message_verifier_test.rb 6.6 KB
Newer Older
1
# frozen_string_literal: true
2

3 4 5 6
require "abstract_unit"
require "openssl"
require "active_support/time"
require "active_support/json"
7
require_relative "metadata/shared_metadata_tests"
J
Jeremy Kemper 已提交
8

9
class MessageVerifierTest < ActiveSupport::TestCase
10 11 12 13 14 15 16 17 18
  class JSONSerializer
    def dump(value)
      ActiveSupport::JSON.encode(value)
    end

    def load(value)
      ActiveSupport::JSON.decode(value)
    end
  end
R
Rafael Mendonça França 已提交
19

20
  def setup
21
    @verifier = ActiveSupport::MessageVerifier.new("Hey, I'm a secret!")
22
    @data = { some: "data", now: Time.utc(2010) }
23
    @secret = SecureRandom.random_bytes(32)
24
  end
25

26 27
  def test_valid_message
    data, hash = @verifier.generate(@data).split("--")
28 29 30 31 32 33
    assert_not @verifier.valid_message?(nil)
    assert_not @verifier.valid_message?("")
    assert_not @verifier.valid_message?("\xff") # invalid encoding
    assert_not @verifier.valid_message?("#{data.reverse}--#{hash}")
    assert_not @verifier.valid_message?("#{data}--#{hash.reverse}")
    assert_not @verifier.valid_message?("purejunk")
34 35
  end

36
  def test_simple_round_tripping
37
    message = @verifier.generate(@data)
38
    assert_equal @data, @verifier.verified(message)
39
    assert_equal @data, @verifier.verify(message)
40
  end
41

42
  def test_verified_returns_false_on_invalid_message
43
    assert_not @verifier.verified("purejunk")
44
  end
45

46 47 48 49
  def test_verify_exception_on_invalid_message
    assert_raise(ActiveSupport::MessageVerifier::InvalidSignature) do
      @verifier.verify("purejunk")
    end
50
  end
R
Rafael Mendonça França 已提交
51

52
  def test_alternative_serialization_method
53 54
    prev = ActiveSupport.use_standard_json_time_format
    ActiveSupport.use_standard_json_time_format = true
55
    verifier = ActiveSupport::MessageVerifier.new("Hey, I'm a secret!", serializer: JSONSerializer.new)
56
    message = verifier.generate({ :foo => 123, "bar" => Time.utc(2010) })
57
    exp = { "foo" => 123, "bar" => "2010-01-01T00:00:00.000Z" }
58
    assert_equal exp, verifier.verified(message)
59 60 61
    assert_equal exp, verifier.verify(message)
  ensure
    ActiveSupport.use_standard_json_time_format = prev
62
  end
R
Rafael Mendonça França 已提交
63

64 65 66 67 68 69 70
  def test_raise_error_when_argument_class_is_not_loaded
    # To generate the valid message below:
    #
    #   AutoloadClass = Struct.new(:foo)
    #   valid_message = @verifier.generate(foo: AutoloadClass.new('foo'))
    #
    valid_message = "BAh7BjoIZm9vbzonTWVzc2FnZVZlcmlmaWVyVGVzdDo6QXV0b2xvYWRDbGFzcwY6CUBmb29JIghmb28GOgZFVA==--f3ef39a5241c365083770566dc7a9eb5d6ace914"
71 72 73 74 75
    exception = assert_raise(ArgumentError, NameError) do
      @verifier.verified(valid_message)
    end
    assert_includes ["uninitialized constant MessageVerifierTest::AutoloadClass",
                    "undefined class/module MessageVerifierTest::AutoloadClass"], exception.message
76 77 78 79 80 81 82
    exception = assert_raise(ArgumentError, NameError) do
      @verifier.verify(valid_message)
    end
    assert_includes ["uninitialized constant MessageVerifierTest::AutoloadClass",
                    "undefined class/module MessageVerifierTest::AutoloadClass"], exception.message
  end

83 84 85 86
  def test_raise_error_when_secret_is_nil
    exception = assert_raise(ArgumentError) do
      ActiveSupport::MessageVerifier.new(nil)
    end
87
    assert_equal "Secret should not be nil.", exception.message
88
  end
89 90 91 92 93

  def test_backward_compatibility_messages_signed_without_metadata
    signed_message = "BAh7BzoJc29tZUkiCWRhdGEGOgZFVDoIbm93SXU6CVRpbWUNIIAbgAAAAAAHOgtvZmZzZXRpADoJem9uZUkiCFVUQwY7BkY=--d03c52c91dfe4ccc5159417c660461bcce005e96"
    assert_equal @data, @verifier.verify(signed_message)
  end
94

95 96
  def test_rotating_secret
    old_message = ActiveSupport::MessageVerifier.new("old", digest: "SHA1").generate("old")
97 98

    verifier = ActiveSupport::MessageVerifier.new(@secret, digest: "SHA1")
99
    verifier.rotate "old"
100

101
    assert_equal "old", verifier.verified(old_message)
102 103
  end

104 105 106
  def test_multiple_rotations
    old_message   = ActiveSupport::MessageVerifier.new("old", digest: "SHA256").generate("old")
    older_message = ActiveSupport::MessageVerifier.new("older", digest: "SHA1").generate("older")
107

108 109 110
    verifier = ActiveSupport::MessageVerifier.new(@secret, digest: "SHA512")
    verifier.rotate "old",   digest: "SHA256"
    verifier.rotate "older", digest: "SHA1"
111

112 113 114
    assert_equal "new",   verifier.verified(verifier.generate("new"))
    assert_equal "old",   verifier.verified(old_message)
    assert_equal "older", verifier.verified(older_message)
115 116
  end

117
  def test_on_rotation_is_called_and_verified_returns_message
118
    older_message = ActiveSupport::MessageVerifier.new("older", digest: "SHA1").generate({ encoded: "message" })
119

120 121 122
    verifier = ActiveSupport::MessageVerifier.new(@secret, digest: "SHA512")
    verifier.rotate "old",   digest: "SHA256"
    verifier.rotate "older", digest: "SHA1"
123

124 125
    rotated = false
    message = verifier.verified(older_message, on_rotation: proc { rotated = true })
126 127

    assert_equal({ encoded: "message" }, message)
128
    assert rotated
129 130
  end

131 132
  def test_rotations_with_metadata
    old_message = ActiveSupport::MessageVerifier.new("old").generate("old", purpose: :rotation)
133

134 135
    verifier = ActiveSupport::MessageVerifier.new(@secret)
    verifier.rotate "old"
136

137
    assert_equal "old", verifier.verified(old_message, purpose: :rotation)
138
  end
139 140 141 142 143 144
end

class MessageVerifierMetadataTest < ActiveSupport::TestCase
  include SharedMessageMetadataTests

  setup do
145
    @verifier = ActiveSupport::MessageVerifier.new("Hey, I'm a secret!", **verifier_options)
146 147
  end

A
Assain 已提交
148 149
  def test_verify_raises_when_purpose_differs
    assert_raise(ActiveSupport::MessageVerifier::InvalidSignature) do
150
      @verifier.verify(generate(data, purpose: "payment"), purpose: "shipping")
A
Assain 已提交
151 152 153 154
    end
  end

  def test_verify_raises_when_expired
155
    signed_message = generate(data, expires_in: 1.month)
A
Assain 已提交
156 157 158 159 160 161 162

    travel 2.months
    assert_raise(ActiveSupport::MessageVerifier::InvalidSignature) do
      @verifier.verify(signed_message)
    end
  end

163 164
  private
    def generate(message, **options)
165
      @verifier.generate(message, **options)
166 167 168
    end

    def parse(message, **options)
169
      @verifier.verified(message, **options)
170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188
    end

    def verifier_options
      Hash.new
    end
end

class MessageVerifierMetadataMarshalTest < MessageVerifierMetadataTest
  private
    def verifier_options
      { serializer: Marshal }
    end
end

class MessageVerifierMetadataJSONTest < MessageVerifierMetadataTest
  private
    def verifier_options
      { serializer: MessageVerifierTest::JSONSerializer.new }
    end
189
end
190 191 192 193 194 195 196 197 198 199 200 201 202 203 204

class MessageEncryptorMetadataNullSerializerTest < MessageVerifierMetadataTest
  private
    def data
      "string message"
    end

    def null_serializing?
      true
    end

    def verifier_options
      { serializer: ActiveSupport::MessageEncryptor::NullSerializer }
    end
end