-
Notifications
You must be signed in to change notification settings - Fork 1.7k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
FINERACT-2081: Handle unauthenticated requests in LoanCOBApiFilter
- Loading branch information
Showing
7 changed files
with
306 additions
and
50 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
114 changes: 114 additions & 0 deletions
114
...e/fineract/infrastructure/security/service/SpringSecurityPlatformSecurityContextTest.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,114 @@ | ||
/** | ||
* Licensed to the Apache Software Foundation (ASF) under one | ||
* or more contributor license agreements. See the NOTICE file | ||
* distributed with this work for additional information | ||
* regarding copyright ownership. The ASF licenses this file | ||
* to you under the Apache License, Version 2.0 (the | ||
* "License"); you may not use this file except in compliance | ||
* with the License. You may obtain a copy of the License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, | ||
* software distributed under the License is distributed on an | ||
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY | ||
* KIND, either express or implied. See the License for the | ||
* specific language governing permissions and limitations | ||
* under the License. | ||
*/ | ||
package org.apache.fineract.infrastructure.security.service; | ||
|
||
import static org.junit.jupiter.api.Assertions.assertEquals; | ||
import static org.junit.jupiter.api.Assertions.assertThrows; | ||
import static org.mockito.Mockito.doReturn; | ||
import static org.mockito.Mockito.spy; | ||
import static org.mockito.Mockito.when; | ||
|
||
import org.apache.fineract.infrastructure.configuration.domain.ConfigurationDomainService; | ||
import org.apache.fineract.infrastructure.security.exception.ResetPasswordException; | ||
import org.apache.fineract.useradministration.domain.AppUser; | ||
import org.apache.fineract.useradministration.exception.UnAuthenticatedUserException; | ||
import org.junit.jupiter.api.AfterEach; | ||
import org.junit.jupiter.api.BeforeEach; | ||
import org.junit.jupiter.api.Test; | ||
import org.junit.jupiter.api.extension.ExtendWith; | ||
import org.mockito.InjectMocks; | ||
import org.mockito.Mock; | ||
import org.mockito.junit.jupiter.MockitoExtension; | ||
import org.springframework.security.core.Authentication; | ||
import org.springframework.security.core.context.SecurityContext; | ||
import org.springframework.security.core.context.SecurityContextHolder; | ||
|
||
@ExtendWith(MockitoExtension.class) | ||
class SpringSecurityPlatformSecurityContextTest { | ||
|
||
@Mock | ||
private SecurityContext securityContext; | ||
|
||
@Mock | ||
private Authentication authentication; | ||
|
||
@Mock | ||
private AppUser appUser; | ||
|
||
@Mock | ||
private ConfigurationDomainService configurationDomainService; | ||
|
||
@InjectMocks | ||
private SpringSecurityPlatformSecurityContext securityContextProvider; | ||
|
||
@BeforeEach | ||
void setUp() { | ||
SecurityContextHolder.setContext(securityContext); | ||
} | ||
|
||
@AfterEach | ||
void tearDown() { | ||
SecurityContextHolder.clearContext(); | ||
} | ||
|
||
@Test | ||
void shouldReturnAppUserWhenPrincipalIsAppUser() { | ||
when(securityContext.getAuthentication()).thenReturn(authentication); | ||
when(authentication.getPrincipal()).thenReturn(appUser); | ||
when(configurationDomainService.isPasswordForcedResetEnable()).thenReturn(false); | ||
|
||
AppUser result = securityContextProvider.authenticatedUser(); | ||
|
||
assertEquals(appUser, result, "authenticatedUser() should return AppUser"); | ||
} | ||
|
||
@Test | ||
void shouldThrowUnAuthenticatedUserExceptionWhenPrincipalIsNotAppUser() { | ||
when(securityContext.getAuthentication()).thenReturn(authentication); | ||
when(authentication.getPrincipal()).thenReturn("anonymousUser"); | ||
|
||
assertThrows(UnAuthenticatedUserException.class, | ||
() -> securityContextProvider.authenticatedUser(), | ||
"authenticatedUser() should throw UnAuthenticatedUserException when " | ||
+ "Principal is not AppUser"); | ||
} | ||
|
||
@Test | ||
void shouldThrowUnAuthenticatedUserExceptionWhenAuthenticationIsNull() { | ||
when(securityContext.getAuthentication()).thenReturn(null); | ||
|
||
assertThrows(UnAuthenticatedUserException.class, | ||
() -> securityContextProvider.authenticatedUser(), | ||
"authenticatedUser() should throw UnAuthenticatedUserException when " | ||
+ "Authentication is null"); | ||
} | ||
|
||
@Test | ||
void shouldThrowResetPasswordExceptionWhenPasswordMustBeReset() { | ||
when(securityContext.getAuthentication()).thenReturn(authentication); | ||
when(authentication.getPrincipal()).thenReturn(appUser); | ||
SpringSecurityPlatformSecurityContext spyContextProvider = spy(securityContextProvider); | ||
doReturn(true).when(spyContextProvider).doesPasswordHasToBeRenewed(appUser); | ||
|
||
assertThrows(ResetPasswordException.class, | ||
spyContextProvider::authenticatedUser, | ||
"authenticatedUser() should throw ResetPasswordException when password needs" | ||
+ " to be reset"); | ||
} | ||
} |
109 changes: 109 additions & 0 deletions
109
...sts/src/test/java/org/apache/fineract/integrationtests/AuthenticationIntegrationTest.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,109 @@ | ||
package org.apache.fineract.integrationtests; | ||
|
||
import static org.junit.jupiter.api.Assertions.assertEquals; | ||
|
||
import com.fasterxml.jackson.core.JsonProcessingException; | ||
import com.fasterxml.jackson.databind.ObjectMapper; | ||
import io.restassured.builder.RequestSpecBuilder; | ||
import io.restassured.builder.ResponseSpecBuilder; | ||
import io.restassured.http.ContentType; | ||
import io.restassured.specification.RequestSpecification; | ||
import io.restassured.specification.ResponseSpecification; | ||
import java.util.Collections; | ||
import java.util.HashMap; | ||
import lombok.extern.slf4j.Slf4j; | ||
import org.apache.fineract.integrationtests.common.ClientHelper; | ||
import org.apache.fineract.integrationtests.common.Utils; | ||
import org.apache.fineract.integrationtests.common.accounting.AccountHelper; | ||
import org.apache.fineract.integrationtests.common.loans.LoanApplicationTestBuilder; | ||
import org.apache.fineract.integrationtests.common.loans.LoanProductTestBuilder; | ||
import org.apache.fineract.integrationtests.common.loans.LoanTestLifecycleExtension; | ||
import org.apache.fineract.integrationtests.common.loans.LoanTransactionHelper; | ||
import org.apache.fineract.integrationtests.common.organisation.StaffHelper; | ||
import org.apache.fineract.integrationtests.useradministration.users.UserHelper; | ||
import org.junit.jupiter.api.BeforeEach; | ||
import org.junit.jupiter.api.Test; | ||
import org.junit.jupiter.api.extension.ExtendWith; | ||
|
||
@Slf4j | ||
@ExtendWith(LoanTestLifecycleExtension.class) | ||
public class AuthenticationIntegrationTest { | ||
|
||
private static final String LOAN_DATE = "11 July 2022"; | ||
private static final String APPROVE_COMMAND = "approve"; | ||
private ResponseSpecification responseSpec; | ||
private RequestSpecification requestSpec; | ||
private LoanTransactionHelper loanTransactionHelper; | ||
private Integer loanID; | ||
|
||
@BeforeEach | ||
public void setup() { | ||
Utils.initializeRESTAssured(); | ||
setupAuthenticatedRequestSpec(); | ||
this.responseSpec = new ResponseSpecBuilder().expectStatusCode(200).build(); | ||
this.loanTransactionHelper = new LoanTransactionHelper(this.requestSpec, this.responseSpec); | ||
|
||
AccountHelper accountHelper = new AccountHelper(this.requestSpec, this.responseSpec); | ||
Integer staffId = StaffHelper.createStaff(this.requestSpec, this.responseSpec); | ||
String username = Utils.uniqueRandomStringGenerator("user", 8); | ||
UserHelper.createUser(this.requestSpec, this.responseSpec, 1, staffId, username, "P4ssw0rd", "resourceId"); | ||
Integer clientID = ClientHelper.createClient(requestSpec, responseSpec); | ||
|
||
Integer loanProductID = setupLoanProduct(accountHelper); | ||
this.loanID = loanTransactionHelper.applyForLoanApplicationWithPaymentStrategyAndPastMonth(clientID, loanProductID, | ||
Collections.emptyList(), null, "10000", LoanApplicationTestBuilder.DEFAULT_STRATEGY, "10 July 2022", LOAN_DATE); | ||
} | ||
|
||
@Test | ||
public void shouldAllowAccessForAuthenticatedUser() { | ||
setupAuthenticatedRequestSpec(); | ||
String loanApprovalCommand = createLoanApprovalCommand(); | ||
String loanApprovalRequest = createLoanApprovalRequest(); | ||
|
||
HashMap response = Utils.performServerPost(this.requestSpec, this.responseSpec, loanApprovalCommand, loanApprovalRequest, | ||
"changes"); | ||
HashMap status = (HashMap) response.get("status"); | ||
|
||
assertEquals(200, (Integer) status.get("id")); | ||
} | ||
|
||
@Test | ||
public void shouldReturnUnauthorizedForUnauthenticatedAccess() throws JsonProcessingException { | ||
setupUnauthenticatedRequestSpec(); | ||
this.responseSpec = new ResponseSpecBuilder().expectStatusCode(401).build(); | ||
|
||
String loanApprovalCommand = createLoanApprovalCommand(); | ||
String loanApprovalRequest = createLoanApprovalRequest(); | ||
|
||
String rawResponse = Utils.performServerPost(this.requestSpec, this.responseSpec, loanApprovalCommand, loanApprovalRequest, null); | ||
|
||
ObjectMapper objectMapper = new ObjectMapper(); | ||
HashMap response = objectMapper.readValue(rawResponse, HashMap.class); | ||
|
||
assertEquals(401, (Integer) response.get("status")); | ||
assertEquals("Unauthorized", response.get("error")); | ||
} | ||
|
||
private Integer setupLoanProduct(AccountHelper accountHelper) { | ||
return this.loanTransactionHelper.createLoanProduct("0", "0", LoanProductTestBuilder.DEFAULT_STRATEGY, "2", | ||
accountHelper.createAssetAccount(), accountHelper.createIncomeAccount(), accountHelper.createExpenseAccount(), | ||
accountHelper.createLiabilityAccount()); | ||
} | ||
|
||
private void setupAuthenticatedRequestSpec() { | ||
this.requestSpec = new RequestSpecBuilder().setContentType(ContentType.JSON).build(); | ||
this.requestSpec.header("Authorization", "Basic " + Utils.loginIntoServerAndGetBase64EncodedAuthenticationKey()); | ||
} | ||
|
||
private void setupUnauthenticatedRequestSpec() { | ||
this.requestSpec = new RequestSpecBuilder().setContentType(ContentType.JSON).build(); | ||
} | ||
|
||
private String createLoanApprovalRequest() { | ||
return this.loanTransactionHelper.getApproveLoanAsJSON(LOAN_DATE); | ||
} | ||
|
||
private String createLoanApprovalCommand() { | ||
return this.loanTransactionHelper.createLoanOperationURL(APPROVE_COMMAND, loanID); | ||
} | ||
} |
Oops, something went wrong.