|
501 | 501 | end |
502 | 502 | end |
503 | 503 |
|
| 504 | + describe "top_origin validation" do |
| 505 | + let(:client) { WebAuthn::FakeClient.new(origin, encoding: false, cross_origin: cross_origin, top_origin: client_top_origin) } |
| 506 | + let(:top_origin) { fake_top_origin } |
| 507 | + |
| 508 | + before do |
| 509 | + WebAuthn.configuration.allowed_top_origins = [top_origin] |
| 510 | + end |
| 511 | + |
| 512 | + context "when cross_origin is true" do |
| 513 | + let(:cross_origin) { "true" } |
| 514 | + |
| 515 | + context "when top_origin is set" do |
| 516 | + context "when top_origin matches client top_origin" do |
| 517 | + let(:client_top_origin) { top_origin } |
| 518 | + |
| 519 | + it "verifies" do |
| 520 | + expect( |
| 521 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 522 | + ).to be_truthy |
| 523 | + end |
| 524 | + |
| 525 | + it "is valid" do |
| 526 | + expect( |
| 527 | + assertion_response.valid?(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 528 | + ).to be_truthy |
| 529 | + end |
| 530 | + end |
| 531 | + |
| 532 | + context "when top_origin does not match client top_origin" do |
| 533 | + let(:client_top_origin) { "https://malicious.example.com" } |
| 534 | + |
| 535 | + it "is invalid" do |
| 536 | + expect( |
| 537 | + assertion_response.valid?( |
| 538 | + original_challenge, |
| 539 | + public_key: credential_public_key, |
| 540 | + sign_count: 0 |
| 541 | + ) |
| 542 | + ).to be_falsy |
| 543 | + end |
| 544 | + |
| 545 | + it "doesn't verify" do |
| 546 | + expect { |
| 547 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 548 | + }.to raise_exception(WebAuthn::TopOriginVerificationError) |
| 549 | + end |
| 550 | + end |
| 551 | + end |
| 552 | + |
| 553 | + context "when top_origin is not set" do |
| 554 | + let(:client_top_origin) { nil } |
| 555 | + |
| 556 | + it "is invalid" do |
| 557 | + expect( |
| 558 | + assertion_response.valid?( |
| 559 | + original_challenge, |
| 560 | + public_key: credential_public_key, |
| 561 | + sign_count: 0 |
| 562 | + ) |
| 563 | + ).to be_falsy |
| 564 | + end |
| 565 | + |
| 566 | + it "doesn't verify" do |
| 567 | + expect { |
| 568 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 569 | + }.to raise_exception(WebAuthn::TopOriginVerificationError) |
| 570 | + end |
| 571 | + end |
| 572 | + end |
| 573 | + |
| 574 | + context "when cross_origin is false" do |
| 575 | + let(:cross_origin) { "false" } |
| 576 | + |
| 577 | + context "when top_origin is set" do |
| 578 | + context "when top_origin matches client top_origin" do |
| 579 | + let(:client_top_origin) { top_origin } |
| 580 | + |
| 581 | + it "is invalid" do |
| 582 | + expect( |
| 583 | + assertion_response.valid?( |
| 584 | + original_challenge, |
| 585 | + public_key: credential_public_key, |
| 586 | + sign_count: 0 |
| 587 | + ) |
| 588 | + ).to be_falsy |
| 589 | + end |
| 590 | + |
| 591 | + it "doesn't verify" do |
| 592 | + expect { |
| 593 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 594 | + }.to raise_exception(WebAuthn::TopOriginVerificationError) |
| 595 | + end |
| 596 | + end |
| 597 | + |
| 598 | + context "when top_origin does not match client top_origin" do |
| 599 | + let(:client_top_origin) { "https://malicious.example.com" } |
| 600 | + |
| 601 | + it "is invalid" do |
| 602 | + expect( |
| 603 | + assertion_response.valid?( |
| 604 | + original_challenge, |
| 605 | + public_key: credential_public_key, |
| 606 | + sign_count: 0 |
| 607 | + ) |
| 608 | + ).to be_falsy |
| 609 | + end |
| 610 | + |
| 611 | + it "doesn't verify" do |
| 612 | + expect { |
| 613 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 614 | + }.to raise_exception(WebAuthn::TopOriginVerificationError) |
| 615 | + end |
| 616 | + end |
| 617 | + |
| 618 | + context "when top_origin is not set" do |
| 619 | + let(:client_top_origin) { nil } |
| 620 | + |
| 621 | + it "verifies" do |
| 622 | + expect( |
| 623 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 624 | + ).to be_truthy |
| 625 | + end |
| 626 | + |
| 627 | + it "is valid" do |
| 628 | + expect( |
| 629 | + assertion_response.valid?(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 630 | + ).to be_truthy |
| 631 | + end |
| 632 | + end |
| 633 | + end |
| 634 | + end |
| 635 | + |
| 636 | + context "when cross_origin is not set" do |
| 637 | + let(:cross_origin) { nil } |
| 638 | + |
| 639 | + context "when top_origin is set" do |
| 640 | + context "when top_origin matches client top_origin" do |
| 641 | + let(:client_top_origin) { top_origin } |
| 642 | + |
| 643 | + it "is invalid" do |
| 644 | + expect( |
| 645 | + assertion_response.valid?( |
| 646 | + original_challenge, |
| 647 | + public_key: credential_public_key, |
| 648 | + sign_count: 0 |
| 649 | + ) |
| 650 | + ).to be_falsy |
| 651 | + end |
| 652 | + |
| 653 | + it "doesn't verify" do |
| 654 | + expect { |
| 655 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 656 | + }.to raise_exception(WebAuthn::TopOriginVerificationError) |
| 657 | + end |
| 658 | + end |
| 659 | + |
| 660 | + context "when top_origin does not match client top_origin" do |
| 661 | + let(:client_top_origin) { "https://malicious.example.com" } |
| 662 | + |
| 663 | + it "is invalid" do |
| 664 | + expect( |
| 665 | + assertion_response.valid?( |
| 666 | + original_challenge, |
| 667 | + public_key: credential_public_key, |
| 668 | + sign_count: 0 |
| 669 | + ) |
| 670 | + ).to be_falsy |
| 671 | + end |
| 672 | + |
| 673 | + it "doesn't verify" do |
| 674 | + expect { |
| 675 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 676 | + }.to raise_exception(WebAuthn::TopOriginVerificationError) |
| 677 | + end |
| 678 | + end |
| 679 | + |
| 680 | + context "when top_origin is not set" do |
| 681 | + let(:client_top_origin) { nil } |
| 682 | + |
| 683 | + it "verifies" do |
| 684 | + expect( |
| 685 | + assertion_response.verify(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 686 | + ).to be_truthy |
| 687 | + end |
| 688 | + |
| 689 | + it "is valid" do |
| 690 | + expect( |
| 691 | + assertion_response.valid?(original_challenge, public_key: credential_public_key, sign_count: 0) |
| 692 | + ).to be_truthy |
| 693 | + end |
| 694 | + end |
| 695 | + end |
| 696 | + end |
| 697 | + end |
| 698 | + |
504 | 699 | describe "migrated U2F credential" do |
505 | 700 | let(:origin) { "https://example.org" } |
506 | 701 | let(:app_id) { "#{origin}/appid" } |
|
0 commit comments