統計
| ブランチ: | リビジョン:

pictcode / lib / Cake / Test / Case / Controller / Component / SecurityComponentTest.php @ 0b1b8047

履歴 | 表示 | アノテート | ダウンロード (42.957 KB)

1 635eef61 spyder1211
<?php
2
/**
3
 * SecurityComponentTest file
4
 *
5
 * CakePHP(tm) Tests <http://book.cakephp.org/2.0/en/development/testing.html>
6
 * Copyright (c) Cake Software Foundation, Inc. (http://cakefoundation.org)
7
 *
8
 * Licensed under The MIT License
9
 * For full copyright and license information, please see the LICENSE.txt
10
 * Redistributions of files must retain the above copyright notice
11
 *
12
 * @copyright     Copyright (c) Cake Software Foundation, Inc. (http://cakefoundation.org)
13
 * @link          http://book.cakephp.org/2.0/en/development/testing.html CakePHP(tm) Tests
14
 * @package       Cake.Test.Case.Controller.Component
15
 * @since         CakePHP(tm) v 1.2.0.5435
16
 * @license       http://www.opensource.org/licenses/mit-license.php MIT License
17
 */
18
19
App::uses('SecurityComponent', 'Controller/Component');
20
App::uses('Controller', 'Controller');
21
22
/**
23
 * TestSecurityComponent
24
 *
25
 * @package       Cake.Test.Case.Controller.Component
26
 */
27
class TestSecurityComponent extends SecurityComponent {
28
29
/**
30
 * validatePost method
31
 *
32
 * @param Controller $controller
33
 * @return bool
34
 */
35
        public function validatePost(Controller $controller) {
36
                return $this->_validatePost($controller);
37
        }
38
39
}
40
41
/**
42
 * SecurityTestController
43
 *
44
 * @package       Cake.Test.Case.Controller.Component
45
 */
46
class SecurityTestController extends Controller {
47
48
/**
49
 * components property
50
 *
51
 * @var array
52
 */
53
        public $components = array('Session', 'TestSecurity');
54
55
/**
56
 * failed property
57
 *
58
 * @var bool
59
 */
60
        public $failed = false;
61
62
/**
63
 * Used for keeping track of headers in test
64
 *
65
 * @var array
66
 */
67
        public $testHeaders = array();
68
69
/**
70
 * fail method
71
 *
72
 * @return void
73
 */
74
        public function fail() {
75
                $this->failed = true;
76
        }
77
78
/**
79
 * redirect method
80
 *
81
 * @param string|array $url
82
 * @param mixed $code
83
 * @param mixed $exit
84
 * @return void
85
 */
86
        public function redirect($url, $status = null, $exit = true) {
87
                return $status;
88
        }
89
90
/**
91
 * Convenience method for header()
92
 *
93
 * @param string $status
94
 * @return void
95
 */
96
        public function header($status) {
97
                $this->testHeaders[] = $status;
98
        }
99
100
}
101
102
class BrokenCallbackController extends Controller {
103
104
        public $name = 'UncallableCallback';
105
106
        public $components = array('Session', 'TestSecurity');
107
108
        public function index() {
109
        }
110
111
        protected function _fail() {
112
        }
113
114
}
115
116
/**
117
 * SecurityComponentTest class
118
 *
119
 * @package       Cake.Test.Case.Controller.Component
120
 */
121
class SecurityComponentTest extends CakeTestCase {
122
123
/**
124
 * Controller property
125
 *
126
 * @var SecurityTestController
127
 */
128
        public $Controller;
129
130
/**
131
 * oldSalt property
132
 *
133
 * @var string
134
 */
135
        public $oldSalt;
136
137
/**
138
 * setUp method
139
 *
140
 * @return void
141
 */
142
        public function setUp() {
143
                parent::setUp();
144
145
                $request = $this->getMock('CakeRequest', array('here'), array('posts/index', false));
146
                $request->addParams(array('controller' => 'posts', 'action' => 'index'));
147
                $request->expects($this->any())
148
                        ->method('here')
149
                        ->will($this->returnValue('/posts/index'));
150
151
                $this->Controller = new SecurityTestController($request);
152
                $this->Controller->Components->init($this->Controller);
153
                $this->Controller->Security = $this->Controller->TestSecurity;
154
                $this->Controller->Security->blackHoleCallback = 'fail';
155
                $this->Security = $this->Controller->Security;
156
                $this->Security->csrfCheck = false;
157
158
                Configure::write('Security.salt', 'foo!');
159
        }
160
161
/**
162
 * Tear-down method. Resets environment state.
163
 *
164
 * @return void
165
 */
166
        public function tearDown() {
167
                parent::tearDown();
168
                $this->Controller->Session->delete('_Token');
169
                unset($this->Controller->Security);
170
                unset($this->Controller->Component);
171
                unset($this->Controller);
172
        }
173
174
/**
175
 * Test that requests are still blackholed when controller has incorrect
176
 * visibility keyword in the blackhole callback
177
 *
178
 * @expectedException BadRequestException
179
 * @return void
180
 */
181
        public function testBlackholeWithBrokenCallback() {
182
                $request = new CakeRequest('posts/index', false);
183
                $request->addParams(array(
184
                        'controller' => 'posts', 'action' => 'index')
185
                );
186
                $this->Controller = new BrokenCallbackController($request);
187
                $this->Controller->Components->init($this->Controller);
188
                $this->Controller->Security = $this->Controller->TestSecurity;
189
                $this->Controller->Security->blackHoleCallback = '_fail';
190
                $this->Controller->Security->startup($this->Controller);
191
                $this->Controller->Security->blackHole($this->Controller, 'csrf');
192
        }
193
194
/**
195
 * Ensure that directly requesting the blackholeCallback as the controller
196
 * action results in an exception.
197
 *
198
 * @return void
199
 */
200
        public function testExceptionWhenActionIsBlackholeCallback() {
201
                $this->Controller->request->addParams(array(
202
                        'controller' => 'posts',
203
                        'action' => 'fail'
204
                ));
205
                $this->assertFalse($this->Controller->failed);
206
                $this->Controller->Security->startup($this->Controller);
207
                $this->assertTrue($this->Controller->failed, 'Request was blackholed.');
208
        }
209
210
/**
211
 * test that initialize can set properties.
212
 *
213
 * @return void
214
 */
215
        public function testConstructorSettingProperties() {
216
                $settings = array(
217
                        'requirePost' => array('edit', 'update'),
218
                        'requireSecure' => array('update_account'),
219
                        'requireGet' => array('index'),
220
                        'validatePost' => false,
221
                );
222
                $Security = new SecurityComponent($this->Controller->Components, $settings);
223
                $this->Controller->Security->initialize($this->Controller, $settings);
224
                $this->assertEquals($Security->requirePost, $settings['requirePost']);
225
                $this->assertEquals($Security->requireSecure, $settings['requireSecure']);
226
                $this->assertEquals($Security->requireGet, $settings['requireGet']);
227
                $this->assertEquals($Security->validatePost, $settings['validatePost']);
228
        }
229
230
/**
231
 * testStartup method
232
 *
233
 * @return void
234
 */
235
        public function testStartup() {
236
                $this->Controller->Security->startup($this->Controller);
237
                $result = $this->Controller->params['_Token']['key'];
238
                $this->assertNotNull($result);
239
                $this->assertTrue($this->Controller->Session->check('_Token'));
240
        }
241
242
/**
243
 * testRequirePostFail method
244
 *
245
 * @return void
246
 */
247
        public function testRequirePostFail() {
248
                $_SERVER['REQUEST_METHOD'] = 'GET';
249
                $this->Controller->request['action'] = 'posted';
250
                $this->Controller->Security->requirePost(array('posted'));
251
                $this->Controller->Security->startup($this->Controller);
252
                $this->assertTrue($this->Controller->failed);
253
        }
254
255
/**
256
 * testRequirePostSucceed method
257
 *
258
 * @return void
259
 */
260
        public function testRequirePostSucceed() {
261
                $_SERVER['REQUEST_METHOD'] = 'POST';
262
                $this->Controller->request['action'] = 'posted';
263
                $this->Controller->Security->requirePost('posted');
264
                $this->Security->startup($this->Controller);
265
                $this->assertFalse($this->Controller->failed);
266
        }
267
268
/**
269
 * testRequireSecureFail method
270
 *
271
 * @return void
272
 */
273
        public function testRequireSecureFail() {
274
                $_SERVER['HTTPS'] = 'off';
275
                $_SERVER['REQUEST_METHOD'] = 'POST';
276
                $this->Controller->request['action'] = 'posted';
277
                $this->Controller->Security->requireSecure(array('posted'));
278
                $this->Controller->Security->startup($this->Controller);
279
                $this->assertTrue($this->Controller->failed);
280
        }
281
282
/**
283
 * testRequireSecureSucceed method
284
 *
285
 * @return void
286
 */
287
        public function testRequireSecureSucceed() {
288
                $_SERVER['REQUEST_METHOD'] = 'Secure';
289
                $this->Controller->request['action'] = 'posted';
290
                $_SERVER['HTTPS'] = 'on';
291
                $this->Controller->Security->requireSecure('posted');
292
                $this->Controller->Security->startup($this->Controller);
293
                $this->assertFalse($this->Controller->failed);
294
        }
295
296
/**
297
 * testRequireAuthFail method
298
 *
299
 * @return void
300
 */
301
        public function testRequireAuthFail() {
302
                $_SERVER['REQUEST_METHOD'] = 'AUTH';
303
                $this->Controller->request['action'] = 'posted';
304
                $this->Controller->request->data = array('username' => 'willy', 'password' => 'somePass');
305
                $this->Controller->Security->requireAuth(array('posted'));
306
                $this->Controller->Security->startup($this->Controller);
307
                $this->assertTrue($this->Controller->failed);
308
309
                $this->Controller->Session->write('_Token', array('allowedControllers' => array()));
310
                $this->Controller->request->data = array('username' => 'willy', 'password' => 'somePass');
311
                $this->Controller->request['action'] = 'posted';
312
                $this->Controller->Security->requireAuth('posted');
313
                $this->Controller->Security->startup($this->Controller);
314
                $this->assertTrue($this->Controller->failed);
315
316
                $this->Controller->Session->write('_Token', array(
317
                        'allowedControllers' => array('SecurityTest'), 'allowedActions' => array('posted2')
318
                ));
319
                $this->Controller->request->data = array('username' => 'willy', 'password' => 'somePass');
320
                $this->Controller->request['action'] = 'posted';
321
                $this->Controller->Security->requireAuth('posted');
322
                $this->Controller->Security->startup($this->Controller);
323
                $this->assertTrue($this->Controller->failed);
324
        }
325
326
/**
327
 * testRequireAuthSucceed method
328
 *
329
 * @return void
330
 */
331
        public function testRequireAuthSucceed() {
332
                $_SERVER['REQUEST_METHOD'] = 'AUTH';
333
                $this->Controller->Security->unlockedActions = array('posted');
334
                $this->Controller->request['action'] = 'posted';
335
                $this->Controller->Security->requireAuth('posted');
336
                $this->Controller->Security->startup($this->Controller);
337
                $this->assertFalse($this->Controller->failed);
338
339
                $this->Controller->Security->Session->write('_Token', array(
340
                        'allowedControllers' => array('SecurityTest'),
341
                        'allowedActions' => array('posted')
342
                ));
343
                $this->Controller->request['controller'] = 'SecurityTest';
344
                $this->Controller->request['action'] = 'posted';
345
346
                $this->Controller->request->data = array(
347
                        'username' => 'willy',
348
                        'password' => 'somePass',
349
                        '_Token' => ''
350
                );
351
                $this->Controller->action = 'posted';
352
                $this->Controller->Security->requireAuth('posted');
353
                $this->Controller->Security->startup($this->Controller);
354
                $this->assertFalse($this->Controller->failed);
355
        }
356
357
/**
358
 * testRequirePostSucceedWrongMethod method
359
 *
360
 * @return void
361
 */
362
        public function testRequirePostSucceedWrongMethod() {
363
                $_SERVER['REQUEST_METHOD'] = 'GET';
364
                $this->Controller->request['action'] = 'getted';
365
                $this->Controller->Security->requirePost('posted');
366
                $this->Controller->Security->startup($this->Controller);
367
                $this->assertFalse($this->Controller->failed);
368
        }
369
370
/**
371
 * testRequireGetFail method
372
 *
373
 * @return void
374
 */
375
        public function testRequireGetFail() {
376
                $_SERVER['REQUEST_METHOD'] = 'POST';
377
                $this->Controller->request['action'] = 'getted';
378
                $this->Controller->Security->requireGet(array('getted'));
379
                $this->Controller->Security->startup($this->Controller);
380
                $this->assertTrue($this->Controller->failed);
381
        }
382
383
/**
384
 * testRequireGetSucceed method
385
 *
386
 * @return void
387
 */
388
        public function testRequireGetSucceed() {
389
                $_SERVER['REQUEST_METHOD'] = 'GET';
390
                $this->Controller->request['action'] = 'getted';
391
                $this->Controller->Security->requireGet('getted');
392
                $this->Controller->Security->startup($this->Controller);
393
                $this->assertFalse($this->Controller->failed);
394
        }
395
396
/**
397
 * testRequireGetSucceedWrongMethod method
398
 *
399
 * @return void
400
 */
401
        public function testRequireGetSucceedWrongMethod() {
402
                $_SERVER['REQUEST_METHOD'] = 'POST';
403
                $this->Controller->request['action'] = 'posted';
404
                $this->Security->requireGet('getted');
405
                $this->Security->startup($this->Controller);
406
                $this->assertFalse($this->Controller->failed);
407
        }
408
409
/**
410
 * testRequirePutFail method
411
 *
412
 * @return void
413
 */
414
        public function testRequirePutFail() {
415
                $_SERVER['REQUEST_METHOD'] = 'POST';
416
                $this->Controller->request['action'] = 'putted';
417
                $this->Controller->Security->requirePut(array('putted'));
418
                $this->Controller->Security->startup($this->Controller);
419
                $this->assertTrue($this->Controller->failed);
420
        }
421
422
/**
423
 * testRequirePutSucceed method
424
 *
425
 * @return void
426
 */
427
        public function testRequirePutSucceed() {
428
                $_SERVER['REQUEST_METHOD'] = 'PUT';
429
                $this->Controller->request['action'] = 'putted';
430
                $this->Controller->Security->requirePut('putted');
431
                $this->Controller->Security->startup($this->Controller);
432
                $this->assertFalse($this->Controller->failed);
433
        }
434
435
/**
436
 * testRequirePutSucceedWrongMethod method
437
 *
438
 * @return void
439
 */
440
        public function testRequirePutSucceedWrongMethod() {
441
                $_SERVER['REQUEST_METHOD'] = 'POST';
442
                $this->Controller->request['action'] = 'posted';
443
                $this->Controller->Security->requirePut('putted');
444
                $this->Controller->Security->startup($this->Controller);
445
                $this->assertFalse($this->Controller->failed);
446
        }
447
448
/**
449
 * testRequireDeleteFail method
450
 *
451
 * @return void
452
 */
453
        public function testRequireDeleteFail() {
454
                $_SERVER['REQUEST_METHOD'] = 'POST';
455
                $this->Controller->request['action'] = 'deleted';
456
                $this->Controller->Security->requireDelete(array('deleted', 'other_method'));
457
                $this->Controller->Security->startup($this->Controller);
458
                $this->assertTrue($this->Controller->failed);
459
        }
460
461
/**
462
 * testRequireDeleteSucceed method
463
 *
464
 * @return void
465
 */
466
        public function testRequireDeleteSucceed() {
467
                $_SERVER['REQUEST_METHOD'] = 'DELETE';
468
                $this->Controller->request['action'] = 'deleted';
469
                $this->Controller->Security->requireDelete('deleted');
470
                $this->Controller->Security->startup($this->Controller);
471
                $this->assertFalse($this->Controller->failed);
472
        }
473
474
/**
475
 * testRequireDeleteSucceedWrongMethod method
476
 *
477
 * @return void
478
 */
479
        public function testRequireDeleteSucceedWrongMethod() {
480
                $_SERVER['REQUEST_METHOD'] = 'POST';
481
                $this->Controller->request['action'] = 'posted';
482
                $this->Controller->Security->requireDelete('deleted');
483
                $this->Controller->Security->startup($this->Controller);
484
                $this->assertFalse($this->Controller->failed);
485
        }
486
487
/**
488
 * Test that validatePost fires on GET with request data.
489
 * This could happen when method overriding is used.
490
 *
491
 * @return void
492
 * @triggers Controller.startup $this->Controller
493
 */
494
        public function testValidatePostOnGetWithData() {
495
                $_SERVER['REQUEST_METHOD'] = 'GET';
496
                $this->Controller->Security->startup($this->Controller);
497
498
                $fields = 'an-invalid-token';
499
                $unlocked = '';
500
501
                $this->Controller->request->data = [
502
                        'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'),
503
                        '_Token' => compact('fields', 'unlocked')
504
                ];
505
                $this->assertFalse($this->Controller->failed, 'Should not be failed yet');
506
                $this->Controller->Security->startup($this->Controller);
507
                $this->assertTrue($this->Controller->failed, 'Should fail because of validatePost.');
508
        }
509
510
/**
511
 * Simple hash validation test
512
 *
513
 * @return void
514
 */
515
        public function testValidatePost() {
516
                $this->Controller->Security->startup($this->Controller);
517
518
                $key = $this->Controller->request->params['_Token']['key'];
519
                $fields = '01c1f6dbba02ac6f21b229eab1cc666839b14303%3AModel.valid';
520
                $unlocked = '';
521
522
                $this->Controller->request->data = array(
523
                        'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'),
524
                        '_Token' => compact('key', 'fields', 'unlocked')
525
                );
526
                $this->assertTrue($this->Controller->Security->validatePost($this->Controller));
527
        }
528
529
/**
530
 * Test that validatePost fails if you are missing the session information.
531
 *
532
 * @return void
533
 */
534
        public function testValidatePostNoSession() {
535
                $this->Controller->Security->startup($this->Controller);
536
                $this->Controller->Session->delete('_Token');
537
538
                $key = $this->Controller->params['_Token']['key'];
539
                $fields = 'a5475372b40f6e3ccbf9f8af191f20e1642fd877%3AModel.valid';
540
541
                $this->Controller->data = array(
542
                        'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'),
543
                        '_Token' => compact('key', 'fields')
544
                );
545
                $this->assertFalse($this->Controller->Security->validatePost($this->Controller));
546
        }
547
548
/**
549
 * test that validatePost fails if any of its required fields are missing.
550
 *
551
 * @return void
552
 */
553
        public function testValidatePostFormHacking() {
554
                $this->Controller->Security->startup($this->Controller);
555
                $key = $this->Controller->params['_Token']['key'];
556
                $unlocked = '';
557
558
                $this->Controller->request->data = array(
559
                        'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'),
560
                        '_Token' => compact('key', 'unlocked')
561
                );
562
                $result = $this->Controller->Security->validatePost($this->Controller);
563
                $this->assertFalse($result, 'validatePost passed when fields were missing. %s');
564
        }
565
566
/**
567
 * Test that objects can't be passed into the serialized string. This was a vector for RFI and LFI
568
 * attacks. Thanks to Felix Wilhelm
569
 *
570
 * @return void
571
 */
572
        public function testValidatePostObjectDeserialize() {
573
                $this->Controller->Security->startup($this->Controller);
574
                $key = $this->Controller->request->params['_Token']['key'];
575
                $fields = 'a5475372b40f6e3ccbf9f8af191f20e1642fd877';
576
                $unlocked = '';
577
578
                // a corrupted serialized object, so we can see if it ever gets to deserialize
579
                $attack = 'O:3:"App":1:{s:5:"__map";a:1:{s:3:"foo";s:7:"Hacked!";s:1:"fail"}}';
580
                $fields .= urlencode(':' . str_rot13($attack));
581
582
                $this->Controller->request->data = array(
583
                        'Model' => array('username' => 'mark', 'password' => 'foo', 'valid' => '0'),
584
                        '_Token' => compact('key', 'fields', 'unlocked')
585
                );
586
                $result = $this->Controller->Security->validatePost($this->Controller);
587
                $this->assertFalse($result, 'validatePost passed when key was missing. %s');
588
        }
589
590
/**
591
 * Tests validation of checkbox arrays
592
 *
593
 * @return void
594
 */
595
        public function testValidatePostArray() {
596
                $this->Controller->Security->startup($this->Controller);
597
598
                $key = $this->Controller->request->params['_Token']['key'];
599
                $fields = '38504e4a341d4e6eadb437217efd91270e558d55%3A';
600
                $unlocked = '';
601
602
                $this->Controller->request->data = array(
603
                        'Model' => array('multi_field' => array('1', '3')),
604
                        '_Token' => compact('key', 'fields', 'unlocked')
605
                );
606
                $this->assertTrue($this->Controller->Security->validatePost($this->Controller));
607
        }
608
609
/**
610
 * testValidatePostNoModel method
611
 *
612
 * @return void
613
 */
614
        public function testValidatePostNoModel() {
615
                $this->Controller->Security->startup($this->Controller);
616
617
                $key = $this->Controller->request->params['_Token']['key'];
618
                $fields = 'c5bc49a6c938c820e7e538df3d8ab7bffbc97ef9%3A';
619
                $unlocked = '';
620
621
                $this->Controller->request->data = array(
622
                        'anything' => 'some_data',
623
                        '_Token' => compact('key', 'fields', 'unlocked')
624
                );
625
626
                $result = $this->Controller->Security->validatePost($this->Controller);
627
                $this->assertTrue($result);
628
        }
629
630
/**
631
 * testValidatePostSimple method
632
 *
633
 * @return void
634
 */
635
        public function testValidatePostSimple() {
636
                $this->Controller->Security->startup($this->Controller);
637
638
                $key = $this->Controller->request->params['_Token']['key'];
639
                $fields = '5415d31b4483c1e09ddb58d2a91ba9650b12aa83%3A';
640
                $unlocked = '';
641
642
                $this->Controller->request->data = array(
643
                        'Model' => array('username' => '', 'password' => ''),
644
                        '_Token' => compact('key', 'fields', 'unlocked')
645
                );
646
647
                $result = $this->Controller->Security->validatePost($this->Controller);
648
                $this->assertTrue($result);
649
        }
650
651
/**
652
 * Tests hash validation for multiple records, including locked fields
653
 *
654
 * @return void
655
 */
656
        public function testValidatePostComplex() {
657
                $this->Controller->Security->startup($this->Controller);
658
659
                $key = $this->Controller->request->params['_Token']['key'];
660
                $fields = 'b72a99e923687687bb5e64025d3cc65e1cecced4%3AAddresses.0.id%7CAddresses.1.id';
661
                $unlocked = '';
662
663
                $this->Controller->request->data = array(
664
                        'Addresses' => array(
665
                                '0' => array(
666
                                        'id' => '123456', 'title' => '', 'first_name' => '', 'last_name' => '',
667
                                        'address' => '', 'city' => '', 'phone' => '', 'primary' => ''
668
                                ),
669
                                '1' => array(
670
                                        'id' => '654321', 'title' => '', 'first_name' => '', 'last_name' => '',
671
                                        'address' => '', 'city' => '', 'phone' => '', 'primary' => ''
672
                                )
673
                        ),
674
                        '_Token' => compact('key', 'fields', 'unlocked')
675
                );
676
                $result = $this->Controller->Security->validatePost($this->Controller);
677
                $this->assertTrue($result);
678
        }
679
680
/**
681
 * test ValidatePost with multiple select elements.
682
 *
683
 * @return void
684
 */
685
        public function testValidatePostMultipleSelect() {
686
                $this->Controller->Security->startup($this->Controller);
687
688
                $key = $this->Controller->request->params['_Token']['key'];
689
                $fields = '8a764bdb989132c1d46f9a45f64ce2da5f9eebb9%3A';
690
                $unlocked = '';
691
692
                $this->Controller->request->data = array(
693
                        'Tag' => array('Tag' => array(1, 2)),
694
                        '_Token' => compact('key', 'fields', 'unlocked'),
695
                );
696
                $result = $this->Controller->Security->validatePost($this->Controller);
697
                $this->assertTrue($result);
698
699
                $this->Controller->request->data = array(
700
                        'Tag' => array('Tag' => array(1, 2, 3)),
701
                        '_Token' => compact('key', 'fields', 'unlocked'),
702
                );
703
                $result = $this->Controller->Security->validatePost($this->Controller);
704
                $this->assertTrue($result);
705
706
                $this->Controller->request->data = array(
707
                        'Tag' => array('Tag' => array(1, 2, 3, 4)),
708
                        '_Token' => compact('key', 'fields', 'unlocked'),
709
                );
710
                $result = $this->Controller->Security->validatePost($this->Controller);
711
                $this->assertTrue($result);
712
713
                $fields = '722de3615e63fdff899e86e85e6498b11c50bb66%3A';
714
                $this->Controller->request->data = array(
715
                        'User.password' => 'bar', 'User.name' => 'foo', 'User.is_valid' => '1',
716
                        'Tag' => array('Tag' => array(1)),
717
                        '_Token' => compact('key', 'fields', 'unlocked'),
718
                );
719
                $result = $this->Controller->Security->validatePost($this->Controller);
720
                $this->assertTrue($result);
721
        }
722
723
/**
724
 * testValidatePostCheckbox method
725
 *
726
 * First block tests un-checked checkbox
727
 * Second block tests checked checkbox
728
 *
729
 * @return void
730
 */
731
        public function testValidatePostCheckbox() {
732
                $this->Controller->Security->startup($this->Controller);
733
                $key = $this->Controller->request->params['_Token']['key'];
734
                $fields = '01c1f6dbba02ac6f21b229eab1cc666839b14303%3AModel.valid';
735
                $unlocked = '';
736
737
                $this->Controller->request->data = array(
738
                        'Model' => array('username' => '', 'password' => '', 'valid' => '0'),
739
                        '_Token' => compact('key', 'fields', 'unlocked')
740
                );
741
742
                $result = $this->Controller->Security->validatePost($this->Controller);
743
                $this->assertTrue($result);
744
745
                $fields = 'efbcf463a2c31e97c85d95eedc41dff9e9c6a026%3A';
746
747
                $this->Controller->request->data = array(
748
                        'Model' => array('username' => '', 'password' => '', 'valid' => '0'),
749
                        '_Token' => compact('key', 'fields', 'unlocked')
750
                );
751
752
                $result = $this->Controller->Security->validatePost($this->Controller);
753
                $this->assertTrue($result);
754
755
                $this->Controller->request->data = array();
756
                $this->Controller->Security->startup($this->Controller);
757
                $key = $this->Controller->request->params['_Token']['key'];
758
759
                $this->Controller->request->data = array(
760
                        'Model' => array('username' => '', 'password' => '', 'valid' => '0'),
761
                        '_Token' => compact('key', 'fields', 'unlocked')
762
                );
763
764
                $result = $this->Controller->Security->validatePost($this->Controller);
765
                $this->assertTrue($result);
766
        }
767
768
/**
769
 * testValidatePostHidden method
770
 *
771
 * @return void
772
 */
773
        public function testValidatePostHidden() {
774
                $this->Controller->Security->startup($this->Controller);
775
                $key = $this->Controller->request->params['_Token']['key'];
776
                $fields = 'baaf832a714b39a0618238ac89c7065fc8ec853e%3AModel.hidden%7CModel.other_hidden';
777
                $unlocked = '';
778
779
                $this->Controller->request->data = array(
780
                        'Model' => array(
781
                                'username' => '', 'password' => '', 'hidden' => '0',
782
                                'other_hidden' => 'some hidden value'
783
                        ),
784
                        '_Token' => compact('key', 'fields', 'unlocked')
785
                );
786
                $result = $this->Controller->Security->validatePost($this->Controller);
787
                $this->assertTrue($result);
788
        }
789
790
/**
791
 * testValidatePostWithDisabledFields method
792
 *
793
 * @return void
794
 */
795
        public function testValidatePostWithDisabledFields() {
796
                $this->Controller->Security->disabledFields = array('Model.username', 'Model.password');
797
                $this->Controller->Security->startup($this->Controller);
798
                $key = $this->Controller->request->params['_Token']['key'];
799
                $fields = 'aa7f254ebd8bf2ef118bc5ca1e191d1ae96857f5%3AModel.hidden';
800
                $unlocked = '';
801
802
                $this->Controller->request->data = array(
803
                        'Model' => array(
804
                                'username' => '', 'password' => '', 'hidden' => '0'
805
                        ),
806
                        '_Token' => compact('fields', 'key', 'unlocked')
807
                );
808
809
                $result = $this->Controller->Security->validatePost($this->Controller);
810
                $this->assertTrue($result);
811
        }
812
813
/**
814
 * test validating post data with posted unlocked fields.
815
 *
816
 * @return void
817
 */
818
        public function testValidatePostDisabledFieldsInData() {
819
                $this->Controller->Security->startup($this->Controller);
820
                $key = $this->Controller->request->params['_Token']['key'];
821
                $unlocked = 'Model.username';
822
                $fields = array('Model.hidden', 'Model.password');
823
                $fields = urlencode(Security::hash(
824
                        '/posts/index' .
825
                        serialize($fields) .
826
                        $unlocked .
827
                        Configure::read('Security.salt'))
828
                );
829
830
                $this->Controller->request->data = array(
831
                        'Model' => array(
832
                                'username' => 'mark',
833
                                'password' => 'sekret',
834
                                'hidden' => '0'
835
                        ),
836
                        '_Token' => compact('fields', 'key', 'unlocked')
837
                );
838
839
                $result = $this->Controller->Security->validatePost($this->Controller);
840
                $this->assertTrue($result);
841
        }
842
843
/**
844
 * test that missing 'unlocked' input causes failure
845
 *
846
 * @return void
847
 */
848
        public function testValidatePostFailNoDisabled() {
849
                $this->Controller->Security->startup($this->Controller);
850
                $key = $this->Controller->request->params['_Token']['key'];
851
                $fields = array('Model.hidden', 'Model.password', 'Model.username');
852
                $fields = urlencode(Security::hash(serialize($fields) . Configure::read('Security.salt')));
853
854
                $this->Controller->request->data = array(
855
                        'Model' => array(
856
                                'username' => 'mark',
857
                                'password' => 'sekret',
858
                                'hidden' => '0'
859
                        ),
860
                        '_Token' => compact('fields', 'key')
861
                );
862
863
                $result = $this->Controller->Security->validatePost($this->Controller);
864
                $this->assertFalse($result);
865
        }
866
867
/**
868
 * Test that validatePost fails when unlocked fields are changed.
869
 *
870
 * @return void
871
 */
872
        public function testValidatePostFailDisabledFieldTampering() {
873
                $this->Controller->Security->startup($this->Controller);
874
                $key = $this->Controller->request->params['_Token']['key'];
875
                $unlocked = 'Model.username';
876
                $fields = array('Model.hidden', 'Model.password');
877
                $fields = urlencode(Security::hash(serialize($fields) . $unlocked . Configure::read('Security.salt')));
878
879
                // Tamper the values.
880
                $unlocked = 'Model.username|Model.password';
881
882
                $this->Controller->request->data = array(
883
                        'Model' => array(
884
                                'username' => 'mark',
885
                                'password' => 'sekret',
886
                                'hidden' => '0'
887
                        ),
888
                        '_Token' => compact('fields', 'key', 'unlocked')
889
                );
890
891
                $result = $this->Controller->Security->validatePost($this->Controller);
892
                $this->assertFalse($result);
893
        }
894
895
/**
896
 * testValidateHiddenMultipleModel method
897
 *
898
 * @return void
899
 */
900
        public function testValidateHiddenMultipleModel() {
901
                $this->Controller->Security->startup($this->Controller);
902
                $key = $this->Controller->request->params['_Token']['key'];
903
                $fields = '38dd8a37bbb52e67ee4eb812bf1725a6a18b989b%3AModel.valid%7CModel2.valid%7CModel3.valid';
904
                $unlocked = '';
905
906
                $this->Controller->request->data = array(
907
                        'Model' => array('username' => '', 'password' => '', 'valid' => '0'),
908
                        'Model2' => array('valid' => '0'),
909
                        'Model3' => array('valid' => '0'),
910
                        '_Token' => compact('key', 'fields', 'unlocked')
911
                );
912
                $result = $this->Controller->Security->validatePost($this->Controller);
913
                $this->assertTrue($result);
914
        }
915
916
/**
917
 * testValidateHasManyModel method
918
 *
919
 * @return void
920
 */
921
        public function testValidateHasManyModel() {
922
                $this->Controller->Security->startup($this->Controller);
923
                $key = $this->Controller->request->params['_Token']['key'];
924
                $fields = 'dcef68de6634c60d2e60484ad0e2faec003456e6%3AModel.0.hidden%7CModel.0.valid';
925
                $fields .= '%7CModel.1.hidden%7CModel.1.valid';
926
                $unlocked = '';
927
928
                $this->Controller->request->data = array(
929
                        'Model' => array(
930
                                array(
931
                                        'username' => 'username', 'password' => 'password',
932
                                        'hidden' => 'value', 'valid' => '0'
933
                                ),
934
                                array(
935
                                        'username' => 'username', 'password' => 'password',
936
                                        'hidden' => 'value', 'valid' => '0'
937
                                )
938
                        ),
939
                        '_Token' => compact('key', 'fields', 'unlocked')
940
                );
941
942
                $result = $this->Controller->Security->validatePost($this->Controller);
943
                $this->assertTrue($result);
944
        }
945
946
/**
947
 * testValidateHasManyRecordsPass method
948
 *
949
 * @return void
950
 */
951
        public function testValidateHasManyRecordsPass() {
952
                $this->Controller->Security->startup($this->Controller);
953
                $key = $this->Controller->request->params['_Token']['key'];
954
                $fields = '8b6880fbbd4b69279155f899652ecffdd9b4c5a1%3AAddress.0.id%7CAddress.0.primary%7C';
955
                $fields .= 'Address.1.id%7CAddress.1.primary';
956
                $unlocked = '';
957
958
                $this->Controller->request->data = array(
959
                        'Address' => array(
960
                                0 => array(
961
                                        'id' => '123',
962
                                        'title' => 'home',
963
                                        'first_name' => 'Bilbo',
964
                                        'last_name' => 'Baggins',
965
                                        'address' => '23 Bag end way',
966
                                        'city' => 'the shire',
967
                                        'phone' => 'N/A',
968
                                        'primary' => '1',
969
                                ),
970
                                1 => array(
971
                                        'id' => '124',
972
                                        'title' => 'home',
973
                                        'first_name' => 'Frodo',
974
                                        'last_name' => 'Baggins',
975
                                        'address' => '50 Bag end way',
976
                                        'city' => 'the shire',
977
                                        'phone' => 'N/A',
978
                                        'primary' => '1'
979
                                )
980
                        ),
981
                        '_Token' => compact('key', 'fields', 'unlocked')
982
                );
983
984
                $result = $this->Controller->Security->validatePost($this->Controller);
985
                $this->assertTrue($result);
986
        }
987
988
/**
989
 * Test that values like Foo.0.1
990
 *
991
 * @return void
992
 */
993
        public function testValidateNestedNumericSets() {
994
                $this->Controller->Security->startup($this->Controller);
995
                $key = $this->Controller->request->params['_Token']['key'];
996
                $unlocked = '';
997
                $hashFields = array('TaxonomyData');
998
                $fields = urlencode(
999
                        Security::hash(
1000
                        '/posts/index' .
1001
                        serialize($hashFields) .
1002
                        $unlocked .
1003
                        Configure::read('Security.salt'), 'sha1')
1004
                );
1005
1006
                $this->Controller->request->data = array(
1007
                        'TaxonomyData' => array(
1008
                                1 => array(array(2)),
1009
                                2 => array(array(3))
1010
                        ),
1011
                        '_Token' => compact('key', 'fields', 'unlocked')
1012
                );
1013
                $result = $this->Controller->Security->validatePost($this->Controller);
1014
                $this->assertTrue($result);
1015
        }
1016
1017
/**
1018
 * testValidateHasManyRecords method
1019
 *
1020
 * validatePost should fail, hidden fields have been changed.
1021
 *
1022
 * @return void
1023
 */
1024
        public function testValidateHasManyRecordsFail() {
1025
                $this->Controller->Security->startup($this->Controller);
1026
                $key = $this->Controller->request->params['_Token']['key'];
1027
                $fields = '7a203edb3d345bbf38fe0dccae960da8842e11d7%3AAddress.0.id%7CAddress.0.primary%7C';
1028
                $fields .= 'Address.1.id%7CAddress.1.primary';
1029
                $unlocked = '';
1030
1031
                $this->Controller->request->data = array(
1032
                        'Address' => array(
1033
                                0 => array(
1034
                                        'id' => '123',
1035
                                        'title' => 'home',
1036
                                        'first_name' => 'Bilbo',
1037
                                        'last_name' => 'Baggins',
1038
                                        'address' => '23 Bag end way',
1039
                                        'city' => 'the shire',
1040
                                        'phone' => 'N/A',
1041
                                        'primary' => '5',
1042
                                ),
1043
                                1 => array(
1044
                                        'id' => '124',
1045
                                        'title' => 'home',
1046
                                        'first_name' => 'Frodo',
1047
                                        'last_name' => 'Baggins',
1048
                                        'address' => '50 Bag end way',
1049
                                        'city' => 'the shire',
1050
                                        'phone' => 'N/A',
1051
                                        'primary' => '1'
1052
                                )
1053
                        ),
1054
                        '_Token' => compact('key', 'fields', 'unlocked')
1055
                );
1056
1057
                $result = $this->Controller->Security->validatePost($this->Controller);
1058
                $this->assertFalse($result);
1059
        }
1060
1061
/**
1062
 * testFormDisabledFields method
1063
 *
1064
 * @return void
1065
 */
1066
        public function testFormDisabledFields() {
1067
                $this->Controller->Security->startup($this->Controller);
1068
                $key = $this->Controller->request->params['_Token']['key'];
1069
                $fields = '216ee717efd1a251a6d6e9efbb96005a9d09f1eb%3An%3A0%3A%7B%7D';
1070
                $unlocked = '';
1071
1072
                $this->Controller->request->data = array(
1073
                        'MyModel' => array('name' => 'some data'),
1074
                        '_Token' => compact('key', 'fields', 'unlocked')
1075
                );
1076
                $result = $this->Controller->Security->validatePost($this->Controller);
1077
                $this->assertFalse($result);
1078
1079
                $this->Controller->Security->startup($this->Controller);
1080
                $this->Controller->Security->disabledFields = array('MyModel.name');
1081
                $key = $this->Controller->request->params['_Token']['key'];
1082
1083
                $this->Controller->request->data = array(
1084
                        'MyModel' => array('name' => 'some data'),
1085
                        '_Token' => compact('key', 'fields', 'unlocked')
1086
                );
1087
1088
                $result = $this->Controller->Security->validatePost($this->Controller);
1089
                $this->assertTrue($result);
1090
        }
1091
1092
/**
1093
 * testRadio method
1094
 *
1095
 * @return void
1096
 */
1097
        public function testValidatePostRadio() {
1098
                $this->Controller->Security->startup($this->Controller);
1099
                $key = $this->Controller->request->params['_Token']['key'];
1100
                $fields = '3be63770e7953c6d2119f5377a9303372040f66f%3An%3A0%3A%7B%7D';
1101
                $unlocked = '';
1102
1103
                $this->Controller->request->data = array(
1104
                        '_Token' => compact('key', 'fields', 'unlocked')
1105
                );
1106
                $result = $this->Controller->Security->validatePost($this->Controller);
1107
                $this->assertFalse($result);
1108
1109
                $this->Controller->request->data = array(
1110
                        '_Token' => compact('key', 'fields', 'unlocked'),
1111
                        'Test' => array('test' => '')
1112
                );
1113
                $result = $this->Controller->Security->validatePost($this->Controller);
1114
                $this->assertTrue($result);
1115
1116
                $this->Controller->request->data = array(
1117
                        '_Token' => compact('key', 'fields', 'unlocked'),
1118
                        'Test' => array('test' => '1')
1119
                );
1120
                $result = $this->Controller->Security->validatePost($this->Controller);
1121
                $this->assertTrue($result);
1122
1123
                $this->Controller->request->data = array(
1124
                        '_Token' => compact('key', 'fields', 'unlocked'),
1125
                        'Test' => array('test' => '2')
1126
                );
1127
                $result = $this->Controller->Security->validatePost($this->Controller);
1128
                $this->assertTrue($result);
1129
        }
1130
1131
/**
1132
 * test validatePost uses here() as a hash input.
1133
 *
1134
 * @return void
1135
 */
1136
        public function testValidatePostUrlAsHashInput() {
1137
                $this->Controller->Security->startup($this->Controller);
1138
1139
                $key = $this->Controller->request->params['_Token']['key'];
1140
                $fields = '5415d31b4483c1e09ddb58d2a91ba9650b12aa83%3A';
1141
                $unlocked = '';
1142
1143
                $this->Controller->request->data = array(
1144
                        'Model' => array('username' => '', 'password' => ''),
1145
                        '_Token' => compact('key', 'fields', 'unlocked')
1146
                );
1147
                $this->assertTrue($this->Controller->Security->validatePost($this->Controller));
1148
1149
                $request = $this->getMock('CakeRequest', array('here'), array('articles/edit/1', false));
1150
                $request->expects($this->at(0))
1151
                        ->method('here')
1152
                        ->will($this->returnValue('/posts/index?page=1'));
1153
                $request->expects($this->at(1))
1154
                        ->method('here')
1155
                        ->will($this->returnValue('/posts/edit/1'));
1156
1157
                $this->Controller->Security->request = $request;
1158
                $this->assertFalse($this->Controller->Security->validatePost($this->Controller));
1159
                $this->assertFalse($this->Controller->Security->validatePost($this->Controller));
1160
        }
1161
1162
/**
1163
 * test that a requestAction's controller will have the _Token appended to
1164
 * the params.
1165
 *
1166
 * @return void
1167
 * @see https://cakephp.lighthouseapp.com/projects/42648/tickets/68
1168
 */
1169
        public function testSettingTokenForRequestAction() {
1170
                $this->Controller->Security->startup($this->Controller);
1171
                $key = $this->Controller->request->params['_Token']['key'];
1172
1173
                $this->Controller->params['requested'] = 1;
1174
                unset($this->Controller->request->params['_Token']);
1175
1176
                $this->Controller->Security->startup($this->Controller);
1177
                $this->assertEquals($this->Controller->request->params['_Token']['key'], $key);
1178
        }
1179
1180
/**
1181
 * test that blackhole doesn't delete the _Token session key so repeat data submissions
1182
 * stay blackholed.
1183
 *
1184
 * @link https://cakephp.lighthouseapp.com/projects/42648/tickets/214
1185
 * @return void
1186
 */
1187
        public function testBlackHoleNotDeletingSessionInformation() {
1188
                $this->Controller->Security->startup($this->Controller);
1189
1190
                $this->Controller->Security->blackHole($this->Controller, 'auth');
1191
                $this->assertTrue($this->Controller->Security->Session->check('_Token'), '_Token was deleted by blackHole %s');
1192
        }
1193
1194
/**
1195
 * test that csrf checks are skipped for request action.
1196
 *
1197
 * @return void
1198
 */
1199
        public function testCsrfSkipRequestAction() {
1200
                $_SERVER['REQUEST_METHOD'] = 'POST';
1201
1202
                $this->Security->validatePost = false;
1203
                $this->Security->csrfCheck = true;
1204
                $this->Security->csrfExpires = '+10 minutes';
1205
                $this->Controller->request->params['requested'] = 1;
1206
                $this->Security->startup($this->Controller);
1207
1208
                $this->assertFalse($this->Controller->failed, 'fail() was called.');
1209
        }
1210
1211
/**
1212
 * test setting
1213
 *
1214
 * @return void
1215
 */
1216
        public function testCsrfSettings() {
1217
                $this->Security->validatePost = false;
1218
                $this->Security->csrfCheck = true;
1219
                $this->Security->csrfExpires = '+10 minutes';
1220
                $this->Security->startup($this->Controller);
1221
1222
                $token = $this->Security->Session->read('_Token');
1223
                $this->assertEquals(1, count($token['csrfTokens']), 'Missing the csrf token.');
1224
                $this->assertEquals(strtotime('+10 minutes'), current($token['csrfTokens']), 'Token expiry does not match');
1225
                $this->assertEquals(array('key', 'unlockedFields'), array_keys($this->Controller->request->params['_Token']), 'Keys don not match');
1226
        }
1227
1228
/**
1229
 * Test setting multiple nonces, when startup() is called more than once, (ie more than one request.)
1230
 *
1231
 * @return void
1232
 */
1233
        public function testCsrfSettingMultipleNonces() {
1234
                $this->Security->validatePost = false;
1235
                $this->Security->csrfCheck = true;
1236
                $this->Security->csrfExpires = '+10 minutes';
1237
                $csrfExpires = strtotime('+10 minutes');
1238
                $this->Security->startup($this->Controller);
1239
                $this->Security->startup($this->Controller);
1240
1241
                $token = $this->Security->Session->read('_Token');
1242
                $this->assertEquals(2, count($token['csrfTokens']), 'Missing the csrf token.');
1243
                foreach ($token['csrfTokens'] as $expires) {
1244
                        $this->assertWithinMargin($expires, $csrfExpires, 2, 'Token expiry does not match');
1245
                }
1246
        }
1247
1248
/**
1249
 * test that nonces are consumed by form submits.
1250
 *
1251
 * @return void
1252
 */
1253
        public function testCsrfNonceConsumption() {
1254
                $this->Security->validatePost = false;
1255
                $this->Security->csrfCheck = true;
1256
                $this->Security->csrfExpires = '+10 minutes';
1257
1258
                $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('+10 minutes')));
1259
1260
                $this->Controller->request->params['action'] = 'index';
1261
                $this->Controller->request->data = array(
1262
                        '_Token' => array(
1263
                                'key' => 'nonce1'
1264
                        ),
1265
                        'Post' => array(
1266
                                'title' => 'Woot'
1267
                        )
1268
                );
1269
                $this->Security->startup($this->Controller);
1270
                $token = $this->Security->Session->read('_Token');
1271
                $this->assertFalse(isset($token['csrfTokens']['nonce1']), 'Token was not consumed');
1272
        }
1273
1274
/**
1275
 * tests that reusable CSRF-token expiry is renewed
1276
 */
1277
        public function testCsrfReusableTokenRenewal() {
1278
                $this->Security->validatePost = false;
1279
                $this->Security->csrfCheck = true;
1280
                $this->Security->csrfUseOnce = false;
1281
                $csrfExpires = '+10 minutes';
1282
                $this->Security->csrfExpires = $csrfExpires;
1283
1284
                $this->Security->Session->write('_Token.csrfTokens', array('token' => strtotime('+1 minutes')));
1285
1286
                $this->Security->startup($this->Controller);
1287
                $tokens = $this->Security->Session->read('_Token.csrfTokens');
1288
                $this->assertWithinMargin($tokens['token'], strtotime($csrfExpires), 2, 'Token expiry was not renewed');
1289
        }
1290
1291
/**
1292
 * test that expired values in the csrfTokens are cleaned up.
1293
 *
1294
 * @return void
1295
 */
1296
        public function testCsrfNonceVacuum() {
1297
                $this->Security->validatePost = false;
1298
                $this->Security->csrfCheck = true;
1299
                $this->Security->csrfExpires = '+10 minutes';
1300
1301
                $this->Security->Session->write('_Token.csrfTokens', array(
1302
                        'valid' => strtotime('+30 minutes'),
1303
                        'poof' => strtotime('-11 minutes'),
1304
                        'dust' => strtotime('-20 minutes')
1305
                ));
1306
                $this->Security->startup($this->Controller);
1307
                $tokens = $this->Security->Session->read('_Token.csrfTokens');
1308
                $this->assertEquals(2, count($tokens), 'Too many tokens left behind');
1309
                $this->assertNotEmpty('valid', $tokens, 'Valid token was removed.');
1310
        }
1311
1312
/**
1313
 * test that when the key is missing the request is blackHoled
1314
 *
1315
 * @return void
1316
 */
1317
        public function testCsrfBlackHoleOnKeyMismatch() {
1318
                $this->Security->validatePost = false;
1319
                $this->Security->csrfCheck = true;
1320
                $this->Security->csrfExpires = '+10 minutes';
1321
1322
                $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('+10 minutes')));
1323
1324
                $this->Controller->request->params['action'] = 'index';
1325
                $this->Controller->request->data = array(
1326
                        '_Token' => array(
1327
                                'key' => 'not the right value'
1328
                        ),
1329
                        'Post' => array(
1330
                                'title' => 'Woot'
1331
                        )
1332
                );
1333
                $this->Security->startup($this->Controller);
1334
                $this->assertTrue($this->Controller->failed, 'fail() was not called.');
1335
        }
1336
1337
/**
1338
 * test that when the key is missing the request is blackHoled
1339
 *
1340
 * @return void
1341
 */
1342
        public function testCsrfBlackHoleOnExpiredKey() {
1343
                $this->Security->validatePost = false;
1344
                $this->Security->csrfCheck = true;
1345
                $this->Security->csrfExpires = '+10 minutes';
1346
1347
                $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('-5 minutes')));
1348
1349
                $this->Controller->request->params['action'] = 'index';
1350
                $this->Controller->request->data = array(
1351
                        '_Token' => array(
1352
                                'key' => 'nonce1'
1353
                        ),
1354
                        'Post' => array(
1355
                                'title' => 'Woot'
1356
                        )
1357
                );
1358
                $this->Security->startup($this->Controller);
1359
                $this->assertTrue($this->Controller->failed, 'fail() was not called.');
1360
        }
1361
1362
/**
1363
 * test that csrfUseOnce = false works.
1364
 *
1365
 * @return void
1366
 */
1367
        public function testCsrfNotUseOnce() {
1368
                $this->Security->validatePost = false;
1369
                $this->Security->csrfCheck = true;
1370
                $this->Security->csrfUseOnce = false;
1371
                $this->Security->csrfExpires = '+10 minutes';
1372
1373
                // Generate one token
1374
                $this->Security->startup($this->Controller);
1375
                $token = $this->Security->Session->read('_Token.csrfTokens');
1376
                $this->assertEquals(1, count($token), 'Should only be one token.');
1377
1378
                $this->Security->startup($this->Controller);
1379
                $tokenTwo = $this->Security->Session->read('_Token.csrfTokens');
1380
                $this->assertEquals(1, count($tokenTwo), 'Should only be one token.');
1381
                $this->assertEquals($token, $tokenTwo, 'Tokens should not be different.');
1382
1383
                $key = $this->Controller->request->params['_Token']['key'];
1384
                $this->assertEquals(array($key), array_keys($token), '_Token.key and csrfToken do not match request will blackhole.');
1385
        }
1386
1387
/**
1388
 * ensure that longer session tokens are not consumed
1389
 *
1390
 * @return void
1391
 */
1392
        public function testCsrfNotUseOnceValidationLeavingToken() {
1393
                $this->Security->validatePost = false;
1394
                $this->Security->csrfCheck = true;
1395
                $this->Security->csrfUseOnce = false;
1396
                $this->Security->csrfExpires = '+10 minutes';
1397
1398
                $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('+10 minutes')));
1399
1400
                $this->Controller->request = $this->getMock('CakeRequest', array('is'));
1401
                $this->Controller->request->params['action'] = 'index';
1402
                $this->Controller->request->data = array(
1403
                        '_Token' => array(
1404
                                'key' => 'nonce1'
1405
                        ),
1406
                        'Post' => array(
1407
                                'title' => 'Woot'
1408
                        )
1409
                );
1410
                $this->Security->startup($this->Controller);
1411
                $token = $this->Security->Session->read('_Token');
1412
                $this->assertTrue(isset($token['csrfTokens']['nonce1']), 'Token was consumed');
1413
        }
1414
1415
/**
1416
 * Test generateToken()
1417
 *
1418
 * @return void
1419
 */
1420
        public function testGenerateToken() {
1421
                $request = $this->Controller->request;
1422
                $this->Security->generateToken($request);
1423
1424
                $this->assertNotEmpty($request->params['_Token']);
1425
                $this->assertTrue(isset($request->params['_Token']['unlockedFields']));
1426
                $this->assertTrue(isset($request->params['_Token']['key']));
1427
        }
1428
1429
/**
1430
 * Test the limiting of CSRF tokens.
1431
 *
1432
 * @return void
1433
 */
1434
        public function testCsrfLimit() {
1435
                $this->Security->csrfLimit = 3;
1436
                $time = strtotime('+10 minutes');
1437
                $tokens = array(
1438
                        '1' => $time,
1439
                        '2' => $time,
1440
                        '3' => $time,
1441
                        '4' => $time,
1442
                        '5' => $time,
1443
                );
1444
                $this->Security->Session->write('_Token', array('csrfTokens' => $tokens));
1445
                $this->Security->generateToken($this->Controller->request);
1446
                $result = $this->Security->Session->read('_Token.csrfTokens');
1447
1448
                $this->assertFalse(isset($result['1']));
1449
                $this->assertFalse(isset($result['2']));
1450
                $this->assertFalse(isset($result['3']));
1451
                $this->assertTrue(isset($result['4']));
1452
                $this->assertTrue(isset($result['5']));
1453
        }
1454
1455
/**
1456
 * Test unlocked actions
1457
 *
1458
 * @return void
1459
 */
1460
        public function testUnlockedActions() {
1461
                $_SERVER['REQUEST_METHOD'] = 'POST';
1462
                $this->Controller->request->data = array('data');
1463
                $this->Controller->Security->unlockedActions = 'index';
1464
                $this->Controller->Security->blackHoleCallback = null;
1465
                $result = $this->Controller->Security->startup($this->Controller);
1466
                $this->assertNull($result);
1467
        }
1468
}