import static org.springframework.security.test.web.servlet.setup.SecurityMockMvcConfigurers.springSecurity; |
||||||
|
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; |
||||||
|
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; |
||||||
|
|
||||||
|
import org.junit.Before; |
||||||
|
import org.junit.Ignore; |
||||||
|
import org.junit.Test; |
||||||
|
import org.junit.runner.RunWith; |
||||||
|
import org.springframework.beans.factory.annotation.Autowired; |
||||||
|
import org.springframework.context.annotation.Configuration; |
||||||
|
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; |
||||||
|
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
||||||
|
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
||||||
|
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; |
||||||
|
import org.springframework.security.test.context.support.WithMockUser; |
||||||
|
import org.springframework.test.context.ContextConfiguration; |
||||||
|
import org.springframework.test.context.junit4.SpringJUnit4ClassRunner; |
||||||
|
import org.springframework.test.context.web.WebAppConfiguration; |
||||||
|
import org.springframework.test.web.servlet.MockMvc; |
||||||
|
import org.springframework.test.web.servlet.setup.MockMvcBuilders; |
||||||
|
import org.springframework.web.context.WebApplicationContext; |
||||||
|
|
||||||
|
/** |
||||||
|
* @author Rob Winch |
||||||
|
*/ |
||||||
|
|
||||||
|
|
||||||
|
@RunWith(SpringJUnit4ClassRunner.class) |
||||||
|
@ContextConfiguration |
||||||
|
@WebAppConfiguration |
||||||
|
public class Sec2935Tests { |
||||||
|
|
||||||
|
@Autowired |
||||||
|
WebApplicationContext context; |
||||||
|
|
||||||
|
MockMvc mvc; |
||||||
|
|
||||||
|
@Before |
||||||
|
public void setup() { |
||||||
|
mvc = MockMvcBuilders.webAppContextSetup(context) |
||||||
|
.apply(springSecurity()) |
||||||
|
.build(); |
||||||
|
} |
||||||
|
|
||||||
|
// SEC-2935
|
||||||
|
@Test |
||||||
|
public void postProcessorUserNoUser() throws Exception { |
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc").with(user("user").roles("ADMIN","USER"))) |
||||||
|
.andExpect(status().isNotFound()) |
||||||
|
.andExpect(authenticated().withUsername("user")); |
||||||
|
|
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc")) |
||||||
|
.andExpect(status().isUnauthorized()) |
||||||
|
.andExpect(unauthenticated()); |
||||||
|
} |
||||||
|
|
||||||
|
@Test |
||||||
|
public void postProcessorUserOtherUser() throws Exception { |
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||||
|
.andExpect(status().isNotFound()) |
||||||
|
.andExpect(authenticated().withUsername("user1")); |
||||||
|
|
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc").with(user("user2").roles("USER"))) |
||||||
|
.andExpect(status().isForbidden()) |
||||||
|
.andExpect(authenticated().withUsername("user2")); |
||||||
|
} |
||||||
|
|
||||||
|
@WithMockUser |
||||||
|
@Test |
||||||
|
public void postProcessorUserWithMockUser() throws Exception { |
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||||
|
.andExpect(status().isNotFound()) |
||||||
|
.andExpect(authenticated().withUsername("user1")); |
||||||
|
|
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc")) |
||||||
|
.andExpect(status().isForbidden()) |
||||||
|
.andExpect(authenticated().withUsername("user")); |
||||||
|
} |
||||||
|
|
||||||
|
@Ignore |
||||||
|
@Test |
||||||
|
public void defaultRequest() throws Exception { |
||||||
|
mvc = MockMvcBuilders.webAppContextSetup(context) |
||||||
|
.apply(springSecurity()) |
||||||
|
.defaultRequest(get("/").with(user("default"))) |
||||||
|
.build(); |
||||||
|
|
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||||
|
.andExpect(status().isNotFound()) |
||||||
|
.andExpect(authenticated().withUsername("user1")); |
||||||
|
|
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc")) |
||||||
|
.andExpect(status().isForbidden()) |
||||||
|
.andExpect(authenticated().withUsername("default")); |
||||||
|
} |
||||||
|
|
||||||
|
@Ignore |
||||||
|
@WithMockUser |
||||||
|
@Test |
||||||
|
public void defaultRequestOverridesWithMockUser() throws Exception { |
||||||
|
mvc = MockMvcBuilders.webAppContextSetup(context) |
||||||
|
.apply(springSecurity()) |
||||||
|
.defaultRequest(get("/").with(user("default"))) |
||||||
|
.build(); |
||||||
|
|
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER"))) |
||||||
|
.andExpect(status().isNotFound()) |
||||||
|
.andExpect(authenticated().withUsername("user1")); |
||||||
|
|
||||||
|
mvc |
||||||
|
.perform(get("/admin/abc")) |
||||||
|
.andExpect(status().isForbidden()) |
||||||
|
.andExpect(authenticated().withUsername("default")); |
||||||
|
} |
||||||
|
|
||||||
|
@EnableWebSecurity |
||||||
|
@Configuration |
||||||
|
static class Config extends WebSecurityConfigurerAdapter { |
||||||
|
|
||||||
|
@Override |
||||||
|
protected void configure(HttpSecurity http) throws Exception { |
||||||
|
http |
||||||
|
.authorizeRequests() |
||||||
|
.antMatchers("/admin/**").hasRole("ADMIN") |
||||||
|
.anyRequest().authenticated() |
||||||
|
.and() |
||||||
|
.httpBasic(); |
||||||
|
} |
||||||
|
|
||||||
|
@Autowired |
||||||
|
public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception { |
||||||
|
auth.inMemoryAuthentication(); |
||||||
|
} |
||||||
|
} |
||||||
|
} |
||||||
Loading…
Reference in new issue