blob: 34062a5254a9e0313acc9a779db6a278ddad7f9a [file] [log] [blame]
/****************************************************************
* Licensed to the Apache Software Foundation (ASF) under one *
* or more contributor license agreements. See the NOTICE file *
* distributed with this work for additional information *
* regarding copyright ownership. The ASF licenses this file *
* to you under the Apache License, Version 2.0 (the *
* "License"); you may not use this file except in compliance *
* with the License. You may obtain a copy of the License at *
* *
* http://www.apache.org/licenses/LICENSE-2.0 *
* *
* Unless required by applicable law or agreed to in writing, *
* software distributed under the License is distributed on an *
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY *
* KIND, either express or implied. See the License for the *
* specific language governing permissions and limitations *
* under the License. *
****************************************************************/
package org.apache.james.jmap.http;
import static org.assertj.core.api.Assertions.assertThat;
import static org.assertj.core.api.Assertions.assertThatThrownBy;
import static org.mockito.ArgumentMatchers.eq;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
import java.util.UUID;
import java.util.function.Predicate;
import org.apache.commons.lang3.NotImplementedException;
import org.apache.james.core.Username;
import org.apache.james.jmap.api.access.AccessToken;
import org.apache.james.jmap.api.access.exceptions.InvalidAccessToken;
import org.apache.james.jmap.draft.crypto.AccessTokenManagerImpl;
import org.apache.james.jmap.exceptions.UnauthorizedException;
import org.apache.james.mailbox.MailboxManager;
import org.apache.james.mailbox.MailboxSession;
import org.apache.james.mailbox.SessionProvider;
import org.apache.james.mailbox.exception.MailboxException;
import org.junit.Before;
import org.junit.Test;
import com.google.common.collect.ImmutableList;
import io.netty.handler.codec.http.HttpHeaders;
import reactor.core.publisher.Mono;
import reactor.netty.http.server.HttpServerRequest;
public class AccessTokenAuthenticationStrategyTest {
private static final String AUTHORIZATION_HEADERS = "Authorization";
private AccessTokenManagerImpl mockedAccessTokenManager;
private MailboxManager mockedMailboxManager;
private AccessTokenAuthenticationStrategy testee;
private HttpServerRequest mockedRequest;
private HttpHeaders mockedHeaders;
@Before
public void setup() {
mockedAccessTokenManager = mock(AccessTokenManagerImpl.class);
mockedMailboxManager = mock(MailboxManager.class);
mockedRequest = mock(HttpServerRequest.class);
mockedHeaders = mock(HttpHeaders.class);
when(mockedRequest.requestHeaders())
.thenReturn(mockedHeaders);
testee = new AccessTokenAuthenticationStrategy(mockedAccessTokenManager, mockedMailboxManager);
}
@Test
public void createMailboxSessionShouldReturnEmptyWhenNoAuthProvided() {
assertThat(testee.createMailboxSession(mockedRequest).blockOptional())
.isEmpty();
}
@Test
public void createMailboxSessionShouldThrowWhenAuthHeaderIsNotAnUUID() {
when(mockedHeaders.get(AUTHORIZATION_HEADERS))
.thenReturn("bad");
assertThatThrownBy(() -> testee.createMailboxSession(mockedRequest).block())
.isExactlyInstanceOf(UnauthorizedException.class);
}
@Test
public void createMailboxSessionShouldThrowWhenAuthHeaderIsInvalid() {
Username username = Username.of("123456789");
MailboxSession fakeMailboxSession = mock(MailboxSession.class);
when(mockedMailboxManager.createSystemSession(eq(username)))
.thenReturn(fakeMailboxSession);
UUID authHeader = UUID.randomUUID();
AccessToken accessToken = AccessToken.fromString(authHeader.toString());
when(mockedAccessTokenManager.getUsernameFromToken(accessToken))
.thenReturn(Mono.error(new InvalidAccessToken(accessToken)));
when(mockedHeaders.get(AUTHORIZATION_HEADERS))
.thenReturn(authHeader.toString());
assertThatThrownBy(() -> testee.createMailboxSession(mockedRequest).blockOptional())
.isInstanceOf(UnauthorizedException.class);
}
@Test
public void createMailboxSessionShouldThrowWhenMultipleAuthHeaders() {
UUID authHeader1 = UUID.randomUUID();
UUID authHeader2 = UUID.randomUUID();
when(mockedHeaders.getAll(AUTHORIZATION_HEADERS))
.thenReturn(ImmutableList.of(authHeader1.toString(), authHeader2.toString()));
assertThatThrownBy(() -> testee.createMailboxSession(mockedRequest).block())
.isExactlyInstanceOf(IllegalArgumentException.class);
}
@Test
public void createMailboxSessionShouldReturnWhenAuthHeadersAreValid() {
Username username = Username.of("123456789");
MailboxSession fakeMailboxSession = mock(MailboxSession.class);
when(mockedMailboxManager.authenticate(eq(username)))
.thenReturn(new SessionProvider.AuthorizationStep() {
@Override
public MailboxSession as(Username other) {
throw new NotImplementedException();
}
@Override
public MailboxSession withoutDelegation() {
return fakeMailboxSession;
}
@Override
public MailboxSession forMatchingUser(Predicate<Username> other) throws MailboxException {
throw new NotImplementedException();
}
});
UUID authHeader = UUID.randomUUID();
AccessToken accessToken = AccessToken.fromString(authHeader.toString());
when(mockedAccessTokenManager.getUsernameFromToken(accessToken))
.thenReturn(Mono.just(username));
when(mockedHeaders.get(AUTHORIZATION_HEADERS))
.thenReturn(authHeader.toString());
MailboxSession result = testee.createMailboxSession(mockedRequest).block();
assertThat(result).isEqualTo(fakeMailboxSession);
}
}