|
23 | 23 | import org.junit.jupiter.params.ParameterizedTest;
|
24 | 24 | import org.junit.jupiter.params.provider.Arguments;
|
25 | 25 | import org.junit.jupiter.params.provider.MethodSource;
|
| 26 | +import org.mockito.Answers; |
| 27 | +import org.mockito.MockedStatic; |
26 | 28 | import org.opensaml.xmlsec.signature.support.SignatureConstants;
|
27 | 29 |
|
28 | 30 | import org.springframework.mock.web.MockHttpServletRequest;
|
29 | 31 | import org.springframework.security.saml2.Saml2Exception;
|
| 32 | +import org.springframework.security.saml2.core.Saml2ParameterNames; |
30 | 33 | import org.springframework.security.saml2.core.Saml2X509Credential;
|
31 | 34 | import org.springframework.security.saml2.core.TestSaml2X509Credentials;
|
32 | 35 | import org.springframework.security.saml2.provider.service.authentication.Saml2PostAuthenticationRequest;
|
|
39 | 42 |
|
40 | 43 | import static org.assertj.core.api.Assertions.assertThat;
|
41 | 44 | import static org.assertj.core.api.Assertions.assertThatExceptionOfType;
|
| 45 | +import static org.mockito.ArgumentMatchers.any; |
| 46 | +import static org.mockito.ArgumentMatchers.eq; |
| 47 | +import static org.mockito.Mockito.mockStatic; |
| 48 | +import static org.mockito.Mockito.never; |
| 49 | +import static org.mockito.Mockito.spy; |
| 50 | +import static org.mockito.Mockito.verify; |
42 | 51 |
|
43 | 52 | /**
|
44 | 53 | * Tests for {@link OpenSamlAuthenticationRequestResolver}
|
@@ -198,6 +207,58 @@ public void resolveAuthenticationRequestWhenSHA1SignRequestThenSigns() {
|
198 | 207 | assertThat(result.getId()).isNotEmpty();
|
199 | 208 | }
|
200 | 209 |
|
| 210 | + @Test |
| 211 | + public void resolveAuthenticationRequestWhenSignedAndRelayStateIsNullThenSignsWithoutRelayState() { |
| 212 | + try (MockedStatic<OpenSamlSigningUtils> openSamlSigningUtilsMockedStatic = mockStatic( |
| 213 | + OpenSamlSigningUtils.class, Answers.CALLS_REAL_METHODS)) { |
| 214 | + MockHttpServletRequest request = new MockHttpServletRequest(); |
| 215 | + request.setPathInfo("/saml2/authenticate/registration-id"); |
| 216 | + RelyingPartyRegistration registration = this.relyingPartyRegistrationBuilder |
| 217 | + .assertingPartyDetails((party) -> party.wantAuthnRequestsSigned(true)) |
| 218 | + .build(); |
| 219 | + OpenSamlSigningUtils.QueryParametersPartial queryParametersPartialSpy = spy( |
| 220 | + new OpenSamlSigningUtils.QueryParametersPartial(registration)); |
| 221 | + openSamlSigningUtilsMockedStatic.when(() -> OpenSamlSigningUtils.sign(any())) |
| 222 | + .thenReturn(queryParametersPartialSpy); |
| 223 | + OpenSamlAuthenticationRequestResolver resolver = authenticationRequestResolver(registration); |
| 224 | + resolver.setRelayStateResolver((source) -> null); |
| 225 | + Saml2RedirectAuthenticationRequest result = resolver.resolve(request, (r, authnRequest) -> { |
| 226 | + }); |
| 227 | + assertThat(result.getSamlRequest()).isNotEmpty(); |
| 228 | + assertThat(result.getRelayState()).isNull(); |
| 229 | + assertThat(result.getSigAlg()).isNotNull(); |
| 230 | + assertThat(result.getSignature()).isNotNull(); |
| 231 | + assertThat(result.getBinding()).isEqualTo(Saml2MessageBinding.REDIRECT); |
| 232 | + verify(queryParametersPartialSpy, never()).param(eq(Saml2ParameterNames.RELAY_STATE), any()); |
| 233 | + } |
| 234 | + } |
| 235 | + |
| 236 | + @Test |
| 237 | + public void resolveAuthenticationRequestWhenSignedAndRelayStateIsEmptyThenSignsWithEmptyRelayState() { |
| 238 | + try (MockedStatic<OpenSamlSigningUtils> openSamlSigningUtilsMockedStatic = mockStatic( |
| 239 | + OpenSamlSigningUtils.class, Answers.CALLS_REAL_METHODS)) { |
| 240 | + MockHttpServletRequest request = new MockHttpServletRequest(); |
| 241 | + request.setPathInfo("/saml2/authenticate/registration-id"); |
| 242 | + RelyingPartyRegistration registration = this.relyingPartyRegistrationBuilder |
| 243 | + .assertingPartyDetails((party) -> party.wantAuthnRequestsSigned(true)) |
| 244 | + .build(); |
| 245 | + OpenSamlSigningUtils.QueryParametersPartial queryParametersPartialSpy = spy( |
| 246 | + new OpenSamlSigningUtils.QueryParametersPartial(registration)); |
| 247 | + openSamlSigningUtilsMockedStatic.when(() -> OpenSamlSigningUtils.sign(any())) |
| 248 | + .thenReturn(queryParametersPartialSpy); |
| 249 | + OpenSamlAuthenticationRequestResolver resolver = authenticationRequestResolver(registration); |
| 250 | + resolver.setRelayStateResolver((source) -> ""); |
| 251 | + Saml2RedirectAuthenticationRequest result = resolver.resolve(request, (r, authnRequest) -> { |
| 252 | + }); |
| 253 | + assertThat(result.getSamlRequest()).isNotEmpty(); |
| 254 | + assertThat(result.getRelayState()).isEmpty(); |
| 255 | + assertThat(result.getSigAlg()).isNotNull(); |
| 256 | + assertThat(result.getSignature()).isNotNull(); |
| 257 | + assertThat(result.getBinding()).isEqualTo(Saml2MessageBinding.REDIRECT); |
| 258 | + verify(queryParametersPartialSpy).param(eq(Saml2ParameterNames.RELAY_STATE), eq("")); |
| 259 | + } |
| 260 | + } |
| 261 | + |
201 | 262 | private OpenSamlAuthenticationRequestResolver authenticationRequestResolver(RelyingPartyRegistration registration) {
|
202 | 263 | return new OpenSamlAuthenticationRequestResolver((request, id) -> registration);
|
203 | 264 | }
|
|
0 commit comments