Du kannst nicht mehr als 25 Themen auswählen Themen müssen mit entweder einem Buchstaben oder einer Ziffer beginnen. Sie können Bindestriche („-“) enthalten und bis zu 35 Zeichen lang sein.

HtpasswdUserServiceTest.java 20KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568
  1. /*
  2. * Copyright 2013 gitblit.com.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. package com.gitblit.tests;
  17. import java.io.File;
  18. import java.io.FilenameFilter;
  19. import java.io.IOException;
  20. import java.util.HashMap;
  21. import org.apache.commons.io.FileUtils;
  22. import org.junit.After;
  23. import org.junit.Before;
  24. import org.junit.Test;
  25. import com.gitblit.HtpasswdUserService;
  26. import com.gitblit.models.UserModel;
  27. import com.gitblit.tests.mock.MemorySettings;
  28. import com.gitblit.utils.StringUtils;
  29. /**
  30. * Test the Htpasswd user service.
  31. *
  32. */
  33. public class HtpasswdUserServiceTest extends GitblitUnitTest {
  34. private static final String RESOURCE_DIR = "src/test/resources/htpasswdUSTest/";
  35. private static final String KEY_SUPPORT_PLAINTEXT_PWD = "realm.htpasswd.supportPlaintextPasswords";
  36. private static final int NUM_USERS_HTPASSWD = 10;
  37. private static final MemorySettings MS = new MemorySettings(new HashMap<String, Object>());
  38. private HtpasswdUserService htpwdUserService;
  39. private MemorySettings getSettings( String userfile, String groupfile, Boolean overrideLA)
  40. {
  41. MS.put("realm.htpasswd.backingUserService", RESOURCE_DIR + "users.conf");
  42. MS.put("realm.htpasswd.userfile", (userfile == null) ? (RESOURCE_DIR+"htpasswd") : userfile);
  43. MS.put("realm.htpasswd.groupfile", (groupfile == null) ? (RESOURCE_DIR+"htgroup") : groupfile);
  44. MS.put("realm.htpasswd.overrideLocalAuthentication", (overrideLA == null) ? "false" : overrideLA.toString());
  45. // Default to keep test the same on all platforms.
  46. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  47. return MS;
  48. }
  49. private MemorySettings getSettings()
  50. {
  51. return getSettings(null, null, null);
  52. }
  53. private MemorySettings getSettings(boolean overrideLA)
  54. {
  55. return getSettings(null, null, new Boolean(overrideLA));
  56. }
  57. private void setupUS()
  58. {
  59. htpwdUserService = new HtpasswdUserService();
  60. htpwdUserService.setup(getSettings());
  61. }
  62. private void setupUS(boolean overrideLA)
  63. {
  64. htpwdUserService = new HtpasswdUserService();
  65. htpwdUserService.setup(getSettings(overrideLA));
  66. }
  67. private void copyInFiles() throws IOException
  68. {
  69. File dir = new File(RESOURCE_DIR);
  70. FilenameFilter filter = new FilenameFilter() {
  71. @Override
  72. public boolean accept(File dir, String file) {
  73. return file.endsWith(".in");
  74. }
  75. };
  76. for (File inf : dir.listFiles(filter)) {
  77. File dest = new File(inf.getParent(), inf.getName().substring(0, inf.getName().length()-3));
  78. FileUtils.copyFile(inf, dest);
  79. }
  80. }
  81. private void deleteGeneratedFiles()
  82. {
  83. File dir = new File(RESOURCE_DIR);
  84. FilenameFilter filter = new FilenameFilter() {
  85. @Override
  86. public boolean accept(File dir, String file) {
  87. return !(file.endsWith(".in"));
  88. }
  89. };
  90. for (File file : dir.listFiles(filter)) {
  91. file.delete();
  92. }
  93. }
  94. @Before
  95. public void setup() throws IOException
  96. {
  97. copyInFiles();
  98. setupUS();
  99. }
  100. @After
  101. public void tearDown()
  102. {
  103. deleteGeneratedFiles();
  104. }
  105. @Test
  106. public void testSetup() throws IOException
  107. {
  108. assertEquals(NUM_USERS_HTPASSWD, htpwdUserService.getNumberHtpasswdUsers());
  109. }
  110. @Test
  111. public void testAuthenticate()
  112. {
  113. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  114. UserModel user = htpwdUserService.authenticate("user1", "pass1".toCharArray());
  115. assertNotNull(user);
  116. assertEquals("user1", user.username);
  117. user = htpwdUserService.authenticate("user2", "pass2".toCharArray());
  118. assertNotNull(user);
  119. assertEquals("user2", user.username);
  120. // Test different encryptions
  121. user = htpwdUserService.authenticate("plain", "passWord".toCharArray());
  122. assertNotNull(user);
  123. assertEquals("plain", user.username);
  124. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  125. user = htpwdUserService.authenticate("crypt", "password".toCharArray());
  126. assertNotNull(user);
  127. assertEquals("crypt", user.username);
  128. user = htpwdUserService.authenticate("md5", "password".toCharArray());
  129. assertNotNull(user);
  130. assertEquals("md5", user.username);
  131. user = htpwdUserService.authenticate("sha", "password".toCharArray());
  132. assertNotNull(user);
  133. assertEquals("sha", user.username);
  134. // Test leading and trailing whitespace
  135. user = htpwdUserService.authenticate("trailing", "whitespace".toCharArray());
  136. assertNotNull(user);
  137. assertEquals("trailing", user.username);
  138. user = htpwdUserService.authenticate("tabbed", "frontAndBack".toCharArray());
  139. assertNotNull(user);
  140. assertEquals("tabbed", user.username);
  141. user = htpwdUserService.authenticate("leading", "whitespace".toCharArray());
  142. assertNotNull(user);
  143. assertEquals("leading", user.username);
  144. // Test local account
  145. user = htpwdUserService.authenticate("admin", "admin".toCharArray());
  146. assertNotNull(user);
  147. assertEquals("admin", user.username);
  148. }
  149. @Test
  150. public void testAttributes()
  151. {
  152. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  153. UserModel user = htpwdUserService.authenticate("user1", "pass1".toCharArray());
  154. assertNotNull(user);
  155. assertEquals("El Capitan", user.displayName);
  156. assertEquals("cheffe@example.com", user.emailAddress);
  157. assertTrue(user.canAdmin);
  158. user = htpwdUserService.authenticate("user2", "pass2".toCharArray());
  159. assertNotNull(user);
  160. assertEquals("User Two", user.displayName);
  161. assertTrue(user.canCreate);
  162. assertTrue(user.canFork);
  163. user = htpwdUserService.authenticate("admin", "admin".toCharArray());
  164. assertNotNull(user);
  165. assertTrue(user.canAdmin);
  166. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  167. assertNotNull(user);
  168. assertEquals("Local User", user.displayName);
  169. assertFalse(user.canCreate);
  170. assertFalse(user.canFork);
  171. assertFalse(user.canAdmin);
  172. }
  173. @Test
  174. public void testAuthenticateDenied()
  175. {
  176. UserModel user = null;
  177. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  178. user = htpwdUserService.authenticate("user1", "".toCharArray());
  179. assertNull("User 'user1' falsely authenticated.", user);
  180. user = htpwdUserService.authenticate("user1", "pass2".toCharArray());
  181. assertNull("User 'user1' falsely authenticated.", user);
  182. user = htpwdUserService.authenticate("user2", "lalala".toCharArray());
  183. assertNull("User 'user2' falsely authenticated.", user);
  184. user = htpwdUserService.authenticate("user3", "disabled".toCharArray());
  185. assertNull("User 'user3' falsely authenticated.", user);
  186. user = htpwdUserService.authenticate("user4", "disabled".toCharArray());
  187. assertNull("User 'user4' falsely authenticated.", user);
  188. user = htpwdUserService.authenticate("plain", "text".toCharArray());
  189. assertNull("User 'plain' falsely authenticated.", user);
  190. user = htpwdUserService.authenticate("plain", "password".toCharArray());
  191. assertNull("User 'plain' falsely authenticated.", user);
  192. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  193. user = htpwdUserService.authenticate("crypt", "".toCharArray());
  194. assertNull("User 'cyrpt' falsely authenticated.", user);
  195. user = htpwdUserService.authenticate("crypt", "passwd".toCharArray());
  196. assertNull("User 'crypt' falsely authenticated.", user);
  197. user = htpwdUserService.authenticate("md5", "".toCharArray());
  198. assertNull("User 'md5' falsely authenticated.", user);
  199. user = htpwdUserService.authenticate("md5", "pwd".toCharArray());
  200. assertNull("User 'md5' falsely authenticated.", user);
  201. user = htpwdUserService.authenticate("sha", "".toCharArray());
  202. assertNull("User 'sha' falsely authenticated.", user);
  203. user = htpwdUserService.authenticate("sha", "letmein".toCharArray());
  204. assertNull("User 'sha' falsely authenticated.", user);
  205. user = htpwdUserService.authenticate(" tabbed", "frontAndBack".toCharArray());
  206. assertNull("User 'tabbed' falsely authenticated.", user);
  207. user = htpwdUserService.authenticate(" leading", "whitespace".toCharArray());
  208. assertNull("User 'leading' falsely authenticated.", user);
  209. }
  210. @Test
  211. public void testNewLocalAccount()
  212. {
  213. UserModel newUser = new UserModel("newlocal");
  214. newUser.displayName = "Local User 2";
  215. newUser.password = StringUtils.MD5_TYPE + StringUtils.getMD5("localPwd2");
  216. assertTrue("Failed to add local account.", htpwdUserService.updateUserModel(newUser));
  217. UserModel localAccount = htpwdUserService.authenticate(newUser.username, "localPwd2".toCharArray());
  218. assertNotNull(localAccount);
  219. assertEquals(newUser, localAccount);
  220. localAccount = htpwdUserService.authenticate(newUser.username, "localPwd2".toCharArray());
  221. assertNotNull(localAccount);
  222. assertEquals(newUser, localAccount);
  223. assertTrue("Failed to delete local account.", htpwdUserService.deleteUser(localAccount.username));
  224. assertNull(htpwdUserService.authenticate(newUser.username, "localPwd2".toCharArray()));
  225. }
  226. @Test
  227. public void testCleartextIntrusion()
  228. {
  229. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  230. assertNull(htpwdUserService.authenticate("md5", "$apr1$qAGGNfli$sAn14mn.WKId/3EQS7KSX0".toCharArray()));
  231. assertNull(htpwdUserService.authenticate("sha", "{SHA}W6ph5Mm5Pz8GgiULbPgzG37mj9g=".toCharArray()));
  232. assertNull(htpwdUserService.authenticate("user1", "#externalAccount".toCharArray()));
  233. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  234. assertNull(htpwdUserService.authenticate("md5", "$apr1$qAGGNfli$sAn14mn.WKId/3EQS7KSX0".toCharArray()));
  235. assertNull(htpwdUserService.authenticate("sha", "{SHA}W6ph5Mm5Pz8GgiULbPgzG37mj9g=".toCharArray()));
  236. assertNull(htpwdUserService.authenticate("user1", "#externalAccount".toCharArray()));
  237. }
  238. @Test
  239. public void testCryptVsPlaintext()
  240. {
  241. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "false");
  242. assertNull(htpwdUserService.authenticate("crypt", "6TmlbxqZ2kBIA".toCharArray()));
  243. assertNotNull(htpwdUserService.authenticate("crypt", "password".toCharArray()));
  244. MS.put(KEY_SUPPORT_PLAINTEXT_PWD, "true");
  245. assertNotNull(htpwdUserService.authenticate("crypt", "6TmlbxqZ2kBIA".toCharArray()));
  246. assertNull(htpwdUserService.authenticate("crypt", "password".toCharArray()));
  247. }
  248. /*
  249. * Test case: User exists in user.conf with a local password and in htpasswd with an external password.
  250. * If overrideLocalAuthentication is false, the local account takes precedence and is never updated.
  251. */
  252. @Test
  253. public void testPreparedAccountPreferLocal() throws IOException
  254. {
  255. setupUS(false);
  256. UserModel user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  257. assertNotNull(user);
  258. assertEquals("leaderred", user.getName());
  259. user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  260. assertNotNull(user);
  261. assertEquals("leaderred", user.getName());
  262. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  263. assertNull(user);
  264. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  265. assertNotNull(user);
  266. assertEquals("staylocal", user.getName());
  267. deleteGeneratedFiles();
  268. copyInFiles();
  269. setupUS(false);
  270. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  271. assertNull(user);
  272. user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  273. assertNotNull(user);
  274. assertEquals("leaderred", user.getName());
  275. user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  276. assertNotNull(user);
  277. assertEquals("leaderred", user.getName());
  278. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  279. assertNotNull(user);
  280. assertEquals("staylocal", user.getName());
  281. }
  282. /*
  283. * Test case: User exists in user.conf with a local password and in htpasswd with an external password.
  284. * If overrideLocalAuthentication is true, the external account takes precedence,
  285. * the initial local password is never used and discarded.
  286. */
  287. @Test
  288. public void testPreparedAccountPreferExternal() throws IOException
  289. {
  290. setupUS(true);
  291. UserModel user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  292. assertNotNull(user);
  293. assertEquals("leaderred", user.getName());
  294. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  295. assertNotNull(user);
  296. assertEquals("leaderred", user.getName());
  297. user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  298. assertNull(user);
  299. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  300. assertNotNull(user);
  301. assertEquals("staylocal", user.getName());
  302. deleteGeneratedFiles();
  303. copyInFiles();
  304. setupUS(true);
  305. user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  306. assertNull(user);
  307. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  308. assertNotNull(user);
  309. assertEquals("leaderred", user.getName());
  310. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  311. assertNotNull(user);
  312. assertEquals("leaderred", user.getName());
  313. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  314. assertNotNull(user);
  315. assertEquals("staylocal", user.getName());
  316. // Make sure no authentication by using the string constant for external accounts is possible.
  317. user = htpwdUserService.authenticate("leaderred", "#externalAccount".toCharArray());
  318. assertNull(user);
  319. }
  320. /*
  321. * Test case: User exists in user.conf with a local password and in htpasswd with an external password.
  322. * If overrideLocalAuthentication is true, the external account takes precedence,
  323. * the initial local password is never used and discarded.
  324. */
  325. @Test
  326. public void testPreparedAccountChangeSetting() throws IOException
  327. {
  328. getSettings(false);
  329. UserModel user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  330. assertNotNull(user);
  331. assertEquals("leaderred", user.getName());
  332. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  333. assertNull(user);
  334. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  335. assertNotNull(user);
  336. assertEquals("staylocal", user.getName());
  337. getSettings(true);
  338. user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  339. assertNull(user);
  340. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  341. assertNotNull(user);
  342. assertEquals("leaderred", user.getName());
  343. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  344. assertNotNull(user);
  345. assertEquals("staylocal", user.getName());
  346. // Make sure no authentication by using the string constant for external accounts is possible.
  347. user = htpwdUserService.authenticate("leaderred", "#externalAccount".toCharArray());
  348. assertNull(user);
  349. getSettings(false);
  350. // The preference is now back to local accounts but since the prepared account got switched
  351. // to an external account, it will stay this way.
  352. user = htpwdUserService.authenticate("leaderred", "localPassword".toCharArray());
  353. assertNull(user);
  354. user = htpwdUserService.authenticate("leaderred", "externalPassword".toCharArray());
  355. assertNotNull(user);
  356. assertEquals("leaderred", user.getName());
  357. user = htpwdUserService.authenticate("staylocal", "localUser".toCharArray());
  358. assertNotNull(user);
  359. assertEquals("staylocal", user.getName());
  360. // Make sure no authentication by using the string constant for external accounts is possible.
  361. user = htpwdUserService.authenticate("leaderred", "#externalAccount".toCharArray());
  362. assertNull(user);
  363. }
  364. @Test
  365. public void testChangeHtpasswdFile()
  366. {
  367. UserModel user;
  368. // User default set up.
  369. user = htpwdUserService.authenticate("md5", "password".toCharArray());
  370. assertNotNull(user);
  371. assertEquals("md5", user.username);
  372. user = htpwdUserService.authenticate("sha", "password".toCharArray());
  373. assertNotNull(user);
  374. assertEquals("sha", user.username);
  375. user = htpwdUserService.authenticate("blueone", "GoBlue!".toCharArray());
  376. assertNull(user);
  377. user = htpwdUserService.authenticate("bluetwo", "YayBlue!".toCharArray());
  378. assertNull(user);
  379. // Switch to different htpasswd file.
  380. getSettings(RESOURCE_DIR + "htpasswd-user", null, null);
  381. user = htpwdUserService.authenticate("md5", "password".toCharArray());
  382. assertNull(user);
  383. user = htpwdUserService.authenticate("sha", "password".toCharArray());
  384. assertNull(user);
  385. user = htpwdUserService.authenticate("blueone", "GoBlue!".toCharArray());
  386. assertNotNull(user);
  387. assertEquals("blueone", user.username);
  388. user = htpwdUserService.authenticate("bluetwo", "YayBlue!".toCharArray());
  389. assertNotNull(user);
  390. assertEquals("bluetwo", user.username);
  391. }
  392. @Test
  393. public void testChangeHtpasswdFileNotExisting()
  394. {
  395. UserModel user;
  396. // User default set up.
  397. user = htpwdUserService.authenticate("md5", "password".toCharArray());
  398. assertNotNull(user);
  399. assertEquals("md5", user.username);
  400. user = htpwdUserService.authenticate("sha", "password".toCharArray());
  401. assertNotNull(user);
  402. assertEquals("sha", user.username);
  403. user = htpwdUserService.authenticate("blueone", "GoBlue!".toCharArray());
  404. assertNull(user);
  405. user = htpwdUserService.authenticate("bluetwo", "YayBlue!".toCharArray());
  406. assertNull(user);
  407. // Switch to different htpasswd file that doesn't exist.
  408. // Currently we stop working with old users upon this change.
  409. getSettings(RESOURCE_DIR + "no-such-file", null, null);
  410. user = htpwdUserService.authenticate("md5", "password".toCharArray());
  411. assertNull(user);
  412. user = htpwdUserService.authenticate("sha", "password".toCharArray());
  413. assertNull(user);
  414. user = htpwdUserService.authenticate("blueone", "GoBlue!".toCharArray());
  415. assertNull(user);
  416. user = htpwdUserService.authenticate("bluetwo", "YayBlue!".toCharArray());
  417. assertNull(user);
  418. }
  419. }