353 lines
10 KiB
C#
353 lines
10 KiB
C#
using System;
|
|
using System.Collections.Generic;
|
|
using System.Net;
|
|
using System.Security.Claims;
|
|
using System.Text;
|
|
using System.Threading;
|
|
using System.Threading.Tasks;
|
|
using AMWD.Common.AspNetCore.Security.BasicAuthentication;
|
|
using Microsoft.AspNetCore.Authorization;
|
|
using Microsoft.AspNetCore.Http;
|
|
using Microsoft.AspNetCore.Mvc;
|
|
using Microsoft.AspNetCore.Mvc.Abstractions;
|
|
using Microsoft.AspNetCore.Mvc.Filters;
|
|
using Microsoft.AspNetCore.Routing;
|
|
using Microsoft.Extensions.Primitives;
|
|
using Moq;
|
|
|
|
namespace AMWD.Common.AspNetCore.Tests.Attributes
|
|
{
|
|
[TestClass]
|
|
public class BasicAuthenticationAttributeTest
|
|
{
|
|
private Mock<IHeaderDictionary> _requestHeaderMock;
|
|
private Mock<IHeaderDictionary> _responseHeaderMock;
|
|
|
|
private Mock<HttpRequest> _requestMock;
|
|
private Mock<HttpResponse> _responseMock;
|
|
|
|
private Mock<HttpContext> _contextMock;
|
|
|
|
private Dictionary<string, string> _requestHeaders;
|
|
private string _validatorRealm;
|
|
private ClaimsPrincipal _validatorResult;
|
|
|
|
private string _responseHeaderAuthCallback;
|
|
|
|
[TestInitialize]
|
|
public void InitializeTest()
|
|
{
|
|
_requestHeaders = [];
|
|
_validatorRealm = null;
|
|
_validatorResult = null;
|
|
|
|
_responseHeaderAuthCallback = null;
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldValidateViaUsernamePassword()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute
|
|
{
|
|
Username = "user",
|
|
Password = "password"
|
|
};
|
|
_requestHeaders.Add("Authorization", $"Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes($"{attribute.Username}:{attribute.Password}"))}");
|
|
|
|
var context = GetContext();
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNull(context.Result);
|
|
Assert.IsTrue(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldValidateViaValidator()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute();
|
|
_requestHeaders.Add("Authorization", $"Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes($"{attribute.Username}:{attribute.Password}"))}");
|
|
_validatorResult = new ClaimsPrincipal();
|
|
|
|
var context = GetContext(hasValidator: true);
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNull(context.Result);
|
|
Assert.IsTrue(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldAllowAnonymous()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute
|
|
{
|
|
Username = "user",
|
|
Password = "password"
|
|
};
|
|
var context = GetContext(isAnonymousAllowed: true);
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNull(context.Result);
|
|
Assert.IsTrue(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldAskOnUsernamePasswordWithoutRealm()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute
|
|
{
|
|
Username = "user",
|
|
Password = "password"
|
|
};
|
|
var context = GetContext();
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNotNull(context.Result);
|
|
Assert.IsTrue(context.Result is StatusCodeResult);
|
|
Assert.AreEqual(401, ((StatusCodeResult)context.Result).StatusCode);
|
|
|
|
Assert.IsFalse(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
Assert.AreEqual("Basic", _responseHeaderAuthCallback);
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldAskOnUsernamePasswordWithRealm()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute
|
|
{
|
|
Username = "user",
|
|
Password = "password",
|
|
Realm = "re:al\"m"
|
|
};
|
|
var context = GetContext();
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNotNull(context.Result);
|
|
Assert.IsTrue(context.Result is StatusCodeResult);
|
|
Assert.AreEqual(401, ((StatusCodeResult)context.Result).StatusCode);
|
|
|
|
Assert.IsFalse(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
Assert.AreEqual("Basic realm=\"re:alm\"", _responseHeaderAuthCallback);
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldAskOnUsernamePasswordWrongUser()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute
|
|
{
|
|
Username = "user",
|
|
Password = "password"
|
|
};
|
|
_requestHeaders.Add("Authorization", $"Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes($"{attribute.Username}a:{attribute.Password}"))}");
|
|
var context = GetContext();
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNotNull(context.Result);
|
|
Assert.IsTrue(context.Result is StatusCodeResult);
|
|
Assert.AreEqual(401, ((StatusCodeResult)context.Result).StatusCode);
|
|
|
|
Assert.IsFalse(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
Assert.AreEqual("Basic", _responseHeaderAuthCallback);
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldAskOnUsernamePasswordWrongPassword()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute
|
|
{
|
|
Username = "user",
|
|
Password = "password"
|
|
};
|
|
_requestHeaders.Add("Authorization", $"Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes($"{attribute.Username}:{attribute.Password}a"))}");
|
|
var context = GetContext();
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNotNull(context.Result);
|
|
Assert.IsTrue(context.Result is StatusCodeResult);
|
|
Assert.AreEqual(401, ((StatusCodeResult)context.Result).StatusCode);
|
|
|
|
Assert.IsFalse(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
Assert.AreEqual("Basic", _responseHeaderAuthCallback);
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldAskOnValidatorWithRealmOnAttribute()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute
|
|
{
|
|
Realm = "attribute"
|
|
};
|
|
_requestHeaders.Add("Authorization", $"Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes($"{attribute.Username}:{attribute.Password}"))}");
|
|
var context = GetContext(hasValidator: true);
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNotNull(context.Result);
|
|
Assert.IsTrue(context.Result is StatusCodeResult);
|
|
Assert.AreEqual(401, ((StatusCodeResult)context.Result).StatusCode);
|
|
|
|
Assert.IsFalse(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
Assert.AreEqual("Basic realm=\"attribute\"", _responseHeaderAuthCallback);
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldAskOnValidatorWithRealmOnValidator()
|
|
{
|
|
// arrange
|
|
_validatorRealm = "validator";
|
|
var attribute = new BasicAuthenticationAttribute();
|
|
_requestHeaders.Add("Authorization", $"Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes($"{attribute.Username}:{attribute.Password}"))}");
|
|
var context = GetContext(hasValidator: true);
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNotNull(context.Result);
|
|
Assert.IsTrue(context.Result is StatusCodeResult);
|
|
Assert.AreEqual(401, ((StatusCodeResult)context.Result).StatusCode);
|
|
|
|
Assert.IsFalse(string.IsNullOrWhiteSpace(_responseHeaderAuthCallback));
|
|
Assert.AreEqual("Basic realm=\"validator\"", _responseHeaderAuthCallback);
|
|
}
|
|
|
|
[TestMethod]
|
|
public async Task ShouldReturnInternalError()
|
|
{
|
|
// arrange
|
|
var attribute = new BasicAuthenticationAttribute();
|
|
_requestHeaders.Add("Authorization", $"Basic {Convert.ToBase64String(Encoding.UTF8.GetBytes($"{attribute.Username}"))}");
|
|
var context = GetContext();
|
|
|
|
// act
|
|
await attribute.OnAuthorizationAsync(context);
|
|
|
|
// assert
|
|
Assert.IsNotNull(context.Result);
|
|
Assert.IsTrue(context.Result is StatusCodeResult);
|
|
Assert.AreEqual(500, ((StatusCodeResult)context.Result).StatusCode);
|
|
}
|
|
|
|
private AuthorizationFilterContext GetContext(bool isAnonymousAllowed = false, bool hasValidator = false)
|
|
{
|
|
_requestHeaderMock = new Mock<IHeaderDictionary>();
|
|
foreach (var header in _requestHeaders)
|
|
{
|
|
StringValues outVal = header.Value;
|
|
_requestHeaderMock
|
|
.Setup(h => h.ContainsKey(header.Key))
|
|
.Returns(true);
|
|
_requestHeaderMock
|
|
.Setup(h => h[header.Key])
|
|
.Returns(header.Value);
|
|
_requestHeaderMock
|
|
.Setup(h => h.TryGetValue(header.Key, out outVal))
|
|
.Returns(true);
|
|
}
|
|
|
|
_responseHeaderMock = new Mock<IHeaderDictionary>();
|
|
_responseHeaderMock
|
|
.SetupSet(h => h.WWWAuthenticate = It.IsAny<StringValues>())
|
|
.Callback<StringValues>((value) =>
|
|
{
|
|
_responseHeaderAuthCallback = value;
|
|
});
|
|
|
|
_requestMock = new Mock<HttpRequest>();
|
|
_requestMock
|
|
.Setup(r => r.Headers)
|
|
.Returns(_requestHeaderMock.Object);
|
|
|
|
_responseMock = new Mock<HttpResponse>();
|
|
_responseMock
|
|
.Setup(r => r.Headers)
|
|
.Returns(_responseHeaderMock.Object);
|
|
|
|
var requestServicesMock = new Mock<IServiceProvider>();
|
|
|
|
if (hasValidator)
|
|
{
|
|
var validatorMock = new Mock<IBasicAuthenticationValidator>();
|
|
validatorMock
|
|
.Setup(v => v.Realm)
|
|
.Returns(_validatorRealm);
|
|
validatorMock
|
|
.Setup(v => v.ValidateAsync(It.IsAny<string>(), It.IsAny<string>(), It.IsAny<IPAddress>(), It.IsAny<CancellationToken>()))
|
|
.ReturnsAsync(_validatorResult);
|
|
|
|
requestServicesMock
|
|
.Setup(rs => rs.GetService(typeof(IBasicAuthenticationValidator)))
|
|
.Returns(validatorMock.Object);
|
|
}
|
|
|
|
var connectionInfoMock = new Mock<ConnectionInfo>();
|
|
connectionInfoMock
|
|
.Setup(ci => ci.RemoteIpAddress)
|
|
.Returns(IPAddress.Loopback);
|
|
|
|
_contextMock = new Mock<HttpContext>();
|
|
_contextMock
|
|
.Setup(c => c.Request)
|
|
.Returns(_requestMock.Object);
|
|
_contextMock
|
|
.Setup(c => c.Response)
|
|
.Returns(_responseMock.Object);
|
|
_contextMock
|
|
.Setup(c => c.RequestServices)
|
|
.Returns(requestServicesMock.Object);
|
|
_contextMock
|
|
.Setup(c => c.Connection)
|
|
.Returns(connectionInfoMock.Object);
|
|
_contextMock
|
|
.Setup(c => c.RequestAborted)
|
|
.Returns(CancellationToken.None);
|
|
|
|
var routeDataMock = new Mock<RouteData>();
|
|
|
|
var actionDescriptor = new ActionDescriptor
|
|
{
|
|
EndpointMetadata = []
|
|
};
|
|
if (isAnonymousAllowed)
|
|
actionDescriptor.EndpointMetadata.Add(new AllowAnonymousAttribute());
|
|
|
|
return new AuthorizationFilterContext(new ActionContext
|
|
{
|
|
HttpContext = _contextMock.Object,
|
|
RouteData = routeDataMock.Object,
|
|
ActionDescriptor = actionDescriptor,
|
|
}, []);
|
|
}
|
|
}
|
|
}
|