2 changed files with 515 additions and 391 deletions
@ -1,391 +0,0 @@
@@ -1,391 +0,0 @@
|
||||
/* |
||||
* Copyright 2002-2015 the original author or authors. |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* https://www.apache.org/licenses/LICENSE-2.0 |
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.springframework.security.config.annotation.web.configurers |
||||
|
||||
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; |
||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
||||
import org.springframework.security.config.annotation.web.configuration.BaseWebConfig; |
||||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
||||
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter |
||||
import org.springframework.security.web.authentication.logout.LogoutHandler; |
||||
|
||||
import javax.servlet.http.Cookie |
||||
|
||||
import org.springframework.context.annotation.Bean; |
||||
import org.springframework.context.annotation.Configuration |
||||
import org.springframework.mock.web.MockFilterChain |
||||
import org.springframework.mock.web.MockHttpServletRequest; |
||||
import org.springframework.mock.web.MockHttpServletResponse |
||||
import org.springframework.mock.web.MockHttpSession |
||||
import org.springframework.security.authentication.AuthenticationManager |
||||
import org.springframework.security.authentication.RememberMeAuthenticationToken; |
||||
import org.springframework.security.config.annotation.BaseSpringSpec |
||||
import org.springframework.security.core.authority.AuthorityUtils; |
||||
import org.springframework.security.core.context.SecurityContext |
||||
import org.springframework.security.core.userdetails.UserDetailsService |
||||
import org.springframework.security.web.FilterChainProxy |
||||
import org.springframework.security.web.authentication.AuthenticationSuccessHandler |
||||
import org.springframework.security.web.authentication.RememberMeServices |
||||
import org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter |
||||
import org.springframework.security.web.authentication.rememberme.AbstractRememberMeServices |
||||
import org.springframework.security.web.authentication.rememberme.PersistentTokenBasedRememberMeServices; |
||||
import org.springframework.security.web.authentication.rememberme.PersistentTokenRepository; |
||||
import org.springframework.security.web.authentication.rememberme.RememberMeAuthenticationFilter |
||||
import org.springframework.security.web.context.HttpRequestResponseHolder |
||||
import org.springframework.security.web.context.HttpSessionSecurityContextRepository |
||||
import org.springframework.test.util.ReflectionTestUtils; |
||||
|
||||
/** |
||||
* Tests to verify that all the functionality of <anonymous> attributes is present |
||||
* |
||||
* @author Rob Winch |
||||
* |
||||
*/ |
||||
public class NamespaceRememberMeTests extends BaseSpringSpec { |
||||
|
||||
def "http/remember-me"() { |
||||
setup: |
||||
loadConfig(RememberMeConfig) |
||||
when: "login with remember me" |
||||
super.setup() |
||||
request.servletPath = "/login" |
||||
request.method = "POST" |
||||
request.parameters.username = ["user"] as String[] |
||||
request.parameters.password = ["password"] as String[] |
||||
request.parameters.'remember-me' = ["true"] as String[] |
||||
springSecurityFilterChain.doFilter(request,response,chain) |
||||
Cookie rememberMeCookie = getRememberMeCookie() |
||||
then: "response contains remember me cookie" |
||||
rememberMeCookie != null |
||||
when: "session expires" |
||||
super.setup() |
||||
request.setCookies(rememberMeCookie) |
||||
request.requestURI = "/abc" |
||||
springSecurityFilterChain.doFilter(request,response,chain) |
||||
MockHttpSession session = request.getSession() |
||||
then: "initialized to RememberMeAuthenticationToken" |
||||
SecurityContext context = new HttpSessionSecurityContextRepository().loadContext(new HttpRequestResponseHolder(request, response)) |
||||
context.getAuthentication() instanceof RememberMeAuthenticationToken |
||||
when: "logout" |
||||
super.setup() |
||||
request.setSession(session) |
||||
super.setupCsrf() |
||||
request.setCookies(rememberMeCookie) |
||||
request.servletPath = "/logout" |
||||
request.method = "POST" |
||||
springSecurityFilterChain.doFilter(request,response,chain) |
||||
rememberMeCookie = getRememberMeCookie() |
||||
then: "logout cookie expired" |
||||
response.getRedirectedUrl() == "/login?logout" |
||||
rememberMeCookie.maxAge == 0 |
||||
when: "use remember me after logout" |
||||
super.setup() |
||||
request.setCookies(rememberMeCookie) |
||||
request.requestURI = "/abc" |
||||
springSecurityFilterChain.doFilter(request,response,chain) |
||||
then: "sent to default login page" |
||||
response.getRedirectedUrl() == "http://localhost/login" |
||||
} |
||||
|
||||
@Configuration |
||||
static class RememberMeConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.authorizeRequests() |
||||
.anyRequest().hasRole("USER") |
||||
.and() |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
} |
||||
} |
||||
|
||||
// See SEC-3170 |
||||
static interface RememberMeServicesLogoutHandler extends RememberMeServices, LogoutHandler{} |
||||
|
||||
def "http/remember-me@services-ref"() { |
||||
setup: |
||||
RememberMeServicesRefConfig.REMEMBER_ME_SERVICES = Mock(RememberMeServicesLogoutHandler) |
||||
when: "use custom remember-me services" |
||||
loadConfig(RememberMeServicesRefConfig) |
||||
then: "custom remember-me services used" |
||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices == RememberMeServicesRefConfig.REMEMBER_ME_SERVICES |
||||
findFilter(UsernamePasswordAuthenticationFilter).rememberMeServices == RememberMeServicesRefConfig.REMEMBER_ME_SERVICES |
||||
} |
||||
|
||||
@Configuration |
||||
static class RememberMeServicesRefConfig extends BaseWebConfig { |
||||
static RememberMeServices REMEMBER_ME_SERVICES |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.rememberMeServices(REMEMBER_ME_SERVICES) |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me@authentication-success-handler-ref"() { |
||||
setup: |
||||
AuthSuccessConfig.SUCCESS_HANDLER = Mock(AuthenticationSuccessHandler) |
||||
when: "use custom success handler" |
||||
loadConfig(AuthSuccessConfig) |
||||
then: "custom remember-me success handler is used" |
||||
findFilter(RememberMeAuthenticationFilter).successHandler == AuthSuccessConfig.SUCCESS_HANDLER |
||||
} |
||||
|
||||
@Configuration |
||||
static class AuthSuccessConfig extends BaseWebConfig { |
||||
static AuthenticationSuccessHandler SUCCESS_HANDLER |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.authenticationSuccessHandler(SUCCESS_HANDLER) |
||||
} |
||||
} |
||||
|
||||
// http/remember-me@data-source-ref is not supported directly. Instead use http/remember-me@token-repository-ref example |
||||
|
||||
def "http/remember-me@key"() { |
||||
when: "use custom key" |
||||
loadConfig(KeyConfig) |
||||
AuthenticationManager authManager = context.getBean(AuthenticationManager) |
||||
then: "custom key services used" |
||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.key == "KeyConfig" |
||||
authManager.authenticate(new RememberMeAuthenticationToken("KeyConfig", "user", AuthorityUtils.createAuthorityList("ROLE_USER"))) |
||||
} |
||||
|
||||
@Configuration |
||||
static class KeyConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.key("KeyConfig") |
||||
} |
||||
|
||||
@Bean |
||||
@Override |
||||
public AuthenticationManager authenticationManagerBean() |
||||
throws Exception { |
||||
return super.authenticationManagerBean(); |
||||
} |
||||
} |
||||
|
||||
// http/remember-me@services-alias is not supported use standard aliasing instead (i.e. @Bean("alias")) |
||||
|
||||
def "http/remember-me@token-repository-ref"() { |
||||
setup: |
||||
TokenRepositoryRefConfig.TOKEN_REPOSITORY = Mock(PersistentTokenRepository) |
||||
when: "use custom token services" |
||||
loadConfig(TokenRepositoryRefConfig) |
||||
then: "custom token services used with PersistentTokenBasedRememberMeServices" |
||||
PersistentTokenBasedRememberMeServices rememberMeServices = findFilter(RememberMeAuthenticationFilter).rememberMeServices |
||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.tokenRepository == TokenRepositoryRefConfig.TOKEN_REPOSITORY |
||||
} |
||||
|
||||
@Configuration |
||||
static class TokenRepositoryRefConfig extends BaseWebConfig { |
||||
static PersistentTokenRepository TOKEN_REPOSITORY |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// JdbcTokenRepositoryImpl tokenRepository = new JdbcTokenRepositoryImpl() |
||||
// tokenRepository.setDataSource(dataSource); |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.tokenRepository(TOKEN_REPOSITORY) |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me@token-validity-seconds"() { |
||||
when: "use token validity" |
||||
loadConfig(TokenValiditySecondsConfig) |
||||
then: "custom token validity used" |
||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.tokenValiditySeconds == 1 |
||||
} |
||||
|
||||
@Configuration |
||||
static class TokenValiditySecondsConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.tokenValiditySeconds(1) |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me@token-validity-seconds default"() { |
||||
when: "use token validity" |
||||
loadConfig(DefaultTokenValiditySecondsConfig) |
||||
then: "custom token validity used" |
||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.tokenValiditySeconds == AbstractRememberMeServices.TWO_WEEKS_S |
||||
} |
||||
|
||||
@Configuration |
||||
static class DefaultTokenValiditySecondsConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me@use-secure-cookie"() { |
||||
when: "use secure cookies = true" |
||||
loadConfig(UseSecureCookieConfig) |
||||
then: "secure cookies will be used" |
||||
ReflectionTestUtils.getField(findFilter(RememberMeAuthenticationFilter).rememberMeServices, "useSecureCookie") == true |
||||
} |
||||
|
||||
@Configuration |
||||
static class UseSecureCookieConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.useSecureCookie(true) |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me@remember-me-parameter"() { |
||||
when: "use custom rememberMeParameter" |
||||
loadConfig(RememberMeParameterConfig) |
||||
then: "custom rememberMeParameter will be used" |
||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.parameter == "rememberMe" |
||||
} |
||||
|
||||
@Configuration |
||||
static class RememberMeParameterConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.rememberMeParameter("rememberMe") |
||||
} |
||||
} |
||||
|
||||
// SEC-2880 |
||||
def "http/remember-me@remember-me-cookie"() { |
||||
when: "use custom rememberMeCookieName" |
||||
loadConfig(RememberMeCookieNameConfig) |
||||
then: "custom rememberMeCookieName will be used" |
||||
findFilter(RememberMeAuthenticationFilter).rememberMeServices.cookieName == "rememberMe" |
||||
} |
||||
|
||||
@Configuration |
||||
static class RememberMeCookieNameConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.rememberMeCookieName("rememberMe") |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me@use-secure-cookie defaults"() { |
||||
when: "use secure cookies not specified" |
||||
loadConfig(DefaultUseSecureCookieConfig) |
||||
then: "secure cookies will be null (use secure if the request is secure)" |
||||
ReflectionTestUtils.getField(findFilter(RememberMeAuthenticationFilter).rememberMeServices, "useSecureCookie") == null |
||||
} |
||||
|
||||
@Configuration |
||||
static class DefaultUseSecureCookieConfig extends BaseWebConfig { |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me defaults UserDetailsService with custom UserDetailsService"() { |
||||
setup: |
||||
DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE = Mock(UserDetailsService) |
||||
loadConfig(DefaultsUserDetailsServiceWithDaoConfig) |
||||
when: |
||||
request.setCookies(createRememberMeCookie()) |
||||
springSecurityFilterChain.doFilter(request, response, chain) |
||||
then: "RememberMeServices defaults to the custom UserDetailsService" |
||||
1 * DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE.loadUserByUsername("user") |
||||
} |
||||
|
||||
@EnableWebSecurity |
||||
static class DefaultsUserDetailsServiceWithDaoConfig extends WebSecurityConfigurerAdapter { |
||||
static UserDetailsService USERDETAILS_SERVICE |
||||
|
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
} |
||||
|
||||
protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
||||
auth |
||||
.userDetailsService(USERDETAILS_SERVICE); |
||||
} |
||||
} |
||||
|
||||
def "http/remember-me@user-service-ref"() { |
||||
setup: |
||||
UserServiceRefConfig.USERDETAILS_SERVICE = Mock(UserDetailsService) |
||||
when: "use custom UserDetailsService" |
||||
loadConfig(UserServiceRefConfig) |
||||
then: "custom UserDetailsService is used" |
||||
ReflectionTestUtils.getField(findFilter(RememberMeAuthenticationFilter).rememberMeServices, "userDetailsService") == UserServiceRefConfig.USERDETAILS_SERVICE |
||||
} |
||||
|
||||
@Configuration |
||||
static class UserServiceRefConfig extends BaseWebConfig { |
||||
static UserDetailsService USERDETAILS_SERVICE |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.userDetailsService(USERDETAILS_SERVICE) |
||||
} |
||||
} |
||||
|
||||
Cookie createRememberMeCookie() { |
||||
MockHttpServletRequest request = new MockHttpServletRequest("GET", "") |
||||
MockHttpServletResponse response = new MockHttpServletResponse() |
||||
super.setupCsrf("CSRF_TOKEN", request, response) |
||||
|
||||
MockFilterChain chain = new MockFilterChain() |
||||
request.servletPath = "/login" |
||||
request.method = "POST" |
||||
request.parameters.username = ["user"] as String[] |
||||
request.parameters.password = ["password"] as String[] |
||||
request.parameters.'remember-me' = ["true"] as String[] |
||||
springSecurityFilterChain.doFilter(request, response, chain) |
||||
response.getCookie("remember-me") |
||||
} |
||||
|
||||
Cookie getRememberMeCookie(String cookieName="remember-me") { |
||||
response.getCookie(cookieName) |
||||
} |
||||
} |
||||
@ -0,0 +1,515 @@
@@ -0,0 +1,515 @@
|
||||
/* |
||||
* Copyright 2002-2019 the original author or authors. |
||||
* |
||||
* Licensed under the Apache License, Version 2.0 (the "License"); |
||||
* you may not use this file except in compliance with the License. |
||||
* You may obtain a copy of the License at |
||||
* |
||||
* https://www.apache.org/licenses/LICENSE-2.0
|
||||
* |
||||
* Unless required by applicable law or agreed to in writing, software |
||||
* distributed under the License is distributed on an "AS IS" BASIS, |
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
||||
* See the License for the specific language governing permissions and |
||||
* limitations under the License. |
||||
*/ |
||||
package org.springframework.security.config.annotation.web.configurers; |
||||
|
||||
import javax.servlet.http.Cookie; |
||||
import javax.servlet.http.HttpServletRequest; |
||||
import javax.servlet.http.HttpServletResponse; |
||||
|
||||
import org.junit.Rule; |
||||
import org.junit.Test; |
||||
|
||||
import org.springframework.beans.factory.annotation.Autowired; |
||||
import org.springframework.context.annotation.Bean; |
||||
import org.springframework.context.annotation.Configuration; |
||||
import org.springframework.core.annotation.Order; |
||||
import org.springframework.mock.web.MockHttpSession; |
||||
import org.springframework.security.authentication.RememberMeAuthenticationToken; |
||||
import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; |
||||
import org.springframework.security.config.annotation.web.builders.HttpSecurity; |
||||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; |
||||
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; |
||||
import org.springframework.security.config.test.SpringTestRule; |
||||
import org.springframework.security.core.Authentication; |
||||
import org.springframework.security.core.authority.AuthorityUtils; |
||||
import org.springframework.security.core.userdetails.User; |
||||
import org.springframework.security.core.userdetails.UserDetailsService; |
||||
import org.springframework.security.provisioning.InMemoryUserDetailsManager; |
||||
import org.springframework.security.web.authentication.AuthenticationSuccessHandler; |
||||
import org.springframework.security.web.authentication.RememberMeServices; |
||||
import org.springframework.security.web.authentication.rememberme.AbstractRememberMeServices; |
||||
import org.springframework.security.web.authentication.rememberme.PersistentRememberMeToken; |
||||
import org.springframework.security.web.authentication.rememberme.PersistentTokenRepository; |
||||
import org.springframework.test.web.servlet.MockMvc; |
||||
import org.springframework.test.web.servlet.MvcResult; |
||||
import org.springframework.test.web.servlet.request.RequestPostProcessor; |
||||
import org.springframework.web.bind.annotation.GetMapping; |
||||
import org.springframework.web.bind.annotation.RestController; |
||||
|
||||
import static org.assertj.core.api.Assertions.assertThat; |
||||
import static org.mockito.ArgumentMatchers.any; |
||||
import static org.mockito.Mockito.mock; |
||||
import static org.mockito.Mockito.verify; |
||||
import static org.mockito.Mockito.verifyZeroInteractions; |
||||
import static org.mockito.Mockito.when; |
||||
import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.csrf; |
||||
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get; |
||||
import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.post; |
||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.content; |
||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.redirectedUrl; |
||||
import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status; |
||||
|
||||
/** |
||||
* Tests to verify that all the functionality of <anonymous> attributes is present |
||||
* |
||||
* @author Rob Winch |
||||
* @author Josh Cummings |
||||
* |
||||
*/ |
||||
public class NamespaceRememberMeTests { |
||||
|
||||
@Rule |
||||
public final SpringTestRule spring = new SpringTestRule(); |
||||
|
||||
@Autowired |
||||
MockMvc mvc; |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenUsingDefaultsThenMatchesNamespace() throws Exception { |
||||
this.spring.register(RememberMeConfig.class, SecurityController.class).autowire(); |
||||
MvcResult result = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())) |
||||
.andReturn(); |
||||
|
||||
MockHttpSession session = (MockHttpSession) result.getRequest().getSession(); |
||||
Cookie rememberMe = result.getResponse().getCookie("remember-me"); |
||||
assertThat(rememberMe).isNotNull(); |
||||
this.mvc.perform(get("/authentication-class") |
||||
.cookie(rememberMe)) |
||||
.andExpect(content().string(RememberMeAuthenticationToken.class.getName())); |
||||
|
||||
result = this.mvc.perform(post("/logout").with(csrf()) |
||||
.session(session) |
||||
.cookie(rememberMe)) |
||||
.andExpect(redirectedUrl("/login?logout")) |
||||
.andReturn(); |
||||
|
||||
rememberMe = result.getResponse().getCookie("remember-me"); |
||||
assertThat(rememberMe).isNotNull().extracting("maxAge").containsExactly(0); |
||||
|
||||
this.mvc.perform(post("/authentication-class").with(csrf()) |
||||
.cookie(rememberMe)) |
||||
.andExpect(redirectedUrl("http://localhost/login")) |
||||
.andReturn(); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class RememberMeConfig extends UsersConfig { |
||||
|
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.authorizeRequests() |
||||
.anyRequest().hasRole("USER") |
||||
.and() |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe(); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
// SEC-3170 - RememberMeService implementations should not have to also implement LogoutHandler
|
||||
@Test |
||||
public void logoutWhenCustomRememberMeServicesDeclaredThenUses() throws Exception { |
||||
RememberMeServicesRefConfig.REMEMBER_ME_SERVICES = mock(RememberMeServicesWithoutLogoutHandler.class); |
||||
this.spring.register(RememberMeServicesRefConfig.class).autowire(); |
||||
|
||||
this.mvc.perform(get("/")); |
||||
verify(RememberMeServicesRefConfig.REMEMBER_ME_SERVICES) |
||||
.autoLogin(any(HttpServletRequest.class), any(HttpServletResponse.class)); |
||||
|
||||
this.mvc.perform(post("/login").with(csrf())); |
||||
verify(RememberMeServicesRefConfig.REMEMBER_ME_SERVICES) |
||||
.loginFail(any(HttpServletRequest.class), any(HttpServletResponse.class)); |
||||
} |
||||
|
||||
interface RememberMeServicesWithoutLogoutHandler extends RememberMeServices {} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class RememberMeServicesRefConfig extends WebSecurityConfigurerAdapter { |
||||
static RememberMeServices REMEMBER_ME_SERVICES; |
||||
|
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.rememberMeServices(REMEMBER_ME_SERVICES); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenAuthenticationSuccessHandlerDeclaredThenUses() throws Exception { |
||||
AuthSuccessConfig.SUCCESS_HANDLER = mock(AuthenticationSuccessHandler.class); |
||||
this.spring.register(AuthSuccessConfig.class).autowire(); |
||||
|
||||
MvcResult result = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())) |
||||
.andReturn(); |
||||
|
||||
verifyZeroInteractions(AuthSuccessConfig.SUCCESS_HANDLER); |
||||
|
||||
Cookie rememberMe = result.getResponse().getCookie("remember-me"); |
||||
assertThat(rememberMe).isNotNull(); |
||||
this.mvc.perform(get("/somewhere") |
||||
.cookie(rememberMe)); |
||||
|
||||
verify(AuthSuccessConfig.SUCCESS_HANDLER).onAuthenticationSuccess |
||||
(any(HttpServletRequest.class), any(HttpServletResponse.class), any(Authentication.class)); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class AuthSuccessConfig extends UsersConfig { |
||||
static AuthenticationSuccessHandler SUCCESS_HANDLER; |
||||
|
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.authenticationSuccessHandler(SUCCESS_HANDLER); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenKeyDeclaredThenMatchesNamespace() throws Exception { |
||||
this.spring.register(WithoutKeyConfig.class, KeyConfig.class, SecurityController.class).autowire(); |
||||
Cookie withoutKey = this.mvc.perform(post("/without-key/login") |
||||
.with(rememberMeLogin())) |
||||
.andExpect(redirectedUrl("/")) |
||||
.andReturn().getResponse().getCookie("remember-me"); |
||||
|
||||
this.mvc.perform(get("/somewhere") |
||||
.cookie(withoutKey)) |
||||
.andExpect(status().isFound()) |
||||
.andExpect(redirectedUrl("http://localhost/login")); |
||||
|
||||
Cookie withKey = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())) |
||||
.andReturn().getResponse().getCookie("remember-me"); |
||||
this.mvc.perform(get("/somewhere") |
||||
.cookie(withKey)) |
||||
.andExpect(status().isNotFound()); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
@Order(0) |
||||
static class WithoutKeyConfig extends UsersConfig { |
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.antMatcher("/without-key/**") |
||||
.formLogin() |
||||
.loginProcessingUrl("/without-key/login") |
||||
.and() |
||||
.rememberMe(); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class KeyConfig extends UsersConfig { |
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.authorizeRequests() |
||||
.anyRequest().authenticated() |
||||
.and() |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.key("KeyConfig"); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
// http/remember-me@services-alias is not supported use standard aliasing instead (i.e. @Bean("alias"))
|
||||
|
||||
// http/remember-me@data-source-ref is not supported directly. Instead use http/remember-me@token-repository-ref example
|
||||
@Test |
||||
public void rememberMeLoginWhenDeclaredTokenRepositoryThenMatchesNamespace() throws Exception { |
||||
TokenRepositoryRefConfig.TOKEN_REPOSITORY = mock(PersistentTokenRepository.class); |
||||
this.spring.register(TokenRepositoryRefConfig.class).autowire(); |
||||
|
||||
this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())); |
||||
|
||||
verify(TokenRepositoryRefConfig.TOKEN_REPOSITORY).createNewToken(any(PersistentRememberMeToken.class)); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class TokenRepositoryRefConfig extends UsersConfig { |
||||
static PersistentTokenRepository TOKEN_REPOSITORY; |
||||
|
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// JdbcTokenRepositoryImpl tokenRepository = new JdbcTokenRepositoryImpl()
|
||||
// tokenRepository.setDataSource(dataSource);
|
||||
|
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.tokenRepository(TOKEN_REPOSITORY); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenTokenValidityDeclaredThenMatchesNamespace() throws Exception { |
||||
this.spring.register(TokenValiditySecondsConfig.class).autowire(); |
||||
Cookie expiredRememberMe = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())) |
||||
.andReturn().getResponse().getCookie("remember-me"); |
||||
|
||||
assertThat(expiredRememberMe).extracting("maxAge").containsExactly(314); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class TokenValiditySecondsConfig extends UsersConfig { |
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.authorizeRequests() |
||||
.anyRequest().authenticated() |
||||
.and() |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.tokenValiditySeconds(314); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenUsingDefaultsThenCookieMaxAgeMatchesNamespace() throws Exception { |
||||
this.spring.register(RememberMeConfig.class).autowire(); |
||||
Cookie expiredRememberMe = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())) |
||||
.andReturn().getResponse().getCookie("remember-me"); |
||||
|
||||
assertThat(expiredRememberMe).extracting("maxAge") |
||||
.containsExactly(AbstractRememberMeServices.TWO_WEEKS_S); |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenUsingSecureCookieThenMatchesNamespace() throws Exception { |
||||
this.spring.register(UseSecureCookieConfig.class).autowire(); |
||||
Cookie secureCookie = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())) |
||||
.andReturn().getResponse().getCookie("remember-me"); |
||||
|
||||
assertThat(secureCookie).extracting("secure").containsExactly(true); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class UseSecureCookieConfig extends UsersConfig { |
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.useSecureCookie(true); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenUsingDefaultsThenCookieSecurityMatchesNamespace() throws Exception { |
||||
this.spring.register(RememberMeConfig.class).autowire(); |
||||
Cookie secureCookie = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin()) |
||||
.secure(true)) |
||||
.andReturn().getResponse().getCookie("remember-me"); |
||||
|
||||
assertThat(secureCookie).extracting("secure").containsExactly(true); |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenParameterSpecifiedThenMatchesNamespace() throws Exception { |
||||
this.spring.register(RememberMeParameterConfig.class).autowire(); |
||||
Cookie rememberMe = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin("rememberMe", true))) |
||||
.andReturn().getResponse().getCookie("remember-me"); |
||||
|
||||
assertThat(rememberMe).isNotNull(); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class RememberMeParameterConfig extends UsersConfig { |
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.rememberMeParameter("rememberMe"); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
// SEC-2880
|
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenCookieNameDeclaredThenMatchesNamespace() throws Exception { |
||||
this.spring.register(RememberMeCookieNameConfig.class).autowire(); |
||||
Cookie rememberMe = this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())) |
||||
.andReturn().getResponse().getCookie("rememberMe"); |
||||
|
||||
assertThat(rememberMe).isNotNull(); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class RememberMeCookieNameConfig extends UsersConfig { |
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.rememberMeCookieName("rememberMe"); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenGlobalUserDetailsServiceDeclaredThenMatchesNamespace() throws Exception { |
||||
DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE = mock(UserDetailsService.class); |
||||
this.spring.register(DefaultsUserDetailsServiceWithDaoConfig.class).autowire(); |
||||
|
||||
this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())); |
||||
|
||||
verify(DefaultsUserDetailsServiceWithDaoConfig.USERDETAILS_SERVICE) |
||||
.loadUserByUsername("user"); |
||||
} |
||||
|
||||
@EnableWebSecurity |
||||
@Configuration |
||||
static class DefaultsUserDetailsServiceWithDaoConfig extends WebSecurityConfigurerAdapter { |
||||
static UserDetailsService USERDETAILS_SERVICE; |
||||
|
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe(); |
||||
// @formatter:on
|
||||
} |
||||
|
||||
@Override |
||||
protected void configure(AuthenticationManagerBuilder auth) throws Exception { |
||||
auth |
||||
.userDetailsService(USERDETAILS_SERVICE); |
||||
} |
||||
} |
||||
|
||||
@Test |
||||
public void rememberMeLoginWhenUserDetailsServiceDeclaredThenMatchesNamespace() throws Exception { |
||||
UserServiceRefConfig.USERDETAILS_SERVICE = mock(UserDetailsService.class); |
||||
this.spring.register(UserServiceRefConfig.class).autowire(); |
||||
|
||||
when(UserServiceRefConfig.USERDETAILS_SERVICE.loadUserByUsername("user")) |
||||
.thenReturn(new User("user", "password", AuthorityUtils.createAuthorityList("ROLE_USER"))); |
||||
|
||||
this.mvc.perform(post("/login") |
||||
.with(rememberMeLogin())); |
||||
|
||||
verify(UserServiceRefConfig.USERDETAILS_SERVICE) |
||||
.loadUserByUsername("user"); |
||||
} |
||||
|
||||
@Configuration |
||||
@EnableWebSecurity |
||||
static class UserServiceRefConfig extends UsersConfig { |
||||
static UserDetailsService USERDETAILS_SERVICE; |
||||
|
||||
@Override |
||||
protected void configure(HttpSecurity http) throws Exception { |
||||
// @formatter:off
|
||||
http |
||||
.formLogin() |
||||
.and() |
||||
.rememberMe() |
||||
.userDetailsService(USERDETAILS_SERVICE); |
||||
// @formatter:on
|
||||
} |
||||
} |
||||
|
||||
static RequestPostProcessor rememberMeLogin() { |
||||
return rememberMeLogin("remember-me", true); |
||||
} |
||||
|
||||
static RequestPostProcessor rememberMeLogin(String parameterName, boolean parameterValue) { |
||||
return request -> { |
||||
csrf().postProcessRequest(request); |
||||
request.setParameter("username", "user"); |
||||
request.setParameter("password", "password"); |
||||
request.setParameter(parameterName, String.valueOf(parameterValue)); |
||||
return request; |
||||
}; |
||||
} |
||||
|
||||
static class UsersConfig extends WebSecurityConfigurerAdapter { |
||||
@Override |
||||
@Bean |
||||
public UserDetailsService userDetailsService() { |
||||
return new InMemoryUserDetailsManager( |
||||
User.withDefaultPasswordEncoder() |
||||
.username("user") |
||||
.password("password") |
||||
.roles("USER") |
||||
.build()); |
||||
} |
||||
} |
||||
|
||||
@RestController |
||||
static class SecurityController { |
||||
@GetMapping("/authentication-class") |
||||
String authenticationClass(Authentication authentication) { |
||||
return authentication.getClass().getName(); |
||||
} |
||||
} |
||||
} |
||||
Loading…
Reference in new issue