You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

HtpasswdAuthenticationTest.java 12KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. /*
  2. * Copyright 2013 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit.tests;
  17. import java.io.File;
  18. import java.io.FilenameFilter;
  19. import java.io.IOException;
  20. import java.util.HashMap;
  21. import org.apache.commons.io.FileUtils;
  22. import org.junit.After;
  23. import org.junit.Before;
  24. import org.junit.Test;
  25. import com.gitblit.IStoredSettings;
  26. import com.gitblit.auth.HtpasswdAuthProvider;
  27. import com.gitblit.manager.RuntimeManager;
  28. import com.gitblit.manager.UserManager;
  29. import com.gitblit.models.UserModel;
  30. import com.gitblit.tests.mock.MemorySettings;
  31. /**
  32. * Test the Htpasswd user service.
  33. *
  34. */
  35. public class HtpasswdAuthenticationTest extends GitblitUnitTest {
  36. private static final String RESOURCE_DIR = "src/test/resources/htpasswd/";
  37. private static final String KEY_SUPPORT_PLAINTEXT_PWD = "realm.htpasswd.supportPlaintextPasswords";
  38. private static final int NUM_USERS_HTPASSWD = 10;
  39. private static final MemorySettings MS = new MemorySettings(new HashMap<String, Object>());
  40. private HtpasswdAuthProvider htpasswd;
  41. private MemorySettings getSettings(String userfile, String groupfile, Boolean overrideLA)
  42. {
  43. MS.put("realm.userService", RESOURCE_DIR + "users.conf");
  44. MS.put("realm.htpasswd.userfile", (userfile == null) ? (RESOURCE_DIR + "htpasswd") : userfile);
  45. MS.put("realm.htpasswd.groupfile", (groupfile == null) ? (RESOURCE_DIR + "htgroup") : groupfile);
  46. MS.put("realm.htpasswd.overrideLocalAuthentication", (overrideLA == null) ? "false" : overrideLA.toString());
  47. // Default to keep test the same on all platforms.
  48. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  49. return MS;
  50. }
  51. private MemorySettings getSettings()
  52. {
  53. return getSettings(null, null, null);
  54. }
  55. private void setupUS()
  56. {
  57. htpasswd = newHtpasswdAuthentication(getSettings());
  58. }
  59. private HtpasswdAuthProvider newHtpasswdAuthentication(IStoredSettings settings) {
  60. RuntimeManager runtime = new RuntimeManager(settings, GitBlitSuite.BASEFOLDER).start();
  61. UserManager users = new UserManager(runtime).start();
  62. HtpasswdAuthProvider htpasswd = new HtpasswdAuthProvider();
  63. htpasswd.setup(runtime, users);
  64. return htpasswd;
  65. }
  66. private void copyInFiles() throws IOException
  67. {
  68. File dir = new File(RESOURCE_DIR);
  69. FilenameFilter filter = new FilenameFilter() {
  70. @Override
  71. public boolean accept(File dir, String file) {
  72. return file.endsWith(".in");
  73. }
  74. };
  75. for (File inf : dir.listFiles(filter)) {
  76. File dest = new File(inf.getParent(), inf.getName().substring(0, inf.getName().length() - 3));
  77. FileUtils.copyFile(inf, dest);
  78. }
  79. }
  80. private void deleteGeneratedFiles()
  81. {
  82. File dir = new File(RESOURCE_DIR);
  83. FilenameFilter filter = new FilenameFilter() {
  84. @Override
  85. public boolean accept(File dir, String file) {
  86. return !(file.endsWith(".in"));
  87. }
  88. };
  89. for (File file : dir.listFiles(filter)) {
  90. file.delete();
  91. }
  92. }
  93. @Before
  94. public void setup() throws IOException
  95. {
  96. copyInFiles();
  97. setupUS();
  98. }
  99. @After
  100. public void tearDown()
  101. {
  102. deleteGeneratedFiles();
  103. }
  104. @Test
  105. public void testSetup() throws IOException
  106. {
  107. assertEquals(NUM_USERS_HTPASSWD, htpasswd.getNumberHtpasswdUsers());
  108. }
  109. @Test
  110. public void testAuthenticate()
  111. {
  112. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  113. UserModel user = htpasswd.authenticate("user1", "pass1".toCharArray());
  114. assertNotNull(user);
  115. assertEquals("user1", user.username);
  116. user = htpasswd.authenticate("user2", "pass2".toCharArray());
  117. assertNotNull(user);
  118. assertEquals("user2", user.username);
  119. // Test different encryptions
  120. user = htpasswd.authenticate("plain", "passWord".toCharArray());
  121. assertNotNull(user);
  122. assertEquals("plain", user.username);
  123. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  124. user = htpasswd.authenticate("crypt", "password".toCharArray());
  125. assertNotNull(user);
  126. assertEquals("crypt", user.username);
  127. user = htpasswd.authenticate("md5", "password".toCharArray());
  128. assertNotNull(user);
  129. assertEquals("md5", user.username);
  130. user = htpasswd.authenticate("sha", "password".toCharArray());
  131. assertNotNull(user);
  132. assertEquals("sha", user.username);
  133. // Test leading and trailing whitespace
  134. user = htpasswd.authenticate("trailing", "whitespace".toCharArray());
  135. assertNotNull(user);
  136. assertEquals("trailing", user.username);
  137. user = htpasswd.authenticate("tabbed", "frontAndBack".toCharArray());
  138. assertNotNull(user);
  139. assertEquals("tabbed", user.username);
  140. user = htpasswd.authenticate("leading", "whitespace".toCharArray());
  141. assertNotNull(user);
  142. assertEquals("leading", user.username);
  143. }
  144. @Test
  145. public void testAttributes()
  146. {
  147. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  148. UserModel user = htpasswd.authenticate("user1", "pass1".toCharArray());
  149. assertNotNull(user);
  150. assertEquals("El Capitan", user.displayName);
  151. assertEquals("cheffe@example.com", user.emailAddress);
  152. assertTrue(user.canAdmin);
  153. user = htpasswd.authenticate("user2", "pass2".toCharArray());
  154. assertNotNull(user);
  155. assertEquals("User Two", user.displayName);
  156. assertTrue(user.canCreate);
  157. assertTrue(user.canFork);
  158. }
  159. @Test
  160. public void testAuthenticateDenied()
  161. {
  162. UserModel user = null;
  163. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  164. user = htpasswd.authenticate("user1", "".toCharArray());
  165. assertNull("User 'user1' falsely authenticated.", user);
  166. user = htpasswd.authenticate("user1", "pass2".toCharArray());
  167. assertNull("User 'user1' falsely authenticated.", user);
  168. user = htpasswd.authenticate("user2", "lalala".toCharArray());
  169. assertNull("User 'user2' falsely authenticated.", user);
  170. user = htpasswd.authenticate("user3", "disabled".toCharArray());
  171. assertNull("User 'user3' falsely authenticated.", user);
  172. user = htpasswd.authenticate("user4", "disabled".toCharArray());
  173. assertNull("User 'user4' falsely authenticated.", user);
  174. user = htpasswd.authenticate("plain", "text".toCharArray());
  175. assertNull("User 'plain' falsely authenticated.", user);
  176. user = htpasswd.authenticate("plain", "password".toCharArray());
  177. assertNull("User 'plain' falsely authenticated.", user);
  178. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  179. user = htpasswd.authenticate("crypt", "".toCharArray());
  180. assertNull("User 'cyrpt' falsely authenticated.", user);
  181. user = htpasswd.authenticate("crypt", "passwd".toCharArray());
  182. assertNull("User 'crypt' falsely authenticated.", user);
  183. user = htpasswd.authenticate("md5", "".toCharArray());
  184. assertNull("User 'md5' falsely authenticated.", user);
  185. user = htpasswd.authenticate("md5", "pwd".toCharArray());
  186. assertNull("User 'md5' falsely authenticated.", user);
  187. user = htpasswd.authenticate("sha", "".toCharArray());
  188. assertNull("User 'sha' falsely authenticated.", user);
  189. user = htpasswd.authenticate("sha", "letmein".toCharArray());
  190. assertNull("User 'sha' falsely authenticated.", user);
  191. user = htpasswd.authenticate(" tabbed", "frontAndBack".toCharArray());
  192. assertNull("User 'tabbed' falsely authenticated.", user);
  193. user = htpasswd.authenticate(" leading", "whitespace".toCharArray());
  194. assertNull("User 'leading' falsely authenticated.", user);
  195. }
  196. @Test
  197. public void testCleartextIntrusion()
  198. {
  199. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  200. assertNull(htpasswd.authenticate("md5", "$apr1$qAGGNfli$sAn14mn.WKId/3EQS7KSX0".toCharArray()));
  201. assertNull(htpasswd.authenticate("sha", "{SHA}W6ph5Mm5Pz8GgiULbPgzG37mj9g=".toCharArray()));
  202. assertNull(htpasswd.authenticate("user1", "#externalAccount".toCharArray()));
  203. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  204. assertNull(htpasswd.authenticate("md5", "$apr1$qAGGNfli$sAn14mn.WKId/3EQS7KSX0".toCharArray()));
  205. assertNull(htpasswd.authenticate("sha", "{SHA}W6ph5Mm5Pz8GgiULbPgzG37mj9g=".toCharArray()));
  206. assertNull(htpasswd.authenticate("user1", "#externalAccount".toCharArray()));
  207. }
  208. @Test
  209. public void testCryptVsPlaintext()
  210. {
  211. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  212. assertNull(htpasswd.authenticate("crypt", "6TmlbxqZ2kBIA".toCharArray()));
  213. assertNotNull(htpasswd.authenticate("crypt", "password".toCharArray()));
  214. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  215. assertNotNull(htpasswd.authenticate("crypt", "6TmlbxqZ2kBIA".toCharArray()));
  216. assertNull(htpasswd.authenticate("crypt", "password".toCharArray()));
  217. }
  218. @Test
  219. public void testChangeHtpasswdFile()
  220. {
  221. UserModel user;
  222. // User default set up.
  223. user = htpasswd.authenticate("md5", "password".toCharArray());
  224. assertNotNull(user);
  225. assertEquals("md5", user.username);
  226. user = htpasswd.authenticate("sha", "password".toCharArray());
  227. assertNotNull(user);
  228. assertEquals("sha", user.username);
  229. user = htpasswd.authenticate("blueone", "GoBlue!".toCharArray());
  230. assertNull(user);
  231. user = htpasswd.authenticate("bluetwo", "YayBlue!".toCharArray());
  232. assertNull(user);
  233. // Switch to different htpasswd file.
  234. getSettings(RESOURCE_DIR + "htpasswd-user", null, null);
  235. user = htpasswd.authenticate("md5", "password".toCharArray());
  236. assertNull(user);
  237. user = htpasswd.authenticate("sha", "password".toCharArray());
  238. assertNull(user);
  239. user = htpasswd.authenticate("blueone", "GoBlue!".toCharArray());
  240. assertNotNull(user);
  241. assertEquals("blueone", user.username);
  242. user = htpasswd.authenticate("bluetwo", "YayBlue!".toCharArray());
  243. assertNotNull(user);
  244. assertEquals("bluetwo", user.username);
  245. }
  246. @Test
  247. public void testChangeHtpasswdFileNotExisting()
  248. {
  249. UserModel user;
  250. // User default set up.
  251. user = htpasswd.authenticate("md5", "password".toCharArray());
  252. assertNotNull(user);
  253. assertEquals("md5", user.username);
  254. user = htpasswd.authenticate("sha", "password".toCharArray());
  255. assertNotNull(user);
  256. assertEquals("sha", user.username);
  257. user = htpasswd.authenticate("blueone", "GoBlue!".toCharArray());
  258. assertNull(user);
  259. user = htpasswd.authenticate("bluetwo", "YayBlue!".toCharArray());
  260. assertNull(user);
  261. // Switch to different htpasswd file that doesn't exist.
  262. // Currently we stop working with old users upon this change.
  263. getSettings(RESOURCE_DIR + "no-such-file", null, null);
  264. user = htpasswd.authenticate("md5", "password".toCharArray());
  265. assertNull(user);
  266. user = htpasswd.authenticate("sha", "password".toCharArray());
  267. assertNull(user);
  268. user = htpasswd.authenticate("blueone", "GoBlue!".toCharArray());
  269. assertNull(user);
  270. user = htpasswd.authenticate("bluetwo", "YayBlue!".toCharArray());
  271. assertNull(user);
  272. }
  273. }