2016-01-25 16:15:54 +00:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @author Lukas Reschke <lukas@owncloud.com>
|
|
|
|
*
|
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2016-05-19 07:02:58 +00:00
|
|
|
namespace Test\Security\CSRF;
|
|
|
|
|
2016-01-25 16:15:54 +00:00
|
|
|
class CsrfTokenManagerTest extends \Test\TestCase {
|
|
|
|
/** @var \OC\Security\CSRF\CsrfTokenManager */
|
|
|
|
private $csrfTokenManager;
|
|
|
|
/** @var \OC\Security\CSRF\CsrfTokenGenerator */
|
|
|
|
private $tokenGenerator;
|
|
|
|
/** @var \OC\Security\CSRF\TokenStorage\SessionStorage */
|
|
|
|
private $storageInterface;
|
|
|
|
|
|
|
|
public function setUp() {
|
|
|
|
parent::setUp();
|
|
|
|
$this->tokenGenerator = $this->getMockBuilder('\OC\Security\CSRF\CsrfTokenGenerator')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->storageInterface = $this->getMockBuilder('\OC\Security\CSRF\TokenStorage\SessionStorage')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
|
|
|
|
$this->csrfTokenManager = new \OC\Security\CSRF\CsrfTokenManager(
|
|
|
|
$this->tokenGenerator,
|
|
|
|
$this->storageInterface
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testGetTokenWithExistingToken() {
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('hasToken')
|
|
|
|
->willReturn(true);
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getToken')
|
|
|
|
->willReturn('MyExistingToken');
|
|
|
|
|
|
|
|
$expected = new \OC\Security\CSRF\CsrfToken('MyExistingToken');
|
|
|
|
$this->assertEquals($expected, $this->csrfTokenManager->getToken());
|
|
|
|
}
|
|
|
|
|
2016-10-24 09:00:00 +00:00
|
|
|
public function testGetTokenWithExistingTokenKeepsOnSecondRequest() {
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('hasToken')
|
|
|
|
->willReturn(true);
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getToken')
|
|
|
|
->willReturn('MyExistingToken');
|
|
|
|
|
|
|
|
$expected = new \OC\Security\CSRF\CsrfToken('MyExistingToken');
|
|
|
|
$token = $this->csrfTokenManager->getToken();
|
|
|
|
$this->assertSame($token, $this->csrfTokenManager->getToken());
|
|
|
|
$this->assertSame($token, $this->csrfTokenManager->getToken());
|
|
|
|
}
|
|
|
|
|
2016-01-25 16:15:54 +00:00
|
|
|
public function testGetTokenWithoutExistingToken() {
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('hasToken')
|
|
|
|
->willReturn(false);
|
|
|
|
$this->tokenGenerator
|
|
|
|
->expects($this->once())
|
|
|
|
->method('generateToken')
|
|
|
|
->willReturn('MyNewToken');
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('setToken')
|
|
|
|
->with('MyNewToken');
|
|
|
|
|
|
|
|
$expected = new \OC\Security\CSRF\CsrfToken('MyNewToken');
|
|
|
|
$this->assertEquals($expected, $this->csrfTokenManager->getToken());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testRefreshToken() {
|
|
|
|
$this->tokenGenerator
|
|
|
|
->expects($this->once())
|
|
|
|
->method('generateToken')
|
|
|
|
->willReturn('MyNewToken');
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('setToken')
|
|
|
|
->with('MyNewToken');
|
|
|
|
|
|
|
|
$expected = new \OC\Security\CSRF\CsrfToken('MyNewToken');
|
|
|
|
$this->assertEquals($expected, $this->csrfTokenManager->refreshToken());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testRemoveToken() {
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('removeToken');
|
|
|
|
|
|
|
|
$this->csrfTokenManager->removeToken();
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testIsTokenValidWithoutToken() {
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('hasToken')
|
|
|
|
->willReturn(false);
|
|
|
|
$token = new \OC\Security\CSRF\CsrfToken('Token');
|
|
|
|
|
|
|
|
$this->assertSame(false, $this->csrfTokenManager->isTokenValid($token));
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testIsTokenValidWithWrongToken() {
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('hasToken')
|
|
|
|
->willReturn(true);
|
|
|
|
$token = new \OC\Security\CSRF\CsrfToken('Token');
|
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getToken')
|
|
|
|
->willReturn('MyToken');
|
|
|
|
|
|
|
|
$this->assertSame(false, $this->csrfTokenManager->isTokenValid($token));
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testIsTokenValidWithValidToken() {
|
2016-10-31 17:22:42 +00:00
|
|
|
$a = 'abc';
|
|
|
|
$b = 'def';
|
|
|
|
$xorB64 = 'BQcF';
|
|
|
|
$tokenVal = sprintf('%s:%s', $xorB64, base64_encode($a));
|
2016-01-25 16:15:54 +00:00
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('hasToken')
|
|
|
|
->willReturn(true);
|
2016-10-31 17:22:42 +00:00
|
|
|
$token = new \OC\Security\CSRF\CsrfToken($tokenVal);
|
2016-01-25 16:15:54 +00:00
|
|
|
$this->storageInterface
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getToken')
|
2016-10-31 17:22:42 +00:00
|
|
|
->willReturn($b);
|
2016-01-25 16:15:54 +00:00
|
|
|
|
|
|
|
$this->assertSame(true, $this->csrfTokenManager->isTokenValid($token));
|
|
|
|
}
|
|
|
|
}
|