1
0
mirror of https://github.com/oauth2-proxy/oauth2-proxy.git synced 2024-11-24 08:52:25 +02:00
oauth2-proxy/pkg/cookies/cookies_test.go
t-katsumura d107d885e4
Session-Cookie Support (#1713)
* Create session cookie when cookie-expire set 0

* Fix format

* add test

* fix lint error

* fix test code

* fix conflicted test case

* update test case of cookie expiration

* update tests of csrf cookies

* update docs

* Update docs/docs/configuration/overview.md

Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>

---------

Co-authored-by: tanuki884 <morkazuk@fsi.co.jp>
Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk>
2023-08-16 12:23:02 +01:00

153 lines
4.4 KiB
Go

package cookies
import (
"fmt"
"net/http"
"time"
"github.com/oauth2-proxy/oauth2-proxy/v7/pkg/apis/options"
middlewareapi "github.com/oauth2-proxy/oauth2-proxy/v7/pkg/apis/middleware"
. "github.com/onsi/ginkgo"
. "github.com/onsi/ginkgo/extensions/table"
. "github.com/onsi/gomega"
)
var _ = Describe("Cookie Tests", func() {
Context("GetCookieDomain", func() {
type getCookieDomainTableInput struct {
host string
xForwardedHost string
cookieDomains []string
expectedOutput string
}
DescribeTable("should return expected results",
func(in getCookieDomainTableInput) {
req, err := http.NewRequest(
http.MethodGet,
fmt.Sprintf("https://%s/%s", in.host, cookiePath),
nil,
)
Expect(err).ToNot(HaveOccurred())
if in.xForwardedHost != "" {
req.Header.Add("X-Forwarded-Host", in.xForwardedHost)
req = middlewareapi.AddRequestScope(req, &middlewareapi.RequestScope{
ReverseProxy: true,
})
}
Expect(GetCookieDomain(req, in.cookieDomains)).To(Equal(in.expectedOutput))
},
Entry("a single exact match for the Host header", getCookieDomainTableInput{
host: "www.cookies.test",
cookieDomains: []string{"www.cookies.test"},
expectedOutput: "www.cookies.test",
}),
Entry("a single exact match for the X-Forwarded-Host header", getCookieDomainTableInput{
host: "backend.cookies.internal",
xForwardedHost: "www.cookies.test",
cookieDomains: []string{"www.cookies.test"},
expectedOutput: "www.cookies.test",
}),
Entry("a single suffix match for the Host header", getCookieDomainTableInput{
host: "www.cookies.test",
cookieDomains: []string{".cookies.test"},
expectedOutput: ".cookies.test",
}),
Entry("a single suffix match for the X-Forwarded-Host header", getCookieDomainTableInput{
host: "backend.cookies.internal",
xForwardedHost: "www.cookies.test",
cookieDomains: []string{".cookies.test"},
expectedOutput: ".cookies.test",
}),
Entry("the first match is used", getCookieDomainTableInput{
host: "www.cookies.test",
cookieDomains: []string{"www.cookies.test", ".cookies.test"},
expectedOutput: "www.cookies.test",
}),
Entry("the only match is used", getCookieDomainTableInput{
host: "www.cookies.test",
cookieDomains: []string{".cookies.wrong", ".cookies.test"},
expectedOutput: ".cookies.test",
}),
Entry("blank is returned for no matches", getCookieDomainTableInput{
host: "www.cookies.test",
cookieDomains: []string{".cookies.wrong", ".cookies.false"},
expectedOutput: "",
}),
)
})
Context("MakeCookieFromOptions", func() {
type makeCookieFromOptionsTableInput struct {
host string
name string
value string
opts options.Cookie
expiration time.Duration
now time.Time
expectedOutput time.Time
}
validName := "_oauth2_proxy"
validSecret := "secretthirtytwobytes+abcdefghijk"
domains := []string{"www.cookies.test"}
now := time.Now()
var expectedExpires time.Time
DescribeTable("should return cookies with or without expiration",
func(in makeCookieFromOptionsTableInput) {
req, err := http.NewRequest(
http.MethodGet,
fmt.Sprintf("https://%s/%s", in.host, cookiePath),
nil,
)
Expect(err).ToNot(HaveOccurred())
Expect(MakeCookieFromOptions(req, in.name, in.value, &in.opts, in.expiration, in.now).Expires).To(Equal(in.expectedOutput))
},
Entry("persistent cookie", makeCookieFromOptionsTableInput{
host: "www.cookies.test",
name: validName,
value: "1",
opts: options.Cookie{
Name: validName,
Secret: validSecret,
Domains: domains,
Path: "",
Expire: time.Hour,
Refresh: 15 * time.Minute,
Secure: true,
HTTPOnly: false,
SameSite: "",
},
expiration: 15 * time.Minute,
now: now,
expectedOutput: now.Add(15 * time.Minute),
}),
Entry("session cookie", makeCookieFromOptionsTableInput{
host: "www.cookies.test",
name: validName,
value: "1",
opts: options.Cookie{
Name: validName,
Secret: validSecret,
Domains: domains,
Path: "",
Expire: 0,
Refresh: 15 * time.Minute,
Secure: true,
HTTPOnly: false,
SameSite: "",
},
expiration: 0,
now: now,
expectedOutput: expectedExpires,
}),
)
})
})