pictcode / lib / Cake / Test / Case / Controller / Component / SecurityComponentTest.php @ d510f2df
履歴 | 表示 | アノテート | ダウンロード (42.957 KB)
| 1 | 635eef61 | spyder1211 | <?php
|
|---|---|---|---|
| 2 | /**
|
||
| 3 | * SecurityComponentTest file
|
||
| 4 | *
|
||
| 5 | * CakePHP(tm) Tests <http://book.cakephp.org/2.0/en/development/testing.html>
|
||
| 6 | * Copyright (c) Cake Software Foundation, Inc. (http://cakefoundation.org)
|
||
| 7 | *
|
||
| 8 | * Licensed under The MIT License
|
||
| 9 | * For full copyright and license information, please see the LICENSE.txt
|
||
| 10 | * Redistributions of files must retain the above copyright notice
|
||
| 11 | *
|
||
| 12 | * @copyright Copyright (c) Cake Software Foundation, Inc. (http://cakefoundation.org)
|
||
| 13 | * @link http://book.cakephp.org/2.0/en/development/testing.html CakePHP(tm) Tests
|
||
| 14 | * @package Cake.Test.Case.Controller.Component
|
||
| 15 | * @since CakePHP(tm) v 1.2.0.5435
|
||
| 16 | * @license http://www.opensource.org/licenses/mit-license.php MIT License
|
||
| 17 | */
|
||
| 18 | |||
| 19 | App::uses('SecurityComponent', 'Controller/Component'); |
||
| 20 | App::uses('Controller', 'Controller'); |
||
| 21 | |||
| 22 | /**
|
||
| 23 | * TestSecurityComponent
|
||
| 24 | *
|
||
| 25 | * @package Cake.Test.Case.Controller.Component
|
||
| 26 | */
|
||
| 27 | class TestSecurityComponent extends SecurityComponent { |
||
| 28 | |||
| 29 | /**
|
||
| 30 | * validatePost method
|
||
| 31 | *
|
||
| 32 | * @param Controller $controller
|
||
| 33 | * @return bool
|
||
| 34 | */
|
||
| 35 | public function validatePost(Controller $controller) { |
||
| 36 | return $this->_validatePost($controller); |
||
| 37 | } |
||
| 38 | |||
| 39 | } |
||
| 40 | |||
| 41 | /**
|
||
| 42 | * SecurityTestController
|
||
| 43 | *
|
||
| 44 | * @package Cake.Test.Case.Controller.Component
|
||
| 45 | */
|
||
| 46 | class SecurityTestController extends Controller { |
||
| 47 | |||
| 48 | /**
|
||
| 49 | * components property
|
||
| 50 | *
|
||
| 51 | * @var array
|
||
| 52 | */
|
||
| 53 | public $components = array('Session', 'TestSecurity'); |
||
| 54 | |||
| 55 | /**
|
||
| 56 | * failed property
|
||
| 57 | *
|
||
| 58 | * @var bool
|
||
| 59 | */
|
||
| 60 | public $failed = false; |
||
| 61 | |||
| 62 | /**
|
||
| 63 | * Used for keeping track of headers in test
|
||
| 64 | *
|
||
| 65 | * @var array
|
||
| 66 | */
|
||
| 67 | public $testHeaders = array(); |
||
| 68 | |||
| 69 | /**
|
||
| 70 | * fail method
|
||
| 71 | *
|
||
| 72 | * @return void
|
||
| 73 | */
|
||
| 74 | public function fail() { |
||
| 75 | $this->failed = true; |
||
| 76 | } |
||
| 77 | |||
| 78 | /**
|
||
| 79 | * redirect method
|
||
| 80 | *
|
||
| 81 | * @param string|array $url
|
||
| 82 | * @param mixed $code
|
||
| 83 | * @param mixed $exit
|
||
| 84 | * @return void
|
||
| 85 | */
|
||
| 86 | public function redirect($url, $status = null, $exit = true) { |
||
| 87 | return $status; |
||
| 88 | } |
||
| 89 | |||
| 90 | /**
|
||
| 91 | * Convenience method for header()
|
||
| 92 | *
|
||
| 93 | * @param string $status
|
||
| 94 | * @return void
|
||
| 95 | */
|
||
| 96 | public function header($status) { |
||
| 97 | $this->testHeaders[] = $status; |
||
| 98 | } |
||
| 99 | |||
| 100 | } |
||
| 101 | |||
| 102 | class BrokenCallbackController extends Controller { |
||
| 103 | |||
| 104 | public $name = 'UncallableCallback'; |
||
| 105 | |||
| 106 | public $components = array('Session', 'TestSecurity'); |
||
| 107 | |||
| 108 | public function index() { |
||
| 109 | } |
||
| 110 | |||
| 111 | protected function _fail() { |
||
| 112 | } |
||
| 113 | |||
| 114 | } |
||
| 115 | |||
| 116 | /**
|
||
| 117 | * SecurityComponentTest class
|
||
| 118 | *
|
||
| 119 | * @package Cake.Test.Case.Controller.Component
|
||
| 120 | */
|
||
| 121 | class SecurityComponentTest extends CakeTestCase { |
||
| 122 | |||
| 123 | /**
|
||
| 124 | * Controller property
|
||
| 125 | *
|
||
| 126 | * @var SecurityTestController
|
||
| 127 | */
|
||
| 128 | public $Controller; |
||
| 129 | |||
| 130 | /**
|
||
| 131 | * oldSalt property
|
||
| 132 | *
|
||
| 133 | * @var string
|
||
| 134 | */
|
||
| 135 | public $oldSalt; |
||
| 136 | |||
| 137 | /**
|
||
| 138 | * setUp method
|
||
| 139 | *
|
||
| 140 | * @return void
|
||
| 141 | */
|
||
| 142 | public function setUp() { |
||
| 143 | parent::setUp();
|
||
| 144 | |||
| 145 | $request = $this->getMock('CakeRequest', array('here'), array('posts/index', false)); |
||
| 146 | $request->addParams(array('controller' => 'posts', 'action' => 'index')); |
||
| 147 | $request->expects($this->any()) |
||
| 148 | ->method('here')
|
||
| 149 | ->will($this->returnValue('/posts/index')); |
||
| 150 | |||
| 151 | $this->Controller = new SecurityTestController($request); |
||
| 152 | $this->Controller->Components->init($this->Controller); |
||
| 153 | $this->Controller->Security = $this->Controller->TestSecurity; |
||
| 154 | $this->Controller->Security->blackHoleCallback = 'fail'; |
||
| 155 | $this->Security = $this->Controller->Security; |
||
| 156 | $this->Security->csrfCheck = false; |
||
| 157 | |||
| 158 | Configure::write('Security.salt', 'foo!'); |
||
| 159 | } |
||
| 160 | |||
| 161 | /**
|
||
| 162 | * Tear-down method. Resets environment state.
|
||
| 163 | *
|
||
| 164 | * @return void
|
||
| 165 | */
|
||
| 166 | public function tearDown() { |
||
| 167 | parent::tearDown();
|
||
| 168 | $this->Controller->Session->delete('_Token'); |
||
| 169 | unset($this->Controller->Security); |
||
| 170 | unset($this->Controller->Component); |
||
| 171 | unset($this->Controller); |
||
| 172 | } |
||
| 173 | |||
| 174 | /**
|
||
| 175 | * Test that requests are still blackholed when controller has incorrect
|
||
| 176 | * visibility keyword in the blackhole callback
|
||
| 177 | *
|
||
| 178 | * @expectedException BadRequestException
|
||
| 179 | * @return void
|
||
| 180 | */
|
||
| 181 | public function testBlackholeWithBrokenCallback() { |
||
| 182 | $request = new CakeRequest('posts/index', false); |
||
| 183 | $request->addParams(array( |
||
| 184 | 'controller' => 'posts', 'action' => 'index') |
||
| 185 | ); |
||
| 186 | $this->Controller = new BrokenCallbackController($request); |
||
| 187 | $this->Controller->Components->init($this->Controller); |
||
| 188 | $this->Controller->Security = $this->Controller->TestSecurity; |
||
| 189 | $this->Controller->Security->blackHoleCallback = '_fail'; |
||
| 190 | $this->Controller->Security->startup($this->Controller); |
||
| 191 | $this->Controller->Security->blackHole($this->Controller, 'csrf'); |
||
| 192 | } |
||
| 193 | |||
| 194 | /**
|
||
| 195 | * Ensure that directly requesting the blackholeCallback as the controller
|
||
| 196 | * action results in an exception.
|
||
| 197 | *
|
||
| 198 | * @return void
|
||
| 199 | */
|
||
| 200 | public function testExceptionWhenActionIsBlackholeCallback() { |
||
| 201 | $this->Controller->request->addParams(array( |
||
| 202 | 'controller' => 'posts', |
||
| 203 | 'action' => 'fail' |
||
| 204 | )); |
||
| 205 | $this->assertFalse($this->Controller->failed); |
||
| 206 | $this->Controller->Security->startup($this->Controller); |
||
| 207 | $this->assertTrue($this->Controller->failed, 'Request was blackholed.'); |
||
| 208 | } |
||
| 209 | |||
| 210 | /**
|
||
| 211 | * test that initialize can set properties.
|
||
| 212 | *
|
||
| 213 | * @return void
|
||
| 214 | */
|
||
| 215 | public function testConstructorSettingProperties() { |
||
| 216 | $settings = array( |
||
| 217 | 'requirePost' => array('edit', 'update'), |
||
| 218 | 'requireSecure' => array('update_account'), |
||
| 219 | 'requireGet' => array('index'), |
||
| 220 | 'validatePost' => false, |
||
| 221 | ); |
||
| 222 | $Security = new SecurityComponent($this->Controller->Components, $settings); |
||
| 223 | $this->Controller->Security->initialize($this->Controller, $settings); |
||
| 224 | $this->assertEquals($Security->requirePost, $settings['requirePost']); |
||
| 225 | $this->assertEquals($Security->requireSecure, $settings['requireSecure']); |
||
| 226 | $this->assertEquals($Security->requireGet, $settings['requireGet']); |
||
| 227 | $this->assertEquals($Security->validatePost, $settings['validatePost']); |
||
| 228 | } |
||
| 229 | |||
| 230 | /**
|
||
| 231 | * testStartup method
|
||
| 232 | *
|
||
| 233 | * @return void
|
||
| 234 | */
|
||
| 235 | public function testStartup() { |
||
| 236 | $this->Controller->Security->startup($this->Controller); |
||
| 237 | $result = $this->Controller->params['_Token']['key']; |
||
| 238 | $this->assertNotNull($result); |
||
| 239 | $this->assertTrue($this->Controller->Session->check('_Token')); |
||
| 240 | } |
||
| 241 | |||
| 242 | /**
|
||
| 243 | * testRequirePostFail method
|
||
| 244 | *
|
||
| 245 | * @return void
|
||
| 246 | */
|
||
| 247 | public function testRequirePostFail() { |
||
| 248 | $_SERVER['REQUEST_METHOD'] = 'GET'; |
||
| 249 | $this->Controller->request['action'] = 'posted'; |
||
| 250 | $this->Controller->Security->requirePost(array('posted')); |
||
| 251 | $this->Controller->Security->startup($this->Controller); |
||
| 252 | $this->assertTrue($this->Controller->failed); |
||
| 253 | } |
||
| 254 | |||
| 255 | /**
|
||
| 256 | * testRequirePostSucceed method
|
||
| 257 | *
|
||
| 258 | * @return void
|
||
| 259 | */
|
||
| 260 | public function testRequirePostSucceed() { |
||
| 261 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 262 | $this->Controller->request['action'] = 'posted'; |
||
| 263 | $this->Controller->Security->requirePost('posted'); |
||
| 264 | $this->Security->startup($this->Controller); |
||
| 265 | $this->assertFalse($this->Controller->failed); |
||
| 266 | } |
||
| 267 | |||
| 268 | /**
|
||
| 269 | * testRequireSecureFail method
|
||
| 270 | *
|
||
| 271 | * @return void
|
||
| 272 | */
|
||
| 273 | public function testRequireSecureFail() { |
||
| 274 | $_SERVER['HTTPS'] = 'off'; |
||
| 275 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 276 | $this->Controller->request['action'] = 'posted'; |
||
| 277 | $this->Controller->Security->requireSecure(array('posted')); |
||
| 278 | $this->Controller->Security->startup($this->Controller); |
||
| 279 | $this->assertTrue($this->Controller->failed); |
||
| 280 | } |
||
| 281 | |||
| 282 | /**
|
||
| 283 | * testRequireSecureSucceed method
|
||
| 284 | *
|
||
| 285 | * @return void
|
||
| 286 | */
|
||
| 287 | public function testRequireSecureSucceed() { |
||
| 288 | $_SERVER['REQUEST_METHOD'] = 'Secure'; |
||
| 289 | $this->Controller->request['action'] = 'posted'; |
||
| 290 | $_SERVER['HTTPS'] = 'on'; |
||
| 291 | $this->Controller->Security->requireSecure('posted'); |
||
| 292 | $this->Controller->Security->startup($this->Controller); |
||
| 293 | $this->assertFalse($this->Controller->failed); |
||
| 294 | } |
||
| 295 | |||
| 296 | /**
|
||
| 297 | * testRequireAuthFail method
|
||
| 298 | *
|
||
| 299 | * @return void
|
||
| 300 | */
|
||
| 301 | public function testRequireAuthFail() { |
||
| 302 | $_SERVER['REQUEST_METHOD'] = 'AUTH'; |
||
| 303 | $this->Controller->request['action'] = 'posted'; |
||
| 304 | $this->Controller->request->data = array('username' => 'willy', 'password' => 'somePass'); |
||
| 305 | $this->Controller->Security->requireAuth(array('posted')); |
||
| 306 | $this->Controller->Security->startup($this->Controller); |
||
| 307 | $this->assertTrue($this->Controller->failed); |
||
| 308 | |||
| 309 | $this->Controller->Session->write('_Token', array('allowedControllers' => array())); |
||
| 310 | $this->Controller->request->data = array('username' => 'willy', 'password' => 'somePass'); |
||
| 311 | $this->Controller->request['action'] = 'posted'; |
||
| 312 | $this->Controller->Security->requireAuth('posted'); |
||
| 313 | $this->Controller->Security->startup($this->Controller); |
||
| 314 | $this->assertTrue($this->Controller->failed); |
||
| 315 | |||
| 316 | $this->Controller->Session->write('_Token', array( |
||
| 317 | 'allowedControllers' => array('SecurityTest'), 'allowedActions' => array('posted2') |
||
| 318 | )); |
||
| 319 | $this->Controller->request->data = array('username' => 'willy', 'password' => 'somePass'); |
||
| 320 | $this->Controller->request['action'] = 'posted'; |
||
| 321 | $this->Controller->Security->requireAuth('posted'); |
||
| 322 | $this->Controller->Security->startup($this->Controller); |
||
| 323 | $this->assertTrue($this->Controller->failed); |
||
| 324 | } |
||
| 325 | |||
| 326 | /**
|
||
| 327 | * testRequireAuthSucceed method
|
||
| 328 | *
|
||
| 329 | * @return void
|
||
| 330 | */
|
||
| 331 | public function testRequireAuthSucceed() { |
||
| 332 | $_SERVER['REQUEST_METHOD'] = 'AUTH'; |
||
| 333 | $this->Controller->Security->unlockedActions = array('posted'); |
||
| 334 | $this->Controller->request['action'] = 'posted'; |
||
| 335 | $this->Controller->Security->requireAuth('posted'); |
||
| 336 | $this->Controller->Security->startup($this->Controller); |
||
| 337 | $this->assertFalse($this->Controller->failed); |
||
| 338 | |||
| 339 | $this->Controller->Security->Session->write('_Token', array( |
||
| 340 | 'allowedControllers' => array('SecurityTest'), |
||
| 341 | 'allowedActions' => array('posted') |
||
| 342 | )); |
||
| 343 | $this->Controller->request['controller'] = 'SecurityTest'; |
||
| 344 | $this->Controller->request['action'] = 'posted'; |
||
| 345 | |||
| 346 | $this->Controller->request->data = array( |
||
| 347 | 'username' => 'willy', |
||
| 348 | 'password' => 'somePass', |
||
| 349 | '_Token' => '' |
||
| 350 | ); |
||
| 351 | $this->Controller->action = 'posted'; |
||
| 352 | $this->Controller->Security->requireAuth('posted'); |
||
| 353 | $this->Controller->Security->startup($this->Controller); |
||
| 354 | $this->assertFalse($this->Controller->failed); |
||
| 355 | } |
||
| 356 | |||
| 357 | /**
|
||
| 358 | * testRequirePostSucceedWrongMethod method
|
||
| 359 | *
|
||
| 360 | * @return void
|
||
| 361 | */
|
||
| 362 | public function testRequirePostSucceedWrongMethod() { |
||
| 363 | $_SERVER['REQUEST_METHOD'] = 'GET'; |
||
| 364 | $this->Controller->request['action'] = 'getted'; |
||
| 365 | $this->Controller->Security->requirePost('posted'); |
||
| 366 | $this->Controller->Security->startup($this->Controller); |
||
| 367 | $this->assertFalse($this->Controller->failed); |
||
| 368 | } |
||
| 369 | |||
| 370 | /**
|
||
| 371 | * testRequireGetFail method
|
||
| 372 | *
|
||
| 373 | * @return void
|
||
| 374 | */
|
||
| 375 | public function testRequireGetFail() { |
||
| 376 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 377 | $this->Controller->request['action'] = 'getted'; |
||
| 378 | $this->Controller->Security->requireGet(array('getted')); |
||
| 379 | $this->Controller->Security->startup($this->Controller); |
||
| 380 | $this->assertTrue($this->Controller->failed); |
||
| 381 | } |
||
| 382 | |||
| 383 | /**
|
||
| 384 | * testRequireGetSucceed method
|
||
| 385 | *
|
||
| 386 | * @return void
|
||
| 387 | */
|
||
| 388 | public function testRequireGetSucceed() { |
||
| 389 | $_SERVER['REQUEST_METHOD'] = 'GET'; |
||
| 390 | $this->Controller->request['action'] = 'getted'; |
||
| 391 | $this->Controller->Security->requireGet('getted'); |
||
| 392 | $this->Controller->Security->startup($this->Controller); |
||
| 393 | $this->assertFalse($this->Controller->failed); |
||
| 394 | } |
||
| 395 | |||
| 396 | /**
|
||
| 397 | * testRequireGetSucceedWrongMethod method
|
||
| 398 | *
|
||
| 399 | * @return void
|
||
| 400 | */
|
||
| 401 | public function testRequireGetSucceedWrongMethod() { |
||
| 402 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 403 | $this->Controller->request['action'] = 'posted'; |
||
| 404 | $this->Security->requireGet('getted'); |
||
| 405 | $this->Security->startup($this->Controller); |
||
| 406 | $this->assertFalse($this->Controller->failed); |
||
| 407 | } |
||
| 408 | |||
| 409 | /**
|
||
| 410 | * testRequirePutFail method
|
||
| 411 | *
|
||
| 412 | * @return void
|
||
| 413 | */
|
||
| 414 | public function testRequirePutFail() { |
||
| 415 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 416 | $this->Controller->request['action'] = 'putted'; |
||
| 417 | $this->Controller->Security->requirePut(array('putted')); |
||
| 418 | $this->Controller->Security->startup($this->Controller); |
||
| 419 | $this->assertTrue($this->Controller->failed); |
||
| 420 | } |
||
| 421 | |||
| 422 | /**
|
||
| 423 | * testRequirePutSucceed method
|
||
| 424 | *
|
||
| 425 | * @return void
|
||
| 426 | */
|
||
| 427 | public function testRequirePutSucceed() { |
||
| 428 | $_SERVER['REQUEST_METHOD'] = 'PUT'; |
||
| 429 | $this->Controller->request['action'] = 'putted'; |
||
| 430 | $this->Controller->Security->requirePut('putted'); |
||
| 431 | $this->Controller->Security->startup($this->Controller); |
||
| 432 | $this->assertFalse($this->Controller->failed); |
||
| 433 | } |
||
| 434 | |||
| 435 | /**
|
||
| 436 | * testRequirePutSucceedWrongMethod method
|
||
| 437 | *
|
||
| 438 | * @return void
|
||
| 439 | */
|
||
| 440 | public function testRequirePutSucceedWrongMethod() { |
||
| 441 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 442 | $this->Controller->request['action'] = 'posted'; |
||
| 443 | $this->Controller->Security->requirePut('putted'); |
||
| 444 | $this->Controller->Security->startup($this->Controller); |
||
| 445 | $this->assertFalse($this->Controller->failed); |
||
| 446 | } |
||
| 447 | |||
| 448 | /**
|
||
| 449 | * testRequireDeleteFail method
|
||
| 450 | *
|
||
| 451 | * @return void
|
||
| 452 | */
|
||
| 453 | public function testRequireDeleteFail() { |
||
| 454 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 455 | $this->Controller->request['action'] = 'deleted'; |
||
| 456 | $this->Controller->Security->requireDelete(array('deleted', 'other_method')); |
||
| 457 | $this->Controller->Security->startup($this->Controller); |
||
| 458 | $this->assertTrue($this->Controller->failed); |
||
| 459 | } |
||
| 460 | |||
| 461 | /**
|
||
| 462 | * testRequireDeleteSucceed method
|
||
| 463 | *
|
||
| 464 | * @return void
|
||
| 465 | */
|
||
| 466 | public function testRequireDeleteSucceed() { |
||
| 467 | $_SERVER['REQUEST_METHOD'] = 'DELETE'; |
||
| 468 | $this->Controller->request['action'] = 'deleted'; |
||
| 469 | $this->Controller->Security->requireDelete('deleted'); |
||
| 470 | $this->Controller->Security->startup($this->Controller); |
||
| 471 | $this->assertFalse($this->Controller->failed); |
||
| 472 | } |
||
| 473 | |||
| 474 | /**
|
||
| 475 | * testRequireDeleteSucceedWrongMethod method
|
||
| 476 | *
|
||
| 477 | * @return void
|
||
| 478 | */
|
||
| 479 | public function testRequireDeleteSucceedWrongMethod() { |
||
| 480 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 481 | $this->Controller->request['action'] = 'posted'; |
||
| 482 | $this->Controller->Security->requireDelete('deleted'); |
||
| 483 | $this->Controller->Security->startup($this->Controller); |
||
| 484 | $this->assertFalse($this->Controller->failed); |
||
| 485 | } |
||
| 486 | |||
| 487 | /**
|
||
| 488 | * Test that validatePost fires on GET with request data.
|
||
| 489 | * This could happen when method overriding is used.
|
||
| 490 | *
|
||
| 491 | * @return void
|
||
| 492 | * @triggers Controller.startup $this->Controller
|
||
| 493 | */
|
||
| 494 | public function testValidatePostOnGetWithData() { |
||
| 495 | $_SERVER['REQUEST_METHOD'] = 'GET'; |
||
| 496 | $this->Controller->Security->startup($this->Controller); |
||
| 497 | |||
| 498 | $fields = 'an-invalid-token'; |
||
| 499 | $unlocked = ''; |
||
| 500 | |||
| 501 | $this->Controller->request->data = [ |
||
| 502 | 'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'), |
||
| 503 | '_Token' => compact('fields', 'unlocked') |
||
| 504 | ]; |
||
| 505 | $this->assertFalse($this->Controller->failed, 'Should not be failed yet'); |
||
| 506 | $this->Controller->Security->startup($this->Controller); |
||
| 507 | $this->assertTrue($this->Controller->failed, 'Should fail because of validatePost.'); |
||
| 508 | } |
||
| 509 | |||
| 510 | /**
|
||
| 511 | * Simple hash validation test
|
||
| 512 | *
|
||
| 513 | * @return void
|
||
| 514 | */
|
||
| 515 | public function testValidatePost() { |
||
| 516 | $this->Controller->Security->startup($this->Controller); |
||
| 517 | |||
| 518 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 519 | $fields = '01c1f6dbba02ac6f21b229eab1cc666839b14303%3AModel.valid'; |
||
| 520 | $unlocked = ''; |
||
| 521 | |||
| 522 | $this->Controller->request->data = array( |
||
| 523 | 'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'), |
||
| 524 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 525 | ); |
||
| 526 | $this->assertTrue($this->Controller->Security->validatePost($this->Controller)); |
||
| 527 | } |
||
| 528 | |||
| 529 | /**
|
||
| 530 | * Test that validatePost fails if you are missing the session information.
|
||
| 531 | *
|
||
| 532 | * @return void
|
||
| 533 | */
|
||
| 534 | public function testValidatePostNoSession() { |
||
| 535 | $this->Controller->Security->startup($this->Controller); |
||
| 536 | $this->Controller->Session->delete('_Token'); |
||
| 537 | |||
| 538 | $key = $this->Controller->params['_Token']['key']; |
||
| 539 | $fields = 'a5475372b40f6e3ccbf9f8af191f20e1642fd877%3AModel.valid'; |
||
| 540 | |||
| 541 | $this->Controller->data = array( |
||
| 542 | 'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'), |
||
| 543 | '_Token' => compact('key', 'fields') |
||
| 544 | ); |
||
| 545 | $this->assertFalse($this->Controller->Security->validatePost($this->Controller)); |
||
| 546 | } |
||
| 547 | |||
| 548 | /**
|
||
| 549 | * test that validatePost fails if any of its required fields are missing.
|
||
| 550 | *
|
||
| 551 | * @return void
|
||
| 552 | */
|
||
| 553 | public function testValidatePostFormHacking() { |
||
| 554 | $this->Controller->Security->startup($this->Controller); |
||
| 555 | $key = $this->Controller->params['_Token']['key']; |
||
| 556 | $unlocked = ''; |
||
| 557 | |||
| 558 | $this->Controller->request->data = array( |
||
| 559 | 'Model' => array('username' => 'nate', 'password' => 'foo', 'valid' => '0'), |
||
| 560 | '_Token' => compact('key', 'unlocked') |
||
| 561 | ); |
||
| 562 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 563 | $this->assertFalse($result, 'validatePost passed when fields were missing. %s'); |
||
| 564 | } |
||
| 565 | |||
| 566 | /**
|
||
| 567 | * Test that objects can't be passed into the serialized string. This was a vector for RFI and LFI
|
||
| 568 | * attacks. Thanks to Felix Wilhelm
|
||
| 569 | *
|
||
| 570 | * @return void
|
||
| 571 | */
|
||
| 572 | public function testValidatePostObjectDeserialize() { |
||
| 573 | $this->Controller->Security->startup($this->Controller); |
||
| 574 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 575 | $fields = 'a5475372b40f6e3ccbf9f8af191f20e1642fd877'; |
||
| 576 | $unlocked = ''; |
||
| 577 | |||
| 578 | // a corrupted serialized object, so we can see if it ever gets to deserialize
|
||
| 579 | $attack = 'O:3:"App":1:{s:5:"__map";a:1:{s:3:"foo";s:7:"Hacked!";s:1:"fail"}}'; |
||
| 580 | $fields .= urlencode(':' . str_rot13($attack)); |
||
| 581 | |||
| 582 | $this->Controller->request->data = array( |
||
| 583 | 'Model' => array('username' => 'mark', 'password' => 'foo', 'valid' => '0'), |
||
| 584 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 585 | ); |
||
| 586 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 587 | $this->assertFalse($result, 'validatePost passed when key was missing. %s'); |
||
| 588 | } |
||
| 589 | |||
| 590 | /**
|
||
| 591 | * Tests validation of checkbox arrays
|
||
| 592 | *
|
||
| 593 | * @return void
|
||
| 594 | */
|
||
| 595 | public function testValidatePostArray() { |
||
| 596 | $this->Controller->Security->startup($this->Controller); |
||
| 597 | |||
| 598 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 599 | $fields = '38504e4a341d4e6eadb437217efd91270e558d55%3A'; |
||
| 600 | $unlocked = ''; |
||
| 601 | |||
| 602 | $this->Controller->request->data = array( |
||
| 603 | 'Model' => array('multi_field' => array('1', '3')), |
||
| 604 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 605 | ); |
||
| 606 | $this->assertTrue($this->Controller->Security->validatePost($this->Controller)); |
||
| 607 | } |
||
| 608 | |||
| 609 | /**
|
||
| 610 | * testValidatePostNoModel method
|
||
| 611 | *
|
||
| 612 | * @return void
|
||
| 613 | */
|
||
| 614 | public function testValidatePostNoModel() { |
||
| 615 | $this->Controller->Security->startup($this->Controller); |
||
| 616 | |||
| 617 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 618 | $fields = 'c5bc49a6c938c820e7e538df3d8ab7bffbc97ef9%3A'; |
||
| 619 | $unlocked = ''; |
||
| 620 | |||
| 621 | $this->Controller->request->data = array( |
||
| 622 | 'anything' => 'some_data', |
||
| 623 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 624 | ); |
||
| 625 | |||
| 626 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 627 | $this->assertTrue($result); |
||
| 628 | } |
||
| 629 | |||
| 630 | /**
|
||
| 631 | * testValidatePostSimple method
|
||
| 632 | *
|
||
| 633 | * @return void
|
||
| 634 | */
|
||
| 635 | public function testValidatePostSimple() { |
||
| 636 | $this->Controller->Security->startup($this->Controller); |
||
| 637 | |||
| 638 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 639 | $fields = '5415d31b4483c1e09ddb58d2a91ba9650b12aa83%3A'; |
||
| 640 | $unlocked = ''; |
||
| 641 | |||
| 642 | $this->Controller->request->data = array( |
||
| 643 | 'Model' => array('username' => '', 'password' => ''), |
||
| 644 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 645 | ); |
||
| 646 | |||
| 647 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 648 | $this->assertTrue($result); |
||
| 649 | } |
||
| 650 | |||
| 651 | /**
|
||
| 652 | * Tests hash validation for multiple records, including locked fields
|
||
| 653 | *
|
||
| 654 | * @return void
|
||
| 655 | */
|
||
| 656 | public function testValidatePostComplex() { |
||
| 657 | $this->Controller->Security->startup($this->Controller); |
||
| 658 | |||
| 659 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 660 | $fields = 'b72a99e923687687bb5e64025d3cc65e1cecced4%3AAddresses.0.id%7CAddresses.1.id'; |
||
| 661 | $unlocked = ''; |
||
| 662 | |||
| 663 | $this->Controller->request->data = array( |
||
| 664 | 'Addresses' => array( |
||
| 665 | '0' => array( |
||
| 666 | 'id' => '123456', 'title' => '', 'first_name' => '', 'last_name' => '', |
||
| 667 | 'address' => '', 'city' => '', 'phone' => '', 'primary' => '' |
||
| 668 | ), |
||
| 669 | '1' => array( |
||
| 670 | 'id' => '654321', 'title' => '', 'first_name' => '', 'last_name' => '', |
||
| 671 | 'address' => '', 'city' => '', 'phone' => '', 'primary' => '' |
||
| 672 | ) |
||
| 673 | ), |
||
| 674 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 675 | ); |
||
| 676 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 677 | $this->assertTrue($result); |
||
| 678 | } |
||
| 679 | |||
| 680 | /**
|
||
| 681 | * test ValidatePost with multiple select elements.
|
||
| 682 | *
|
||
| 683 | * @return void
|
||
| 684 | */
|
||
| 685 | public function testValidatePostMultipleSelect() { |
||
| 686 | $this->Controller->Security->startup($this->Controller); |
||
| 687 | |||
| 688 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 689 | $fields = '8a764bdb989132c1d46f9a45f64ce2da5f9eebb9%3A'; |
||
| 690 | $unlocked = ''; |
||
| 691 | |||
| 692 | $this->Controller->request->data = array( |
||
| 693 | 'Tag' => array('Tag' => array(1, 2)), |
||
| 694 | '_Token' => compact('key', 'fields', 'unlocked'), |
||
| 695 | ); |
||
| 696 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 697 | $this->assertTrue($result); |
||
| 698 | |||
| 699 | $this->Controller->request->data = array( |
||
| 700 | 'Tag' => array('Tag' => array(1, 2, 3)), |
||
| 701 | '_Token' => compact('key', 'fields', 'unlocked'), |
||
| 702 | ); |
||
| 703 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 704 | $this->assertTrue($result); |
||
| 705 | |||
| 706 | $this->Controller->request->data = array( |
||
| 707 | 'Tag' => array('Tag' => array(1, 2, 3, 4)), |
||
| 708 | '_Token' => compact('key', 'fields', 'unlocked'), |
||
| 709 | ); |
||
| 710 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 711 | $this->assertTrue($result); |
||
| 712 | |||
| 713 | $fields = '722de3615e63fdff899e86e85e6498b11c50bb66%3A'; |
||
| 714 | $this->Controller->request->data = array( |
||
| 715 | 'User.password' => 'bar', 'User.name' => 'foo', 'User.is_valid' => '1', |
||
| 716 | 'Tag' => array('Tag' => array(1)), |
||
| 717 | '_Token' => compact('key', 'fields', 'unlocked'), |
||
| 718 | ); |
||
| 719 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 720 | $this->assertTrue($result); |
||
| 721 | } |
||
| 722 | |||
| 723 | /**
|
||
| 724 | * testValidatePostCheckbox method
|
||
| 725 | *
|
||
| 726 | * First block tests un-checked checkbox
|
||
| 727 | * Second block tests checked checkbox
|
||
| 728 | *
|
||
| 729 | * @return void
|
||
| 730 | */
|
||
| 731 | public function testValidatePostCheckbox() { |
||
| 732 | $this->Controller->Security->startup($this->Controller); |
||
| 733 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 734 | $fields = '01c1f6dbba02ac6f21b229eab1cc666839b14303%3AModel.valid'; |
||
| 735 | $unlocked = ''; |
||
| 736 | |||
| 737 | $this->Controller->request->data = array( |
||
| 738 | 'Model' => array('username' => '', 'password' => '', 'valid' => '0'), |
||
| 739 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 740 | ); |
||
| 741 | |||
| 742 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 743 | $this->assertTrue($result); |
||
| 744 | |||
| 745 | $fields = 'efbcf463a2c31e97c85d95eedc41dff9e9c6a026%3A'; |
||
| 746 | |||
| 747 | $this->Controller->request->data = array( |
||
| 748 | 'Model' => array('username' => '', 'password' => '', 'valid' => '0'), |
||
| 749 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 750 | ); |
||
| 751 | |||
| 752 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 753 | $this->assertTrue($result); |
||
| 754 | |||
| 755 | $this->Controller->request->data = array(); |
||
| 756 | $this->Controller->Security->startup($this->Controller); |
||
| 757 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 758 | |||
| 759 | $this->Controller->request->data = array( |
||
| 760 | 'Model' => array('username' => '', 'password' => '', 'valid' => '0'), |
||
| 761 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 762 | ); |
||
| 763 | |||
| 764 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 765 | $this->assertTrue($result); |
||
| 766 | } |
||
| 767 | |||
| 768 | /**
|
||
| 769 | * testValidatePostHidden method
|
||
| 770 | *
|
||
| 771 | * @return void
|
||
| 772 | */
|
||
| 773 | public function testValidatePostHidden() { |
||
| 774 | $this->Controller->Security->startup($this->Controller); |
||
| 775 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 776 | $fields = 'baaf832a714b39a0618238ac89c7065fc8ec853e%3AModel.hidden%7CModel.other_hidden'; |
||
| 777 | $unlocked = ''; |
||
| 778 | |||
| 779 | $this->Controller->request->data = array( |
||
| 780 | 'Model' => array( |
||
| 781 | 'username' => '', 'password' => '', 'hidden' => '0', |
||
| 782 | 'other_hidden' => 'some hidden value' |
||
| 783 | ), |
||
| 784 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 785 | ); |
||
| 786 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 787 | $this->assertTrue($result); |
||
| 788 | } |
||
| 789 | |||
| 790 | /**
|
||
| 791 | * testValidatePostWithDisabledFields method
|
||
| 792 | *
|
||
| 793 | * @return void
|
||
| 794 | */
|
||
| 795 | public function testValidatePostWithDisabledFields() { |
||
| 796 | $this->Controller->Security->disabledFields = array('Model.username', 'Model.password'); |
||
| 797 | $this->Controller->Security->startup($this->Controller); |
||
| 798 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 799 | $fields = 'aa7f254ebd8bf2ef118bc5ca1e191d1ae96857f5%3AModel.hidden'; |
||
| 800 | $unlocked = ''; |
||
| 801 | |||
| 802 | $this->Controller->request->data = array( |
||
| 803 | 'Model' => array( |
||
| 804 | 'username' => '', 'password' => '', 'hidden' => '0' |
||
| 805 | ), |
||
| 806 | '_Token' => compact('fields', 'key', 'unlocked') |
||
| 807 | ); |
||
| 808 | |||
| 809 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 810 | $this->assertTrue($result); |
||
| 811 | } |
||
| 812 | |||
| 813 | /**
|
||
| 814 | * test validating post data with posted unlocked fields.
|
||
| 815 | *
|
||
| 816 | * @return void
|
||
| 817 | */
|
||
| 818 | public function testValidatePostDisabledFieldsInData() { |
||
| 819 | $this->Controller->Security->startup($this->Controller); |
||
| 820 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 821 | $unlocked = 'Model.username'; |
||
| 822 | $fields = array('Model.hidden', 'Model.password'); |
||
| 823 | $fields = urlencode(Security::hash( |
||
| 824 | '/posts/index' .
|
||
| 825 | serialize($fields) . |
||
| 826 | $unlocked .
|
||
| 827 | Configure::read('Security.salt')) |
||
| 828 | ); |
||
| 829 | |||
| 830 | $this->Controller->request->data = array( |
||
| 831 | 'Model' => array( |
||
| 832 | 'username' => 'mark', |
||
| 833 | 'password' => 'sekret', |
||
| 834 | 'hidden' => '0' |
||
| 835 | ), |
||
| 836 | '_Token' => compact('fields', 'key', 'unlocked') |
||
| 837 | ); |
||
| 838 | |||
| 839 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 840 | $this->assertTrue($result); |
||
| 841 | } |
||
| 842 | |||
| 843 | /**
|
||
| 844 | * test that missing 'unlocked' input causes failure
|
||
| 845 | *
|
||
| 846 | * @return void
|
||
| 847 | */
|
||
| 848 | public function testValidatePostFailNoDisabled() { |
||
| 849 | $this->Controller->Security->startup($this->Controller); |
||
| 850 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 851 | $fields = array('Model.hidden', 'Model.password', 'Model.username'); |
||
| 852 | $fields = urlencode(Security::hash(serialize($fields) . Configure::read('Security.salt'))); |
||
| 853 | |||
| 854 | $this->Controller->request->data = array( |
||
| 855 | 'Model' => array( |
||
| 856 | 'username' => 'mark', |
||
| 857 | 'password' => 'sekret', |
||
| 858 | 'hidden' => '0' |
||
| 859 | ), |
||
| 860 | '_Token' => compact('fields', 'key') |
||
| 861 | ); |
||
| 862 | |||
| 863 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 864 | $this->assertFalse($result); |
||
| 865 | } |
||
| 866 | |||
| 867 | /**
|
||
| 868 | * Test that validatePost fails when unlocked fields are changed.
|
||
| 869 | *
|
||
| 870 | * @return void
|
||
| 871 | */
|
||
| 872 | public function testValidatePostFailDisabledFieldTampering() { |
||
| 873 | $this->Controller->Security->startup($this->Controller); |
||
| 874 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 875 | $unlocked = 'Model.username'; |
||
| 876 | $fields = array('Model.hidden', 'Model.password'); |
||
| 877 | $fields = urlencode(Security::hash(serialize($fields) . $unlocked . Configure::read('Security.salt'))); |
||
| 878 | |||
| 879 | // Tamper the values.
|
||
| 880 | $unlocked = 'Model.username|Model.password'; |
||
| 881 | |||
| 882 | $this->Controller->request->data = array( |
||
| 883 | 'Model' => array( |
||
| 884 | 'username' => 'mark', |
||
| 885 | 'password' => 'sekret', |
||
| 886 | 'hidden' => '0' |
||
| 887 | ), |
||
| 888 | '_Token' => compact('fields', 'key', 'unlocked') |
||
| 889 | ); |
||
| 890 | |||
| 891 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 892 | $this->assertFalse($result); |
||
| 893 | } |
||
| 894 | |||
| 895 | /**
|
||
| 896 | * testValidateHiddenMultipleModel method
|
||
| 897 | *
|
||
| 898 | * @return void
|
||
| 899 | */
|
||
| 900 | public function testValidateHiddenMultipleModel() { |
||
| 901 | $this->Controller->Security->startup($this->Controller); |
||
| 902 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 903 | $fields = '38dd8a37bbb52e67ee4eb812bf1725a6a18b989b%3AModel.valid%7CModel2.valid%7CModel3.valid'; |
||
| 904 | $unlocked = ''; |
||
| 905 | |||
| 906 | $this->Controller->request->data = array( |
||
| 907 | 'Model' => array('username' => '', 'password' => '', 'valid' => '0'), |
||
| 908 | 'Model2' => array('valid' => '0'), |
||
| 909 | 'Model3' => array('valid' => '0'), |
||
| 910 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 911 | ); |
||
| 912 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 913 | $this->assertTrue($result); |
||
| 914 | } |
||
| 915 | |||
| 916 | /**
|
||
| 917 | * testValidateHasManyModel method
|
||
| 918 | *
|
||
| 919 | * @return void
|
||
| 920 | */
|
||
| 921 | public function testValidateHasManyModel() { |
||
| 922 | $this->Controller->Security->startup($this->Controller); |
||
| 923 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 924 | $fields = 'dcef68de6634c60d2e60484ad0e2faec003456e6%3AModel.0.hidden%7CModel.0.valid'; |
||
| 925 | $fields .= '%7CModel.1.hidden%7CModel.1.valid'; |
||
| 926 | $unlocked = ''; |
||
| 927 | |||
| 928 | $this->Controller->request->data = array( |
||
| 929 | 'Model' => array( |
||
| 930 | array(
|
||
| 931 | 'username' => 'username', 'password' => 'password', |
||
| 932 | 'hidden' => 'value', 'valid' => '0' |
||
| 933 | ), |
||
| 934 | array(
|
||
| 935 | 'username' => 'username', 'password' => 'password', |
||
| 936 | 'hidden' => 'value', 'valid' => '0' |
||
| 937 | ) |
||
| 938 | ), |
||
| 939 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 940 | ); |
||
| 941 | |||
| 942 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 943 | $this->assertTrue($result); |
||
| 944 | } |
||
| 945 | |||
| 946 | /**
|
||
| 947 | * testValidateHasManyRecordsPass method
|
||
| 948 | *
|
||
| 949 | * @return void
|
||
| 950 | */
|
||
| 951 | public function testValidateHasManyRecordsPass() { |
||
| 952 | $this->Controller->Security->startup($this->Controller); |
||
| 953 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 954 | $fields = '8b6880fbbd4b69279155f899652ecffdd9b4c5a1%3AAddress.0.id%7CAddress.0.primary%7C'; |
||
| 955 | $fields .= 'Address.1.id%7CAddress.1.primary'; |
||
| 956 | $unlocked = ''; |
||
| 957 | |||
| 958 | $this->Controller->request->data = array( |
||
| 959 | 'Address' => array( |
||
| 960 | 0 => array( |
||
| 961 | 'id' => '123', |
||
| 962 | 'title' => 'home', |
||
| 963 | 'first_name' => 'Bilbo', |
||
| 964 | 'last_name' => 'Baggins', |
||
| 965 | 'address' => '23 Bag end way', |
||
| 966 | 'city' => 'the shire', |
||
| 967 | 'phone' => 'N/A', |
||
| 968 | 'primary' => '1', |
||
| 969 | ), |
||
| 970 | 1 => array( |
||
| 971 | 'id' => '124', |
||
| 972 | 'title' => 'home', |
||
| 973 | 'first_name' => 'Frodo', |
||
| 974 | 'last_name' => 'Baggins', |
||
| 975 | 'address' => '50 Bag end way', |
||
| 976 | 'city' => 'the shire', |
||
| 977 | 'phone' => 'N/A', |
||
| 978 | 'primary' => '1' |
||
| 979 | ) |
||
| 980 | ), |
||
| 981 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 982 | ); |
||
| 983 | |||
| 984 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 985 | $this->assertTrue($result); |
||
| 986 | } |
||
| 987 | |||
| 988 | /**
|
||
| 989 | * Test that values like Foo.0.1
|
||
| 990 | *
|
||
| 991 | * @return void
|
||
| 992 | */
|
||
| 993 | public function testValidateNestedNumericSets() { |
||
| 994 | $this->Controller->Security->startup($this->Controller); |
||
| 995 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 996 | $unlocked = ''; |
||
| 997 | $hashFields = array('TaxonomyData'); |
||
| 998 | $fields = urlencode( |
||
| 999 | Security::hash( |
||
| 1000 | '/posts/index' .
|
||
| 1001 | serialize($hashFields) . |
||
| 1002 | $unlocked .
|
||
| 1003 | Configure::read('Security.salt'), 'sha1') |
||
| 1004 | ); |
||
| 1005 | |||
| 1006 | $this->Controller->request->data = array( |
||
| 1007 | 'TaxonomyData' => array( |
||
| 1008 | 1 => array(array(2)), |
||
| 1009 | 2 => array(array(3)) |
||
| 1010 | ), |
||
| 1011 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 1012 | ); |
||
| 1013 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1014 | $this->assertTrue($result); |
||
| 1015 | } |
||
| 1016 | |||
| 1017 | /**
|
||
| 1018 | * testValidateHasManyRecords method
|
||
| 1019 | *
|
||
| 1020 | * validatePost should fail, hidden fields have been changed.
|
||
| 1021 | *
|
||
| 1022 | * @return void
|
||
| 1023 | */
|
||
| 1024 | public function testValidateHasManyRecordsFail() { |
||
| 1025 | $this->Controller->Security->startup($this->Controller); |
||
| 1026 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 1027 | $fields = '7a203edb3d345bbf38fe0dccae960da8842e11d7%3AAddress.0.id%7CAddress.0.primary%7C'; |
||
| 1028 | $fields .= 'Address.1.id%7CAddress.1.primary'; |
||
| 1029 | $unlocked = ''; |
||
| 1030 | |||
| 1031 | $this->Controller->request->data = array( |
||
| 1032 | 'Address' => array( |
||
| 1033 | 0 => array( |
||
| 1034 | 'id' => '123', |
||
| 1035 | 'title' => 'home', |
||
| 1036 | 'first_name' => 'Bilbo', |
||
| 1037 | 'last_name' => 'Baggins', |
||
| 1038 | 'address' => '23 Bag end way', |
||
| 1039 | 'city' => 'the shire', |
||
| 1040 | 'phone' => 'N/A', |
||
| 1041 | 'primary' => '5', |
||
| 1042 | ), |
||
| 1043 | 1 => array( |
||
| 1044 | 'id' => '124', |
||
| 1045 | 'title' => 'home', |
||
| 1046 | 'first_name' => 'Frodo', |
||
| 1047 | 'last_name' => 'Baggins', |
||
| 1048 | 'address' => '50 Bag end way', |
||
| 1049 | 'city' => 'the shire', |
||
| 1050 | 'phone' => 'N/A', |
||
| 1051 | 'primary' => '1' |
||
| 1052 | ) |
||
| 1053 | ), |
||
| 1054 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 1055 | ); |
||
| 1056 | |||
| 1057 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1058 | $this->assertFalse($result); |
||
| 1059 | } |
||
| 1060 | |||
| 1061 | /**
|
||
| 1062 | * testFormDisabledFields method
|
||
| 1063 | *
|
||
| 1064 | * @return void
|
||
| 1065 | */
|
||
| 1066 | public function testFormDisabledFields() { |
||
| 1067 | $this->Controller->Security->startup($this->Controller); |
||
| 1068 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 1069 | $fields = '216ee717efd1a251a6d6e9efbb96005a9d09f1eb%3An%3A0%3A%7B%7D'; |
||
| 1070 | $unlocked = ''; |
||
| 1071 | |||
| 1072 | $this->Controller->request->data = array( |
||
| 1073 | 'MyModel' => array('name' => 'some data'), |
||
| 1074 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 1075 | ); |
||
| 1076 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1077 | $this->assertFalse($result); |
||
| 1078 | |||
| 1079 | $this->Controller->Security->startup($this->Controller); |
||
| 1080 | $this->Controller->Security->disabledFields = array('MyModel.name'); |
||
| 1081 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 1082 | |||
| 1083 | $this->Controller->request->data = array( |
||
| 1084 | 'MyModel' => array('name' => 'some data'), |
||
| 1085 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 1086 | ); |
||
| 1087 | |||
| 1088 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1089 | $this->assertTrue($result); |
||
| 1090 | } |
||
| 1091 | |||
| 1092 | /**
|
||
| 1093 | * testRadio method
|
||
| 1094 | *
|
||
| 1095 | * @return void
|
||
| 1096 | */
|
||
| 1097 | public function testValidatePostRadio() { |
||
| 1098 | $this->Controller->Security->startup($this->Controller); |
||
| 1099 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 1100 | $fields = '3be63770e7953c6d2119f5377a9303372040f66f%3An%3A0%3A%7B%7D'; |
||
| 1101 | $unlocked = ''; |
||
| 1102 | |||
| 1103 | $this->Controller->request->data = array( |
||
| 1104 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 1105 | ); |
||
| 1106 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1107 | $this->assertFalse($result); |
||
| 1108 | |||
| 1109 | $this->Controller->request->data = array( |
||
| 1110 | '_Token' => compact('key', 'fields', 'unlocked'), |
||
| 1111 | 'Test' => array('test' => '') |
||
| 1112 | ); |
||
| 1113 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1114 | $this->assertTrue($result); |
||
| 1115 | |||
| 1116 | $this->Controller->request->data = array( |
||
| 1117 | '_Token' => compact('key', 'fields', 'unlocked'), |
||
| 1118 | 'Test' => array('test' => '1') |
||
| 1119 | ); |
||
| 1120 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1121 | $this->assertTrue($result); |
||
| 1122 | |||
| 1123 | $this->Controller->request->data = array( |
||
| 1124 | '_Token' => compact('key', 'fields', 'unlocked'), |
||
| 1125 | 'Test' => array('test' => '2') |
||
| 1126 | ); |
||
| 1127 | $result = $this->Controller->Security->validatePost($this->Controller); |
||
| 1128 | $this->assertTrue($result); |
||
| 1129 | } |
||
| 1130 | |||
| 1131 | /**
|
||
| 1132 | * test validatePost uses here() as a hash input.
|
||
| 1133 | *
|
||
| 1134 | * @return void
|
||
| 1135 | */
|
||
| 1136 | public function testValidatePostUrlAsHashInput() { |
||
| 1137 | $this->Controller->Security->startup($this->Controller); |
||
| 1138 | |||
| 1139 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 1140 | $fields = '5415d31b4483c1e09ddb58d2a91ba9650b12aa83%3A'; |
||
| 1141 | $unlocked = ''; |
||
| 1142 | |||
| 1143 | $this->Controller->request->data = array( |
||
| 1144 | 'Model' => array('username' => '', 'password' => ''), |
||
| 1145 | '_Token' => compact('key', 'fields', 'unlocked') |
||
| 1146 | ); |
||
| 1147 | $this->assertTrue($this->Controller->Security->validatePost($this->Controller)); |
||
| 1148 | |||
| 1149 | $request = $this->getMock('CakeRequest', array('here'), array('articles/edit/1', false)); |
||
| 1150 | $request->expects($this->at(0)) |
||
| 1151 | ->method('here')
|
||
| 1152 | ->will($this->returnValue('/posts/index?page=1')); |
||
| 1153 | $request->expects($this->at(1)) |
||
| 1154 | ->method('here')
|
||
| 1155 | ->will($this->returnValue('/posts/edit/1')); |
||
| 1156 | |||
| 1157 | $this->Controller->Security->request = $request; |
||
| 1158 | $this->assertFalse($this->Controller->Security->validatePost($this->Controller)); |
||
| 1159 | $this->assertFalse($this->Controller->Security->validatePost($this->Controller)); |
||
| 1160 | } |
||
| 1161 | |||
| 1162 | /**
|
||
| 1163 | * test that a requestAction's controller will have the _Token appended to
|
||
| 1164 | * the params.
|
||
| 1165 | *
|
||
| 1166 | * @return void
|
||
| 1167 | * @see https://cakephp.lighthouseapp.com/projects/42648/tickets/68
|
||
| 1168 | */
|
||
| 1169 | public function testSettingTokenForRequestAction() { |
||
| 1170 | $this->Controller->Security->startup($this->Controller); |
||
| 1171 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 1172 | |||
| 1173 | $this->Controller->params['requested'] = 1; |
||
| 1174 | unset($this->Controller->request->params['_Token']); |
||
| 1175 | |||
| 1176 | $this->Controller->Security->startup($this->Controller); |
||
| 1177 | $this->assertEquals($this->Controller->request->params['_Token']['key'], $key); |
||
| 1178 | } |
||
| 1179 | |||
| 1180 | /**
|
||
| 1181 | * test that blackhole doesn't delete the _Token session key so repeat data submissions
|
||
| 1182 | * stay blackholed.
|
||
| 1183 | *
|
||
| 1184 | * @link https://cakephp.lighthouseapp.com/projects/42648/tickets/214
|
||
| 1185 | * @return void
|
||
| 1186 | */
|
||
| 1187 | public function testBlackHoleNotDeletingSessionInformation() { |
||
| 1188 | $this->Controller->Security->startup($this->Controller); |
||
| 1189 | |||
| 1190 | $this->Controller->Security->blackHole($this->Controller, 'auth'); |
||
| 1191 | $this->assertTrue($this->Controller->Security->Session->check('_Token'), '_Token was deleted by blackHole %s'); |
||
| 1192 | } |
||
| 1193 | |||
| 1194 | /**
|
||
| 1195 | * test that csrf checks are skipped for request action.
|
||
| 1196 | *
|
||
| 1197 | * @return void
|
||
| 1198 | */
|
||
| 1199 | public function testCsrfSkipRequestAction() { |
||
| 1200 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 1201 | |||
| 1202 | $this->Security->validatePost = false; |
||
| 1203 | $this->Security->csrfCheck = true; |
||
| 1204 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1205 | $this->Controller->request->params['requested'] = 1; |
||
| 1206 | $this->Security->startup($this->Controller); |
||
| 1207 | |||
| 1208 | $this->assertFalse($this->Controller->failed, 'fail() was called.'); |
||
| 1209 | } |
||
| 1210 | |||
| 1211 | /**
|
||
| 1212 | * test setting
|
||
| 1213 | *
|
||
| 1214 | * @return void
|
||
| 1215 | */
|
||
| 1216 | public function testCsrfSettings() { |
||
| 1217 | $this->Security->validatePost = false; |
||
| 1218 | $this->Security->csrfCheck = true; |
||
| 1219 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1220 | $this->Security->startup($this->Controller); |
||
| 1221 | |||
| 1222 | $token = $this->Security->Session->read('_Token'); |
||
| 1223 | $this->assertEquals(1, count($token['csrfTokens']), 'Missing the csrf token.'); |
||
| 1224 | $this->assertEquals(strtotime('+10 minutes'), current($token['csrfTokens']), 'Token expiry does not match'); |
||
| 1225 | $this->assertEquals(array('key', 'unlockedFields'), array_keys($this->Controller->request->params['_Token']), 'Keys don not match'); |
||
| 1226 | } |
||
| 1227 | |||
| 1228 | /**
|
||
| 1229 | * Test setting multiple nonces, when startup() is called more than once, (ie more than one request.)
|
||
| 1230 | *
|
||
| 1231 | * @return void
|
||
| 1232 | */
|
||
| 1233 | public function testCsrfSettingMultipleNonces() { |
||
| 1234 | $this->Security->validatePost = false; |
||
| 1235 | $this->Security->csrfCheck = true; |
||
| 1236 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1237 | $csrfExpires = strtotime('+10 minutes'); |
||
| 1238 | $this->Security->startup($this->Controller); |
||
| 1239 | $this->Security->startup($this->Controller); |
||
| 1240 | |||
| 1241 | $token = $this->Security->Session->read('_Token'); |
||
| 1242 | $this->assertEquals(2, count($token['csrfTokens']), 'Missing the csrf token.'); |
||
| 1243 | foreach ($token['csrfTokens'] as $expires) { |
||
| 1244 | $this->assertWithinMargin($expires, $csrfExpires, 2, 'Token expiry does not match'); |
||
| 1245 | } |
||
| 1246 | } |
||
| 1247 | |||
| 1248 | /**
|
||
| 1249 | * test that nonces are consumed by form submits.
|
||
| 1250 | *
|
||
| 1251 | * @return void
|
||
| 1252 | */
|
||
| 1253 | public function testCsrfNonceConsumption() { |
||
| 1254 | $this->Security->validatePost = false; |
||
| 1255 | $this->Security->csrfCheck = true; |
||
| 1256 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1257 | |||
| 1258 | $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('+10 minutes'))); |
||
| 1259 | |||
| 1260 | $this->Controller->request->params['action'] = 'index'; |
||
| 1261 | $this->Controller->request->data = array( |
||
| 1262 | '_Token' => array( |
||
| 1263 | 'key' => 'nonce1' |
||
| 1264 | ), |
||
| 1265 | 'Post' => array( |
||
| 1266 | 'title' => 'Woot' |
||
| 1267 | ) |
||
| 1268 | ); |
||
| 1269 | $this->Security->startup($this->Controller); |
||
| 1270 | $token = $this->Security->Session->read('_Token'); |
||
| 1271 | $this->assertFalse(isset($token['csrfTokens']['nonce1']), 'Token was not consumed'); |
||
| 1272 | } |
||
| 1273 | |||
| 1274 | /**
|
||
| 1275 | * tests that reusable CSRF-token expiry is renewed
|
||
| 1276 | */
|
||
| 1277 | public function testCsrfReusableTokenRenewal() { |
||
| 1278 | $this->Security->validatePost = false; |
||
| 1279 | $this->Security->csrfCheck = true; |
||
| 1280 | $this->Security->csrfUseOnce = false; |
||
| 1281 | $csrfExpires = '+10 minutes'; |
||
| 1282 | $this->Security->csrfExpires = $csrfExpires; |
||
| 1283 | |||
| 1284 | $this->Security->Session->write('_Token.csrfTokens', array('token' => strtotime('+1 minutes'))); |
||
| 1285 | |||
| 1286 | $this->Security->startup($this->Controller); |
||
| 1287 | $tokens = $this->Security->Session->read('_Token.csrfTokens'); |
||
| 1288 | $this->assertWithinMargin($tokens['token'], strtotime($csrfExpires), 2, 'Token expiry was not renewed'); |
||
| 1289 | } |
||
| 1290 | |||
| 1291 | /**
|
||
| 1292 | * test that expired values in the csrfTokens are cleaned up.
|
||
| 1293 | *
|
||
| 1294 | * @return void
|
||
| 1295 | */
|
||
| 1296 | public function testCsrfNonceVacuum() { |
||
| 1297 | $this->Security->validatePost = false; |
||
| 1298 | $this->Security->csrfCheck = true; |
||
| 1299 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1300 | |||
| 1301 | $this->Security->Session->write('_Token.csrfTokens', array( |
||
| 1302 | 'valid' => strtotime('+30 minutes'), |
||
| 1303 | 'poof' => strtotime('-11 minutes'), |
||
| 1304 | 'dust' => strtotime('-20 minutes') |
||
| 1305 | )); |
||
| 1306 | $this->Security->startup($this->Controller); |
||
| 1307 | $tokens = $this->Security->Session->read('_Token.csrfTokens'); |
||
| 1308 | $this->assertEquals(2, count($tokens), 'Too many tokens left behind'); |
||
| 1309 | $this->assertNotEmpty('valid', $tokens, 'Valid token was removed.'); |
||
| 1310 | } |
||
| 1311 | |||
| 1312 | /**
|
||
| 1313 | * test that when the key is missing the request is blackHoled
|
||
| 1314 | *
|
||
| 1315 | * @return void
|
||
| 1316 | */
|
||
| 1317 | public function testCsrfBlackHoleOnKeyMismatch() { |
||
| 1318 | $this->Security->validatePost = false; |
||
| 1319 | $this->Security->csrfCheck = true; |
||
| 1320 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1321 | |||
| 1322 | $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('+10 minutes'))); |
||
| 1323 | |||
| 1324 | $this->Controller->request->params['action'] = 'index'; |
||
| 1325 | $this->Controller->request->data = array( |
||
| 1326 | '_Token' => array( |
||
| 1327 | 'key' => 'not the right value' |
||
| 1328 | ), |
||
| 1329 | 'Post' => array( |
||
| 1330 | 'title' => 'Woot' |
||
| 1331 | ) |
||
| 1332 | ); |
||
| 1333 | $this->Security->startup($this->Controller); |
||
| 1334 | $this->assertTrue($this->Controller->failed, 'fail() was not called.'); |
||
| 1335 | } |
||
| 1336 | |||
| 1337 | /**
|
||
| 1338 | * test that when the key is missing the request is blackHoled
|
||
| 1339 | *
|
||
| 1340 | * @return void
|
||
| 1341 | */
|
||
| 1342 | public function testCsrfBlackHoleOnExpiredKey() { |
||
| 1343 | $this->Security->validatePost = false; |
||
| 1344 | $this->Security->csrfCheck = true; |
||
| 1345 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1346 | |||
| 1347 | $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('-5 minutes'))); |
||
| 1348 | |||
| 1349 | $this->Controller->request->params['action'] = 'index'; |
||
| 1350 | $this->Controller->request->data = array( |
||
| 1351 | '_Token' => array( |
||
| 1352 | 'key' => 'nonce1' |
||
| 1353 | ), |
||
| 1354 | 'Post' => array( |
||
| 1355 | 'title' => 'Woot' |
||
| 1356 | ) |
||
| 1357 | ); |
||
| 1358 | $this->Security->startup($this->Controller); |
||
| 1359 | $this->assertTrue($this->Controller->failed, 'fail() was not called.'); |
||
| 1360 | } |
||
| 1361 | |||
| 1362 | /**
|
||
| 1363 | * test that csrfUseOnce = false works.
|
||
| 1364 | *
|
||
| 1365 | * @return void
|
||
| 1366 | */
|
||
| 1367 | public function testCsrfNotUseOnce() { |
||
| 1368 | $this->Security->validatePost = false; |
||
| 1369 | $this->Security->csrfCheck = true; |
||
| 1370 | $this->Security->csrfUseOnce = false; |
||
| 1371 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1372 | |||
| 1373 | // Generate one token
|
||
| 1374 | $this->Security->startup($this->Controller); |
||
| 1375 | $token = $this->Security->Session->read('_Token.csrfTokens'); |
||
| 1376 | $this->assertEquals(1, count($token), 'Should only be one token.'); |
||
| 1377 | |||
| 1378 | $this->Security->startup($this->Controller); |
||
| 1379 | $tokenTwo = $this->Security->Session->read('_Token.csrfTokens'); |
||
| 1380 | $this->assertEquals(1, count($tokenTwo), 'Should only be one token.'); |
||
| 1381 | $this->assertEquals($token, $tokenTwo, 'Tokens should not be different.'); |
||
| 1382 | |||
| 1383 | $key = $this->Controller->request->params['_Token']['key']; |
||
| 1384 | $this->assertEquals(array($key), array_keys($token), '_Token.key and csrfToken do not match request will blackhole.'); |
||
| 1385 | } |
||
| 1386 | |||
| 1387 | /**
|
||
| 1388 | * ensure that longer session tokens are not consumed
|
||
| 1389 | *
|
||
| 1390 | * @return void
|
||
| 1391 | */
|
||
| 1392 | public function testCsrfNotUseOnceValidationLeavingToken() { |
||
| 1393 | $this->Security->validatePost = false; |
||
| 1394 | $this->Security->csrfCheck = true; |
||
| 1395 | $this->Security->csrfUseOnce = false; |
||
| 1396 | $this->Security->csrfExpires = '+10 minutes'; |
||
| 1397 | |||
| 1398 | $this->Security->Session->write('_Token.csrfTokens', array('nonce1' => strtotime('+10 minutes'))); |
||
| 1399 | |||
| 1400 | $this->Controller->request = $this->getMock('CakeRequest', array('is')); |
||
| 1401 | $this->Controller->request->params['action'] = 'index'; |
||
| 1402 | $this->Controller->request->data = array( |
||
| 1403 | '_Token' => array( |
||
| 1404 | 'key' => 'nonce1' |
||
| 1405 | ), |
||
| 1406 | 'Post' => array( |
||
| 1407 | 'title' => 'Woot' |
||
| 1408 | ) |
||
| 1409 | ); |
||
| 1410 | $this->Security->startup($this->Controller); |
||
| 1411 | $token = $this->Security->Session->read('_Token'); |
||
| 1412 | $this->assertTrue(isset($token['csrfTokens']['nonce1']), 'Token was consumed'); |
||
| 1413 | } |
||
| 1414 | |||
| 1415 | /**
|
||
| 1416 | * Test generateToken()
|
||
| 1417 | *
|
||
| 1418 | * @return void
|
||
| 1419 | */
|
||
| 1420 | public function testGenerateToken() { |
||
| 1421 | $request = $this->Controller->request; |
||
| 1422 | $this->Security->generateToken($request); |
||
| 1423 | |||
| 1424 | $this->assertNotEmpty($request->params['_Token']); |
||
| 1425 | $this->assertTrue(isset($request->params['_Token']['unlockedFields'])); |
||
| 1426 | $this->assertTrue(isset($request->params['_Token']['key'])); |
||
| 1427 | } |
||
| 1428 | |||
| 1429 | /**
|
||
| 1430 | * Test the limiting of CSRF tokens.
|
||
| 1431 | *
|
||
| 1432 | * @return void
|
||
| 1433 | */
|
||
| 1434 | public function testCsrfLimit() { |
||
| 1435 | $this->Security->csrfLimit = 3; |
||
| 1436 | $time = strtotime('+10 minutes'); |
||
| 1437 | $tokens = array( |
||
| 1438 | '1' => $time, |
||
| 1439 | '2' => $time, |
||
| 1440 | '3' => $time, |
||
| 1441 | '4' => $time, |
||
| 1442 | '5' => $time, |
||
| 1443 | ); |
||
| 1444 | $this->Security->Session->write('_Token', array('csrfTokens' => $tokens)); |
||
| 1445 | $this->Security->generateToken($this->Controller->request); |
||
| 1446 | $result = $this->Security->Session->read('_Token.csrfTokens'); |
||
| 1447 | |||
| 1448 | $this->assertFalse(isset($result['1'])); |
||
| 1449 | $this->assertFalse(isset($result['2'])); |
||
| 1450 | $this->assertFalse(isset($result['3'])); |
||
| 1451 | $this->assertTrue(isset($result['4'])); |
||
| 1452 | $this->assertTrue(isset($result['5'])); |
||
| 1453 | } |
||
| 1454 | |||
| 1455 | /**
|
||
| 1456 | * Test unlocked actions
|
||
| 1457 | *
|
||
| 1458 | * @return void
|
||
| 1459 | */
|
||
| 1460 | public function testUnlockedActions() { |
||
| 1461 | $_SERVER['REQUEST_METHOD'] = 'POST'; |
||
| 1462 | $this->Controller->request->data = array('data'); |
||
| 1463 | $this->Controller->Security->unlockedActions = 'index'; |
||
| 1464 | $this->Controller->Security->blackHoleCallback = null; |
||
| 1465 | $result = $this->Controller->Security->startup($this->Controller); |
||
| 1466 | $this->assertNull($result); |
||
| 1467 | } |
||
| 1468 | } |