|
18 | 18 |
|
19 | 19 | import org.junit.jupiter.api.BeforeEach;
|
20 | 20 | import org.junit.jupiter.api.Test;
|
| 21 | +import org.mockito.Answers; |
| 22 | +import org.mockito.MockedStatic; |
21 | 23 | import org.opensaml.xmlsec.signature.support.SignatureConstants;
|
22 | 24 |
|
23 | 25 | import org.springframework.mock.web.MockHttpServletRequest;
|
24 | 26 | import org.springframework.security.saml2.Saml2Exception;
|
| 27 | +import org.springframework.security.saml2.core.Saml2ParameterNames; |
25 | 28 | import org.springframework.security.saml2.core.Saml2X509Credential;
|
26 | 29 | import org.springframework.security.saml2.core.TestSaml2X509Credentials;
|
27 | 30 | import org.springframework.security.saml2.provider.service.authentication.Saml2PostAuthenticationRequest;
|
|
32 | 35 |
|
33 | 36 | import static org.assertj.core.api.Assertions.assertThat;
|
34 | 37 | import static org.assertj.core.api.Assertions.assertThatExceptionOfType;
|
| 38 | +import static org.mockito.ArgumentMatchers.any; |
| 39 | +import static org.mockito.ArgumentMatchers.eq; |
| 40 | +import static org.mockito.Mockito.mockStatic; |
| 41 | +import static org.mockito.Mockito.never; |
| 42 | +import static org.mockito.Mockito.spy; |
| 43 | +import static org.mockito.Mockito.verify; |
35 | 44 |
|
36 | 45 | /**
|
37 | 46 | * Tests for {@link OpenSamlAuthenticationRequestResolver}
|
@@ -177,6 +186,58 @@ public void resolveAuthenticationRequestWhenSHA1SignRequestThenSigns() {
|
177 | 186 | assertThat(result.getId()).isNotEmpty();
|
178 | 187 | }
|
179 | 188 |
|
| 189 | + @Test |
| 190 | + public void resolveAuthenticationRequestWhenSignedAndRelayStateIsNullThenSignsWithoutRelayState() { |
| 191 | + try (MockedStatic<OpenSamlSigningUtils> openSamlSigningUtilsMockedStatic = mockStatic( |
| 192 | + OpenSamlSigningUtils.class, Answers.CALLS_REAL_METHODS)) { |
| 193 | + MockHttpServletRequest request = new MockHttpServletRequest(); |
| 194 | + request.setPathInfo("/saml2/authenticate/registration-id"); |
| 195 | + RelyingPartyRegistration registration = this.relyingPartyRegistrationBuilder |
| 196 | + .assertingPartyDetails((party) -> party.wantAuthnRequestsSigned(true)) |
| 197 | + .build(); |
| 198 | + OpenSamlSigningUtils.QueryParametersPartial queryParametersPartialSpy = spy( |
| 199 | + new OpenSamlSigningUtils.QueryParametersPartial(registration)); |
| 200 | + openSamlSigningUtilsMockedStatic.when(() -> OpenSamlSigningUtils.sign(any())) |
| 201 | + .thenReturn(queryParametersPartialSpy); |
| 202 | + OpenSamlAuthenticationRequestResolver resolver = authenticationRequestResolver(registration); |
| 203 | + resolver.setRelayStateResolver((source) -> null); |
| 204 | + Saml2RedirectAuthenticationRequest result = resolver.resolve(request, (r, authnRequest) -> { |
| 205 | + }); |
| 206 | + assertThat(result.getSamlRequest()).isNotEmpty(); |
| 207 | + assertThat(result.getRelayState()).isNull(); |
| 208 | + assertThat(result.getSigAlg()).isNotNull(); |
| 209 | + assertThat(result.getSignature()).isNotNull(); |
| 210 | + assertThat(result.getBinding()).isEqualTo(Saml2MessageBinding.REDIRECT); |
| 211 | + verify(queryParametersPartialSpy, never()).param(eq(Saml2ParameterNames.RELAY_STATE), any()); |
| 212 | + } |
| 213 | + } |
| 214 | + |
| 215 | + @Test |
| 216 | + public void resolveAuthenticationRequestWhenSignedAndRelayStateIsEmptyThenSignsWithEmptyRelayState() { |
| 217 | + try (MockedStatic<OpenSamlSigningUtils> openSamlSigningUtilsMockedStatic = mockStatic( |
| 218 | + OpenSamlSigningUtils.class, Answers.CALLS_REAL_METHODS)) { |
| 219 | + MockHttpServletRequest request = new MockHttpServletRequest(); |
| 220 | + request.setPathInfo("/saml2/authenticate/registration-id"); |
| 221 | + RelyingPartyRegistration registration = this.relyingPartyRegistrationBuilder |
| 222 | + .assertingPartyDetails((party) -> party.wantAuthnRequestsSigned(true)) |
| 223 | + .build(); |
| 224 | + OpenSamlSigningUtils.QueryParametersPartial queryParametersPartialSpy = spy( |
| 225 | + new OpenSamlSigningUtils.QueryParametersPartial(registration)); |
| 226 | + openSamlSigningUtilsMockedStatic.when(() -> OpenSamlSigningUtils.sign(any())) |
| 227 | + .thenReturn(queryParametersPartialSpy); |
| 228 | + OpenSamlAuthenticationRequestResolver resolver = authenticationRequestResolver(registration); |
| 229 | + resolver.setRelayStateResolver((source) -> ""); |
| 230 | + Saml2RedirectAuthenticationRequest result = resolver.resolve(request, (r, authnRequest) -> { |
| 231 | + }); |
| 232 | + assertThat(result.getSamlRequest()).isNotEmpty(); |
| 233 | + assertThat(result.getRelayState()).isEmpty(); |
| 234 | + assertThat(result.getSigAlg()).isNotNull(); |
| 235 | + assertThat(result.getSignature()).isNotNull(); |
| 236 | + assertThat(result.getBinding()).isEqualTo(Saml2MessageBinding.REDIRECT); |
| 237 | + verify(queryParametersPartialSpy).param(eq(Saml2ParameterNames.RELAY_STATE), eq("")); |
| 238 | + } |
| 239 | + } |
| 240 | + |
180 | 241 | private OpenSamlAuthenticationRequestResolver authenticationRequestResolver(RelyingPartyRegistration registration) {
|
181 | 242 | return new OpenSamlAuthenticationRequestResolver((request, id) -> registration);
|
182 | 243 | }
|
|
0 commit comments