|
| 1 | +package graphql.kickstart.autoconfigure.web.servlet; |
| 2 | + |
| 3 | +import static org.assertj.core.api.AssertionsForClassTypes.assertThatThrownBy; |
| 4 | +import static org.junit.jupiter.api.Assertions.*; |
| 5 | +import static org.mockito.ArgumentMatchers.any; |
| 6 | +import static org.mockito.Mockito.mock; |
| 7 | +import static org.mockito.Mockito.never; |
| 8 | +import static org.mockito.Mockito.verify; |
| 9 | +import static org.mockito.Mockito.when; |
| 10 | + |
| 11 | +import graphql.kickstart.autoconfigure.web.servlet.GraphQLSubscriptionWebsocketProperties.CsrfProperties; |
| 12 | +import jakarta.websocket.server.HandshakeRequest; |
| 13 | +import java.util.List; |
| 14 | +import java.util.Map; |
| 15 | +import org.junit.jupiter.api.Test; |
| 16 | +import org.junit.jupiter.api.extension.ExtendWith; |
| 17 | +import org.mockito.Mock; |
| 18 | +import org.mockito.junit.jupiter.MockitoExtension; |
| 19 | + |
| 20 | +@ExtendWith(MockitoExtension.class) |
| 21 | +class WsCsrfFilterTest { |
| 22 | + |
| 23 | + private CsrfProperties csrfProperties = new CsrfProperties(); |
| 24 | + @Mock private WsCsrfTokenRepository tokenRepository; |
| 25 | + @Mock private HandshakeRequest handshakeRequest; |
| 26 | + |
| 27 | + @Test |
| 28 | + void givenCsrfDisabled_whenDoFilter_thenDoesNotLoadToken() { |
| 29 | + csrfProperties.setEnabled(false); |
| 30 | + WsCsrfFilter filter = new WsCsrfFilter(csrfProperties, tokenRepository); |
| 31 | + filter.doFilter(handshakeRequest); |
| 32 | + |
| 33 | + verify(tokenRepository, never()).loadToken(any()); |
| 34 | + } |
| 35 | + |
| 36 | + @Test |
| 37 | + void givenCsrfEnabledAndRepositoryNull_whenDoFilter_thenDoesNotGetTokenFromRequest() { |
| 38 | + csrfProperties.setEnabled(true); |
| 39 | + WsCsrfFilter filter = new WsCsrfFilter(csrfProperties, null); |
| 40 | + filter.doFilter(handshakeRequest); |
| 41 | + |
| 42 | + verify(handshakeRequest, never()).getParameterMap(); |
| 43 | + } |
| 44 | + |
| 45 | + @Test |
| 46 | + void givenNoTokenInSession_whenDoFilter_thenGenerateAndSaveToken() { |
| 47 | + csrfProperties.setEnabled(true); |
| 48 | + when(tokenRepository.loadToken(handshakeRequest)).thenReturn(null); |
| 49 | + WsCsrfToken csrfToken = mock(WsCsrfToken.class); |
| 50 | + when(tokenRepository.generateToken(handshakeRequest)).thenReturn(csrfToken); |
| 51 | + |
| 52 | + WsCsrfFilter filter = new WsCsrfFilter(csrfProperties, tokenRepository); |
| 53 | + filter.doFilter(handshakeRequest); |
| 54 | + |
| 55 | + verify(tokenRepository).saveToken(csrfToken, handshakeRequest); |
| 56 | + } |
| 57 | + |
| 58 | + @Test |
| 59 | + void givenDifferentActualToken_whenDoFilter_thenThrowsException() { |
| 60 | + csrfProperties.setEnabled(true); |
| 61 | + WsCsrfToken csrfToken = new DefaultWsCsrfToken("some-token", "_csrf"); |
| 62 | + when(tokenRepository.loadToken(handshakeRequest)).thenReturn(csrfToken); |
| 63 | + when(handshakeRequest.getParameterMap()) |
| 64 | + .thenReturn(Map.of("_csrf", List.of("different-token"))); |
| 65 | + |
| 66 | + WsCsrfFilter filter = new WsCsrfFilter(csrfProperties, tokenRepository); |
| 67 | + assertThatThrownBy(() -> filter.doFilter(handshakeRequest)) |
| 68 | + .isInstanceOf(IllegalStateException.class) |
| 69 | + .hasMessage( |
| 70 | + "Invalid CSRF Token 'different-token' was found on the request parameter '_csrf'."); |
| 71 | + } |
| 72 | + |
| 73 | + @Test |
| 74 | + void givenSameToken_whenDoFilter_thenDoesNotThrow() { |
| 75 | + csrfProperties.setEnabled(true); |
| 76 | + WsCsrfToken csrfToken = new DefaultWsCsrfToken("some-token", "_csrf"); |
| 77 | + when(tokenRepository.loadToken(handshakeRequest)).thenReturn(csrfToken); |
| 78 | + when(handshakeRequest.getParameterMap()) |
| 79 | + .thenReturn(Map.of("_csrf", List.of("some-token"))); |
| 80 | + |
| 81 | + WsCsrfFilter filter = new WsCsrfFilter(csrfProperties, tokenRepository); |
| 82 | + assertDoesNotThrow(() -> filter.doFilter(handshakeRequest)); |
| 83 | + |
| 84 | + verify(tokenRepository).loadToken(handshakeRequest); |
| 85 | + } |
| 86 | +} |
0 commit comments