mirror of
https://github.com/google/nomulus.git
synced 2025-05-02 13:07:50 +02:00
98 lines
3.2 KiB
Java
98 lines
3.2 KiB
Java
// Copyright 2017 The Nomulus Authors. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package google.registry.security;
|
|
|
|
import static com.google.common.truth.Truth.assertThat;
|
|
import static google.registry.util.DateTimeUtils.START_OF_TIME;
|
|
|
|
import com.google.appengine.api.users.User;
|
|
import com.google.common.base.Splitter;
|
|
import google.registry.testing.AppEngineRule;
|
|
import google.registry.testing.FakeClock;
|
|
import google.registry.testing.FakeUserService;
|
|
import google.registry.testing.InjectRule;
|
|
import org.joda.time.Duration;
|
|
import org.junit.Before;
|
|
import org.junit.Rule;
|
|
import org.junit.Test;
|
|
import org.junit.runner.RunWith;
|
|
import org.junit.runners.JUnit4;
|
|
|
|
/** Tests for {@link XsrfTokenManager}. */
|
|
@RunWith(JUnit4.class)
|
|
public class XsrfTokenManagerTest {
|
|
|
|
@Rule
|
|
public final AppEngineRule appEngine = AppEngineRule.builder()
|
|
.withDatastore()
|
|
.build();
|
|
|
|
@Rule
|
|
public InjectRule inject = new InjectRule();
|
|
|
|
private final User testUser = new User("test@example.com", "test@example.com");
|
|
private final FakeClock clock = new FakeClock(START_OF_TIME);
|
|
private final FakeUserService userService = new FakeUserService();
|
|
private final XsrfTokenManager xsrfTokenManager = new XsrfTokenManager(clock, userService);
|
|
|
|
private String token;
|
|
|
|
@Before
|
|
public void init() {
|
|
userService.setUser(testUser, false);
|
|
token = xsrfTokenManager.generateToken(testUser.getEmail());
|
|
}
|
|
|
|
@Test
|
|
public void testValidate_validToken() {
|
|
assertThat(xsrfTokenManager.validateToken(token)).isTrue();
|
|
}
|
|
|
|
@Test
|
|
public void testValidate_tokenWithMissingParts() {
|
|
assertThat(xsrfTokenManager.validateToken("1:123")).isFalse();
|
|
}
|
|
|
|
@Test
|
|
public void testValidate_tokenWithBadVersion() {
|
|
assertThat(xsrfTokenManager.validateToken("2:123:base64")).isFalse();
|
|
}
|
|
|
|
@Test
|
|
public void testValidate_tokenWithBadNumberTimestamp() {
|
|
assertThat(xsrfTokenManager.validateToken("1:notanumber:base64")).isFalse();
|
|
}
|
|
|
|
@Test
|
|
public void testValidate_tokenExpiresAfterOneDay() {
|
|
clock.advanceBy(Duration.standardDays(1));
|
|
assertThat(xsrfTokenManager.validateToken(token)).isTrue();
|
|
clock.advanceOneMilli();
|
|
assertThat(xsrfTokenManager.validateToken(token)).isFalse();
|
|
}
|
|
|
|
@Test
|
|
public void testValidate_tokenTimestampTamperedWith() {
|
|
String encodedPart = Splitter.on(':').splitToList(token).get(2);
|
|
long fakeTimestamp = clock.nowUtc().plusMillis(1).getMillis();
|
|
assertThat(xsrfTokenManager.validateToken("1:" + fakeTimestamp + ":" + encodedPart)).isFalse();
|
|
}
|
|
|
|
@Test
|
|
public void testValidate_tokenForDifferentUser() {
|
|
String otherToken = xsrfTokenManager.generateToken("eve@example.com");
|
|
assertThat(xsrfTokenManager.validateToken(otherToken)).isFalse();
|
|
}
|
|
}
|