|
@@ -0,0 +1,164 @@
|
|
|
+/*
|
|
|
+ * Copyright 2002-2015 the original author or authors.
|
|
|
+ *
|
|
|
+ * Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
+ * you may not use this file except in compliance with the License.
|
|
|
+ * You may obtain a copy of the License at
|
|
|
+ *
|
|
|
+ * http://www.apache.org/licenses/LICENSE-2.0
|
|
|
+ *
|
|
|
+ * Unless required by applicable law or agreed to in writing, software
|
|
|
+ * distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
+ * See the License for the specific language governing permissions and
|
|
|
+ * limitations under the License.
|
|
|
+ */
|
|
|
+package org.springframework.security.test.web.servlet.request;
|
|
|
+
|
|
|
+import static org.springframework.security.test.web.servlet.request.SecurityMockMvcRequestPostProcessors.user;
|
|
|
+import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.authenticated;
|
|
|
+import static org.springframework.security.test.web.servlet.response.SecurityMockMvcResultMatchers.unauthenticated;
|
|
|
+import static org.springframework.security.test.web.servlet.setup.SecurityMockMvcConfigurers.springSecurity;
|
|
|
+import static org.springframework.test.web.servlet.request.MockMvcRequestBuilders.get;
|
|
|
+import static org.springframework.test.web.servlet.result.MockMvcResultMatchers.status;
|
|
|
+
|
|
|
+import org.junit.Before;
|
|
|
+import org.junit.Ignore;
|
|
|
+import org.junit.Test;
|
|
|
+import org.junit.runner.RunWith;
|
|
|
+import org.springframework.beans.factory.annotation.Autowired;
|
|
|
+import org.springframework.context.annotation.Configuration;
|
|
|
+import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder;
|
|
|
+import org.springframework.security.config.annotation.web.builders.HttpSecurity;
|
|
|
+import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
|
|
|
+import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
|
|
|
+import org.springframework.security.test.context.support.WithMockUser;
|
|
|
+import org.springframework.test.context.ContextConfiguration;
|
|
|
+import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;
|
|
|
+import org.springframework.test.context.web.WebAppConfiguration;
|
|
|
+import org.springframework.test.web.servlet.MockMvc;
|
|
|
+import org.springframework.test.web.servlet.setup.MockMvcBuilders;
|
|
|
+import org.springframework.web.context.WebApplicationContext;
|
|
|
+
|
|
|
+/**
|
|
|
+ * @author Rob Winch
|
|
|
+ */
|
|
|
+
|
|
|
+
|
|
|
+@RunWith(SpringJUnit4ClassRunner.class)
|
|
|
+@ContextConfiguration
|
|
|
+@WebAppConfiguration
|
|
|
+public class Sec2935Tests {
|
|
|
+
|
|
|
+ @Autowired
|
|
|
+ WebApplicationContext context;
|
|
|
+
|
|
|
+ MockMvc mvc;
|
|
|
+
|
|
|
+ @Before
|
|
|
+ public void setup() {
|
|
|
+ mvc = MockMvcBuilders.webAppContextSetup(context)
|
|
|
+ .apply(springSecurity())
|
|
|
+ .build();
|
|
|
+ }
|
|
|
+
|
|
|
+ // SEC-2935
|
|
|
+ @Test
|
|
|
+ public void postProcessorUserNoUser() throws Exception {
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc").with(user("user").roles("ADMIN","USER")))
|
|
|
+ .andExpect(status().isNotFound())
|
|
|
+ .andExpect(authenticated().withUsername("user"));
|
|
|
+
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc"))
|
|
|
+ .andExpect(status().isUnauthorized())
|
|
|
+ .andExpect(unauthenticated());
|
|
|
+ }
|
|
|
+
|
|
|
+ @Test
|
|
|
+ public void postProcessorUserOtherUser() throws Exception {
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER")))
|
|
|
+ .andExpect(status().isNotFound())
|
|
|
+ .andExpect(authenticated().withUsername("user1"));
|
|
|
+
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc").with(user("user2").roles("USER")))
|
|
|
+ .andExpect(status().isForbidden())
|
|
|
+ .andExpect(authenticated().withUsername("user2"));
|
|
|
+ }
|
|
|
+
|
|
|
+ @WithMockUser
|
|
|
+ @Test
|
|
|
+ public void postProcessorUserWithMockUser() throws Exception {
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER")))
|
|
|
+ .andExpect(status().isNotFound())
|
|
|
+ .andExpect(authenticated().withUsername("user1"));
|
|
|
+
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc"))
|
|
|
+ .andExpect(status().isForbidden())
|
|
|
+ .andExpect(authenticated().withUsername("user"));
|
|
|
+ }
|
|
|
+
|
|
|
+ @Ignore
|
|
|
+ @Test
|
|
|
+ public void defaultRequest() throws Exception {
|
|
|
+ mvc = MockMvcBuilders.webAppContextSetup(context)
|
|
|
+ .apply(springSecurity())
|
|
|
+ .defaultRequest(get("/").with(user("default")))
|
|
|
+ .build();
|
|
|
+
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER")))
|
|
|
+ .andExpect(status().isNotFound())
|
|
|
+ .andExpect(authenticated().withUsername("user1"));
|
|
|
+
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc"))
|
|
|
+ .andExpect(status().isForbidden())
|
|
|
+ .andExpect(authenticated().withUsername("default"));
|
|
|
+ }
|
|
|
+
|
|
|
+ @Ignore
|
|
|
+ @WithMockUser
|
|
|
+ @Test
|
|
|
+ public void defaultRequestOverridesWithMockUser() throws Exception {
|
|
|
+ mvc = MockMvcBuilders.webAppContextSetup(context)
|
|
|
+ .apply(springSecurity())
|
|
|
+ .defaultRequest(get("/").with(user("default")))
|
|
|
+ .build();
|
|
|
+
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc").with(user("user1").roles("ADMIN","USER")))
|
|
|
+ .andExpect(status().isNotFound())
|
|
|
+ .andExpect(authenticated().withUsername("user1"));
|
|
|
+
|
|
|
+ mvc
|
|
|
+ .perform(get("/admin/abc"))
|
|
|
+ .andExpect(status().isForbidden())
|
|
|
+ .andExpect(authenticated().withUsername("default"));
|
|
|
+ }
|
|
|
+
|
|
|
+ @EnableWebSecurity
|
|
|
+ @Configuration
|
|
|
+ static class Config extends WebSecurityConfigurerAdapter {
|
|
|
+
|
|
|
+ @Override
|
|
|
+ protected void configure(HttpSecurity http) throws Exception {
|
|
|
+ http
|
|
|
+ .authorizeRequests()
|
|
|
+ .antMatchers("/admin/**").hasRole("ADMIN")
|
|
|
+ .anyRequest().authenticated()
|
|
|
+ .and()
|
|
|
+ .httpBasic();
|
|
|
+ }
|
|
|
+
|
|
|
+ @Autowired
|
|
|
+ public void configureGlobal(AuthenticationManagerBuilder auth) throws Exception {
|
|
|
+ auth.inMemoryAuthentication();
|
|
|
+ }
|
|
|
+ }
|
|
|
+}
|