|
16 | 16 |
|
17 | 17 | package org.springframework.security.web.authentication.switchuser;
|
18 | 18 |
|
| 19 | +import java.io.IOException; |
19 | 20 | import java.util.ArrayList;
|
20 | 21 | import java.util.List;
|
21 | 22 |
|
22 | 23 | import jakarta.servlet.FilterChain;
|
| 24 | +import jakarta.servlet.ServletException; |
23 | 25 | import org.junit.jupiter.api.AfterEach;
|
24 | 26 | import org.junit.jupiter.api.BeforeEach;
|
25 | 27 | import org.junit.jupiter.api.Test;
|
26 | 28 |
|
| 29 | +import org.springframework.mock.web.MockFilterChain; |
27 | 30 | import org.springframework.mock.web.MockHttpServletRequest;
|
28 | 31 | import org.springframework.mock.web.MockHttpServletResponse;
|
29 | 32 | import org.springframework.security.authentication.AccountExpiredException;
|
|
46 | 49 | import org.springframework.security.util.FieldUtils;
|
47 | 50 | import org.springframework.security.web.DefaultRedirectStrategy;
|
48 | 51 | import org.springframework.security.web.authentication.SimpleUrlAuthenticationSuccessHandler;
|
| 52 | +import org.springframework.security.web.context.RequestAttributeSecurityContextRepository; |
| 53 | +import org.springframework.security.web.context.SecurityContextRepository; |
49 | 54 | import org.springframework.security.web.util.matcher.AnyRequestMatcher;
|
| 55 | +import org.springframework.test.util.ReflectionTestUtils; |
50 | 56 |
|
51 | 57 | import static org.assertj.core.api.Assertions.assertThat;
|
52 | 58 | import static org.assertj.core.api.Assertions.assertThatExceptionOfType;
|
53 | 59 | import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException;
|
| 60 | +import static org.mockito.ArgumentMatchers.any; |
54 | 61 | import static org.mockito.Mockito.atLeastOnce;
|
55 | 62 | import static org.mockito.Mockito.mock;
|
56 | 63 | import static org.mockito.Mockito.never;
|
@@ -502,6 +509,59 @@ public void setSwitchFailureUrlWhenValidThenNoException() {
|
502 | 509 | filter.setSwitchFailureUrl("/foo");
|
503 | 510 | }
|
504 | 511 |
|
| 512 | + @Test |
| 513 | + void filterWhenDefaultSecurityContextRepositoryThenRequestAttributeRepository() { |
| 514 | + SwitchUserFilter switchUserFilter = new SwitchUserFilter(); |
| 515 | + assertThat(ReflectionTestUtils.getField(switchUserFilter, "securityContextRepository")) |
| 516 | + .isInstanceOf(RequestAttributeSecurityContextRepository.class); |
| 517 | + } |
| 518 | + |
| 519 | + @Test |
| 520 | + void doFilterWhenSwitchUserThenSaveSecurityContext() throws ServletException, IOException { |
| 521 | + SecurityContextRepository securityContextRepository = mock(SecurityContextRepository.class); |
| 522 | + MockHttpServletRequest request = new MockHttpServletRequest(); |
| 523 | + MockHttpServletResponse response = new MockHttpServletResponse(); |
| 524 | + MockFilterChain filterChain = new MockFilterChain(); |
| 525 | + request.setParameter(SwitchUserFilter.SPRING_SECURITY_SWITCH_USERNAME_KEY, "jacklord"); |
| 526 | + request.setRequestURI("/login/impersonate"); |
| 527 | + SwitchUserFilter filter = new SwitchUserFilter(); |
| 528 | + filter.setSecurityContextRepository(securityContextRepository); |
| 529 | + filter.setUserDetailsService(new MockUserDetailsService()); |
| 530 | + filter.setTargetUrl("/target"); |
| 531 | + filter.afterPropertiesSet(); |
| 532 | + |
| 533 | + filter.doFilter(request, response, filterChain); |
| 534 | + |
| 535 | + verify(securityContextRepository).saveContext(any(), any(), any()); |
| 536 | + } |
| 537 | + |
| 538 | + @Test |
| 539 | + void doFilterWhenExitUserThenSaveSecurityContext() throws ServletException, IOException { |
| 540 | + UsernamePasswordAuthenticationToken source = UsernamePasswordAuthenticationToken.authenticated("dano", |
| 541 | + "hawaii50", ROLES_12); |
| 542 | + // set current user (Admin) |
| 543 | + List<GrantedAuthority> adminAuths = new ArrayList<>(ROLES_12); |
| 544 | + adminAuths.add(new SwitchUserGrantedAuthority("PREVIOUS_ADMINISTRATOR", source)); |
| 545 | + UsernamePasswordAuthenticationToken admin = UsernamePasswordAuthenticationToken.authenticated("jacklord", |
| 546 | + "hawaii50", adminAuths); |
| 547 | + SecurityContextHolder.getContext().setAuthentication(admin); |
| 548 | + SecurityContextRepository securityContextRepository = mock(SecurityContextRepository.class); |
| 549 | + MockHttpServletRequest request = new MockHttpServletRequest(); |
| 550 | + MockHttpServletResponse response = new MockHttpServletResponse(); |
| 551 | + MockFilterChain filterChain = new MockFilterChain(); |
| 552 | + request.setParameter(SwitchUserFilter.SPRING_SECURITY_SWITCH_USERNAME_KEY, "jacklord"); |
| 553 | + request.setRequestURI("/logout/impersonate"); |
| 554 | + SwitchUserFilter filter = new SwitchUserFilter(); |
| 555 | + filter.setSecurityContextRepository(securityContextRepository); |
| 556 | + filter.setUserDetailsService(new MockUserDetailsService()); |
| 557 | + filter.setTargetUrl("/target"); |
| 558 | + filter.afterPropertiesSet(); |
| 559 | + |
| 560 | + filter.doFilter(request, response, filterChain); |
| 561 | + |
| 562 | + verify(securityContextRepository).saveContext(any(), any(), any()); |
| 563 | + } |
| 564 | + |
505 | 565 | private class MockUserDetailsService implements UserDetailsService {
|
506 | 566 |
|
507 | 567 | private String password = "hawaii50";
|
|
0 commit comments