* * @copyright Copyright (c) 2016, ownCloud, Inc. * @license AGPL-3.0 * * This code is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License, version 3, * as published by the Free Software Foundation. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU Affero General Public License for more details. * * You should have received a copy of the GNU Affero General Public License, version 3, * along with this program. If not, see * */ namespace Test\Authentication\Token; use OC\Authentication\Token\DefaultToken; use OC\Authentication\Token\DefaultTokenProvider; use OC\Authentication\Token\IToken; use OCP\AppFramework\Db\DoesNotExistException; use Test\TestCase; class DefaultTokenProviderTest extends TestCase { /** @var DefaultTokenProvider */ private $tokenProvider; private $mapper; private $crypto; private $config; private $logger; private $timeFactory; private $time; protected function setUp() { parent::setUp(); $this->mapper = $this->getMockBuilder('\OC\Authentication\Token\DefaultTokenMapper') ->disableOriginalConstructor() ->getMock(); $this->crypto = $this->getMock('\OCP\Security\ICrypto'); $this->config = $this->getMock('\OCP\IConfig'); $this->logger = $this->getMock('\OCP\ILogger'); $this->timeFactory = $this->getMock('\OCP\AppFramework\Utility\ITimeFactory'); $this->time = 1313131; $this->timeFactory->expects($this->any()) ->method('getTime') ->will($this->returnValue($this->time)); $this->tokenProvider = new DefaultTokenProvider($this->mapper, $this->crypto, $this->config, $this->logger, $this->timeFactory); } public function testGenerateToken() { $token = 'token'; $uid = 'user'; $user = 'User'; $password = 'passme'; $name = 'User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12' . 'User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12' . 'User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12' . 'User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12'; $type = IToken::PERMANENT_TOKEN; $toInsert = new DefaultToken(); $toInsert->setUid($uid); $toInsert->setLoginName($user); $toInsert->setPassword('encryptedpassword'); $toInsert->setName($name); $toInsert->setToken(hash('sha512', $token . '1f4h9s')); $toInsert->setType($type); $toInsert->setLastActivity($this->time); $this->config->expects($this->any()) ->method('getSystemValue') ->with('secret') ->will($this->returnValue('1f4h9s')); $this->crypto->expects($this->once()) ->method('encrypt') ->with($password, $token . '1f4h9s') ->will($this->returnValue('encryptedpassword')); $this->mapper->expects($this->once()) ->method('insert') ->with($this->equalTo($toInsert)); $actual = $this->tokenProvider->generateToken($token, $uid, $user, $password, $name, $type); $this->assertEquals($toInsert, $actual); } public function testUpdateToken() { $tk = new DefaultToken(); $tk->setLastActivity($this->time - 200); $this->mapper->expects($this->once()) ->method('update') ->with($tk); $this->tokenProvider->updateTokenActivity($tk); $this->assertEquals($this->time, $tk->getLastActivity()); } public function testUpdateTokenDebounce() { $tk = new DefaultToken(); $tk->setLastActivity($this->time - 30); $this->mapper->expects($this->never()) ->method('update') ->with($tk); $this->tokenProvider->updateTokenActivity($tk); } public function testGetTokenByUser() { $user = $this->getMock('\OCP\IUser'); $this->mapper->expects($this->once()) ->method('getTokenByUser') ->with($user) ->will($this->returnValue(['token'])); $this->assertEquals(['token'], $this->tokenProvider->getTokenByUser($user)); } public function testGetPassword() { $token = 'token1234'; $tk = new DefaultToken(); $tk->setPassword('someencryptedvalue'); $this->config->expects($this->once()) ->method('getSystemValue') ->with('secret') ->will($this->returnValue('1f4h9s')); $this->crypto->expects($this->once()) ->method('decrypt') ->with('someencryptedvalue', $token . '1f4h9s') ->will($this->returnValue('passme')); $actual = $this->tokenProvider->getPassword($tk, $token); $this->assertEquals('passme', $actual); } /** * @expectedException \OC\Authentication\Exceptions\PasswordlessTokenException */ public function testGetPasswordPasswordLessToken() { $token = 'token1234'; $tk = new DefaultToken(); $tk->setPassword(null); $this->tokenProvider->getPassword($tk, $token); } /** * @expectedException \OC\Authentication\Exceptions\InvalidTokenException */ public function testGetPasswordDeletesInvalidToken() { $token = 'token1234'; $tk = new DefaultToken(); $tk->setPassword('someencryptedvalue'); /* @var $tokenProvider DefaultTokenProvider */ $tokenProvider = $this->getMockBuilder('\OC\Authentication\Token\DefaultTokenProvider') ->setMethods([ 'invalidateToken' ]) ->setConstructorArgs([$this->mapper, $this->crypto, $this->config, $this->logger, $this->timeFactory]) ->getMock(); $this->config->expects($this->once()) ->method('getSystemValue') ->with('secret') ->will($this->returnValue('1f4h9s')); $this->crypto->expects($this->once()) ->method('decrypt') ->with('someencryptedvalue', $token . '1f4h9s') ->will($this->throwException(new \Exception('some crypto error occurred'))); $tokenProvider->expects($this->once()) ->method('invalidateToken') ->with($token); $tokenProvider->getPassword($tk, $token); } public function testSetPassword() { $token = new DefaultToken(); $tokenId = 'token123'; $password = '123456'; $this->config->expects($this->once()) ->method('getSystemValue') ->with('secret') ->will($this->returnValue('ocsecret')); $this->crypto->expects($this->once()) ->method('encrypt') ->with($password, $tokenId . 'ocsecret') ->will($this->returnValue('encryptedpassword')); $this->mapper->expects($this->once()) ->method('update') ->with($token); $this->tokenProvider->setPassword($token, $tokenId, $password); $this->assertEquals('encryptedpassword', $token->getPassword()); } /** * @expectedException \OC\Authentication\Exceptions\InvalidTokenException */ public function testSetPasswordInvalidToken() { $token = $this->getMock('\OC\Authentication\Token\IToken'); $tokenId = 'token123'; $password = '123456'; $this->tokenProvider->setPassword($token, $tokenId, $password); } public function testInvalidateToken() { $this->mapper->expects($this->once()) ->method('invalidate') ->with(hash('sha512', 'token7')); $this->tokenProvider->invalidateToken('token7'); } public function testInvaildateTokenById() { $id = 123; $user = $this->getMock('\OCP\IUser'); $this->mapper->expects($this->once()) ->method('deleteById') ->with($user, $id); $this->tokenProvider->invalidateTokenById($user, $id); } public function testInvalidateOldTokens() { $defaultSessionLifetime = 60 * 60 * 24; $this->config->expects($this->once()) ->method('getSystemValue') ->with('session_lifetime', $defaultSessionLifetime) ->will($this->returnValue(150)); $this->mapper->expects($this->once()) ->method('invalidateOld') ->with($this->time - 150); $this->tokenProvider->invalidateOldTokens(); } }