Update tests

This commit is contained in:
Chris Eager 2023-11-28 16:02:15 -06:00 committed by Chris Eager
parent a027c4ce1f
commit 9c54d2407b
3 changed files with 31 additions and 96 deletions

View File

@ -488,10 +488,13 @@ class AccountControllerTest {
final boolean locateLinkByUuid, final boolean locateLinkByUuid,
final int expectedStatus) { final int expectedStatus) {
MockUtils.updateRateLimiterResponseToAllow( if (passRateLimiting) {
rateLimiters, RateLimiters.For.USERNAME_LINK_LOOKUP_PER_IP, NICE_HOST); MockUtils.updateRateLimiterResponseToAllow(
MockUtils.updateRateLimiterResponseToFail( rateLimiters, RateLimiters.For.USERNAME_LINK_LOOKUP_PER_IP, "127.0.0.1");
rateLimiters, RateLimiters.For.USERNAME_LINK_LOOKUP_PER_IP, RATE_LIMITED_IP_HOST, Duration.ofMinutes(10), false); } else {
MockUtils.updateRateLimiterResponseToFail(
rateLimiters, RateLimiters.For.USERNAME_LINK_LOOKUP_PER_IP, "127.0.0.1", Duration.ofMinutes(10), false);
}
when(accountsManager.getByUsernameLinkHandle(any())).thenReturn(CompletableFuture.completedFuture(Optional.empty())); when(accountsManager.getByUsernameLinkHandle(any())).thenReturn(CompletableFuture.completedFuture(Optional.empty()));
@ -509,9 +512,7 @@ class AccountControllerTest {
if (!stayUnauthenticated) { if (!stayUnauthenticated) {
builder.header(HttpHeaders.AUTHORIZATION, AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD)); builder.header(HttpHeaders.AUTHORIZATION, AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD));
} }
final Response get = builder final Response get = builder.get();
.header(HttpHeaders.X_FORWARDED_FOR, passRateLimiting ? NICE_HOST : RATE_LIMITED_IP_HOST)
.get();
assertEquals(expectedStatus, get.getStatus()); assertEquals(expectedStatus, get.getStatus());
} }
@ -864,21 +865,18 @@ class AccountControllerTest {
assertThat(resources.getJerseyTest() assertThat(resources.getJerseyTest()
.target(String.format("/v1/accounts/account/%s", accountIdentifier)) .target(String.format("/v1/accounts/account/%s", accountIdentifier))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.head() .head()
.getStatus()).isEqualTo(200); .getStatus()).isEqualTo(200);
assertThat(resources.getJerseyTest() assertThat(resources.getJerseyTest()
.target(String.format("/v1/accounts/account/PNI:%s", phoneNumberIdentifier)) .target(String.format("/v1/accounts/account/PNI:%s", phoneNumberIdentifier))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.head() .head()
.getStatus()).isEqualTo(200); .getStatus()).isEqualTo(200);
assertThat(resources.getJerseyTest() assertThat(resources.getJerseyTest()
.target(String.format("/v1/accounts/account/%s", UUID.randomUUID())) .target(String.format("/v1/accounts/account/%s", UUID.randomUUID()))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.head() .head()
.getStatus()).isEqualTo(404); .getStatus()).isEqualTo(404);
} }
@ -896,32 +894,18 @@ class AccountControllerTest {
final Response response = resources.getJerseyTest() final Response response = resources.getJerseyTest()
.target(String.format("/v1/accounts/account/%s", accountIdentifier)) .target(String.format("/v1/accounts/account/%s", accountIdentifier))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.head(); .head();
assertThat(response.getStatus()).isEqualTo(413); assertThat(response.getStatus()).isEqualTo(413);
assertThat(response.getHeaderString("Retry-After")).isEqualTo(String.valueOf(expectedRetryAfter.toSeconds())); assertThat(response.getHeaderString("Retry-After")).isEqualTo(String.valueOf(expectedRetryAfter.toSeconds()));
} }
@Test
void testAccountExistsNoForwardedFor() throws RateLimitExceededException {
final Response response = resources.getJerseyTest()
.target(String.format("/v1/accounts/account/%s", UUID.randomUUID()))
.request()
.header(HttpHeaders.X_FORWARDED_FOR, "")
.head();
assertThat(response.getStatus()).isEqualTo(413);
assertThat(Long.parseLong(response.getHeaderString("Retry-After"))).isNotNegative();
}
@Test @Test
void testAccountExistsAuthenticated() { void testAccountExistsAuthenticated() {
assertThat(resources.getJerseyTest() assertThat(resources.getJerseyTest()
.target(String.format("/v1/accounts/account/%s", UUID.randomUUID())) .target(String.format("/v1/accounts/account/%s", UUID.randomUUID()))
.request() .request()
.header(HttpHeaders.AUTHORIZATION, AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD)) .header(HttpHeaders.AUTHORIZATION, AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD))
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.head() .head()
.getStatus()).isEqualTo(400); .getStatus()).isEqualTo(400);
} }
@ -936,7 +920,6 @@ class AccountControllerTest {
Response response = resources.getJerseyTest() Response response = resources.getJerseyTest()
.target(String.format("v1/accounts/username_hash/%s", BASE_64_URL_USERNAME_HASH_1)) .target(String.format("v1/accounts/username_hash/%s", BASE_64_URL_USERNAME_HASH_1))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.get(); .get();
assertThat(response.getStatus()).isEqualTo(200); assertThat(response.getStatus()).isEqualTo(200);
assertThat(response.readEntity(AccountIdentifierResponse.class).uuid().uuid()).isEqualTo(uuid); assertThat(response.readEntity(AccountIdentifierResponse.class).uuid().uuid()).isEqualTo(uuid);
@ -948,7 +931,6 @@ class AccountControllerTest {
assertThat(resources.getJerseyTest() assertThat(resources.getJerseyTest()
.target(String.format("v1/accounts/username_hash/%s", BASE_64_URL_USERNAME_HASH_1)) .target(String.format("v1/accounts/username_hash/%s", BASE_64_URL_USERNAME_HASH_1))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.get().getStatus()).isEqualTo(404); .get().getStatus()).isEqualTo(404);
} }
@ -960,7 +942,6 @@ class AccountControllerTest {
final Response response = resources.getJerseyTest() final Response response = resources.getJerseyTest()
.target(String.format("v1/accounts/username_hash/%s", BASE_64_URL_USERNAME_HASH_1)) .target(String.format("v1/accounts/username_hash/%s", BASE_64_URL_USERNAME_HASH_1))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.get(); .get();
assertThat(response.getStatus()).isEqualTo(413); assertThat(response.getStatus()).isEqualTo(413);
@ -973,7 +954,6 @@ class AccountControllerTest {
.target(String.format("/v1/accounts/username_hash/%s", USERNAME_HASH_1)) .target(String.format("/v1/accounts/username_hash/%s", USERNAME_HASH_1))
.request() .request()
.header(HttpHeaders.AUTHORIZATION, AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD)) .header(HttpHeaders.AUTHORIZATION, AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD))
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.get() .get()
.getStatus()).isEqualTo(400); .getStatus()).isEqualTo(400);
} }
@ -983,14 +963,12 @@ class AccountControllerTest {
assertThat(resources.getJerseyTest() assertThat(resources.getJerseyTest()
.target(String.format("/v1/accounts/username_hash/%s", INVALID_USERNAME_HASH)) .target(String.format("/v1/accounts/username_hash/%s", INVALID_USERNAME_HASH))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.get() .get()
.getStatus()).isEqualTo(422); .getStatus()).isEqualTo(422);
assertThat(resources.getJerseyTest() assertThat(resources.getJerseyTest()
.target(String.format("/v1/accounts/username_hash/%s", TOO_SHORT_USERNAME_HASH)) .target(String.format("/v1/accounts/username_hash/%s", TOO_SHORT_USERNAME_HASH))
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "127.0.0.1")
.get() .get()
.getStatus()).isEqualTo(422); .getStatus()).isEqualTo(422);
} }

View File

@ -146,13 +146,14 @@ class ChallengeControllerTest {
} }
final Response response = EXTENSION.target("/v1/challenge") final Response response = EXTENSION.target("/v1/challenge")
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "10.0.0.1")
.header("Authorization", AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD)) .header("Authorization", AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD))
.put(Entity.json(recaptchaChallengeJson)); .put(Entity.json(recaptchaChallengeJson));
assertEquals(200, response.getStatus()); assertEquals(200, response.getStatus());
verify(rateLimitChallengeManager).answerRecaptchaChallenge(eq(AuthHelper.VALID_ACCOUNT), eq("The value of the solved captcha token"), eq("10.0.0.1"), anyString(), eq(hasThreshold ? Optional.of(0.5f) : Optional.empty())); verify(rateLimitChallengeManager).answerRecaptchaChallenge(eq(AuthHelper.VALID_ACCOUNT),
eq("The value of the solved captcha token"), eq("127.0.0.1"), anyString(),
eq(hasThreshold ? Optional.of(0.5f) : Optional.empty()));
} }
@Test @Test
@ -164,12 +165,12 @@ class ChallengeControllerTest {
"captcha": "The value of the solved captcha token" "captcha": "The value of the solved captcha token"
} }
"""; """;
when(rateLimitChallengeManager.answerRecaptchaChallenge(eq(AuthHelper.VALID_ACCOUNT), eq("The value of the solved captcha token"), eq("10.0.0.1"), anyString(), any())) when(rateLimitChallengeManager.answerRecaptchaChallenge(eq(AuthHelper.VALID_ACCOUNT),
eq("The value of the solved captcha token"), eq("127.0.0.1"), anyString(), any()))
.thenReturn(false); .thenReturn(false);
final Response response = EXTENSION.target("/v1/challenge") final Response response = EXTENSION.target("/v1/challenge")
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "10.0.0.1")
.header("Authorization", AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD)) .header("Authorization", AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD))
.put(Entity.json(recaptchaChallengeJson)); .put(Entity.json(recaptchaChallengeJson));
@ -192,7 +193,6 @@ class ChallengeControllerTest {
final Response response = EXTENSION.target("/v1/challenge") final Response response = EXTENSION.target("/v1/challenge")
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, "10.0.0.1")
.header("Authorization", AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD)) .header("Authorization", AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD))
.put(Entity.json(recaptchaChallengeJson)); .put(Entity.json(recaptchaChallengeJson));
@ -200,25 +200,6 @@ class ChallengeControllerTest {
assertEquals(String.valueOf(retryAfter.toSeconds()), response.getHeaderString("Retry-After")); assertEquals(String.valueOf(retryAfter.toSeconds()), response.getHeaderString("Retry-After"));
} }
@Test
void testHandleRecaptchaNoForwardedFor() {
final String recaptchaChallengeJson = """
{
"type": "recaptcha",
"token": "A server-generated token",
"captcha": "The value of the solved captcha token"
}
""";
final Response response = EXTENSION.target("/v1/challenge")
.request()
.header("Authorization", AuthHelper.getAuthHeader(AuthHelper.VALID_UUID, AuthHelper.VALID_PASSWORD))
.put(Entity.json(recaptchaChallengeJson));
assertEquals(400, response.getStatus());
verifyNoInteractions(rateLimitChallengeManager);
}
@Test @Test
void testHandleUnrecognizedAnswer() { void testHandleUnrecognizedAnswer() {
final String unrecognizedJson = """ final String unrecognizedJson = """

View File

@ -6,6 +6,11 @@
package org.whispersystems.textsecuregcm.limits; package org.whispersystems.textsecuregcm.limits;
import static org.junit.jupiter.api.Assertions.assertEquals; import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.mockito.ArgumentMatchers.eq;
import static org.mockito.Mockito.doNothing;
import static org.mockito.Mockito.doThrow;
import static org.mockito.Mockito.mock;
import static org.mockito.Mockito.when;
import com.google.common.net.HttpHeaders; import com.google.common.net.HttpHeaders;
import io.dropwizard.testing.junit5.DropwizardExtensionsSupport; import io.dropwizard.testing.junit5.DropwizardExtensionsSupport;
@ -17,7 +22,6 @@ import javax.ws.rs.core.Response;
import org.glassfish.jersey.test.grizzly.GrizzlyWebTestContainerFactory; import org.glassfish.jersey.test.grizzly.GrizzlyWebTestContainerFactory;
import org.junit.jupiter.api.Test; import org.junit.jupiter.api.Test;
import org.junit.jupiter.api.extension.ExtendWith; import org.junit.jupiter.api.extension.ExtendWith;
import org.mockito.Mockito;
import org.whispersystems.textsecuregcm.controllers.RateLimitExceededException; import org.whispersystems.textsecuregcm.controllers.RateLimitExceededException;
import org.whispersystems.textsecuregcm.util.MockUtils; import org.whispersystems.textsecuregcm.util.MockUtils;
import org.whispersystems.textsecuregcm.util.SystemMapper; import org.whispersystems.textsecuregcm.util.SystemMapper;
@ -25,18 +29,10 @@ import org.whispersystems.textsecuregcm.util.SystemMapper;
@ExtendWith(DropwizardExtensionsSupport.class) @ExtendWith(DropwizardExtensionsSupport.class)
public class RateLimitedByIpTest { public class RateLimitedByIpTest {
private static final String IP = "70.130.130.200"; private static final String IP = "127.0.0.1";
private static final String VALID_X_FORWARDED_FOR = "1.1.1.1," + IP;
private static final String INVALID_X_FORWARDED_FOR = "1.1.1.1,";
private static final Duration RETRY_AFTER = Duration.ofSeconds(100); private static final Duration RETRY_AFTER = Duration.ofSeconds(100);
private static final Duration RETRY_AFTER_INVALID_HEADER = RateLimitByIpFilter.INVALID_HEADER_EXCEPTION
.getRetryDuration()
.orElseThrow();
@Path("/test") @Path("/test")
public static class Controller { public static class Controller {
@ -55,10 +51,10 @@ public class RateLimitedByIpTest {
} }
} }
private static final RateLimiter RATE_LIMITER = Mockito.mock(RateLimiter.class); private static final RateLimiter RATE_LIMITER = mock(RateLimiter.class);
private static final RateLimiters RATE_LIMITERS = MockUtils.buildMock(RateLimiters.class, rl -> private static final RateLimiters RATE_LIMITERS = MockUtils.buildMock(RateLimiters.class, rl ->
Mockito.when(rl.forDescriptor(Mockito.eq(RateLimiters.For.BACKUP_AUTH_CHECK))).thenReturn(RATE_LIMITER)); when(rl.forDescriptor(eq(RateLimiters.For.BACKUP_AUTH_CHECK))).thenReturn(RATE_LIMITER));
private static final ResourceExtension RESOURCES = ResourceExtension.builder() private static final ResourceExtension RESOURCES = ResourceExtension.builder()
.setMapper(SystemMapper.jsonMapper()) .setMapper(SystemMapper.jsonMapper())
@ -69,49 +65,29 @@ public class RateLimitedByIpTest {
@Test @Test
public void testRateLimits() throws Exception { public void testRateLimits() throws Exception {
Mockito.doNothing().when(RATE_LIMITER).validate(Mockito.eq(IP)); doNothing().when(RATE_LIMITER).validate(eq(IP));
validateSuccess("/test/strict", VALID_X_FORWARDED_FOR); validateSuccess("/test/strict");
Mockito.doThrow(new RateLimitExceededException(RETRY_AFTER, true)).when(RATE_LIMITER).validate(Mockito.eq(IP)); doThrow(new RateLimitExceededException(RETRY_AFTER, true)).when(RATE_LIMITER).validate(eq(IP));
validateFailure("/test/strict", VALID_X_FORWARDED_FOR, RETRY_AFTER); validateFailure("/test/strict", RETRY_AFTER);
Mockito.doNothing().when(RATE_LIMITER).validate(Mockito.eq(IP)); doNothing().when(RATE_LIMITER).validate(eq(IP));
validateSuccess("/test/strict", VALID_X_FORWARDED_FOR); validateSuccess("/test/strict");
Mockito.doThrow(new RateLimitExceededException(RETRY_AFTER, true)).when(RATE_LIMITER).validate(Mockito.eq(IP)); doThrow(new RateLimitExceededException(RETRY_AFTER, true)).when(RATE_LIMITER).validate(eq(IP));
validateFailure("/test/strict", VALID_X_FORWARDED_FOR, RETRY_AFTER); validateFailure("/test/strict", RETRY_AFTER);
} }
@Test private static void validateSuccess(final String path) {
public void testInvalidHeader() throws Exception {
Mockito.doNothing().when(RATE_LIMITER).validate(Mockito.eq(IP));
validateSuccess("/test/strict", VALID_X_FORWARDED_FOR);
validateFailure("/test/strict", INVALID_X_FORWARDED_FOR, RETRY_AFTER_INVALID_HEADER);
validateFailure("/test/strict", "", RETRY_AFTER_INVALID_HEADER);
validateSuccess("/test/loose", VALID_X_FORWARDED_FOR);
validateSuccess("/test/loose", INVALID_X_FORWARDED_FOR);
validateSuccess("/test/loose", "");
// also checking that even if rate limiter is failing -- it doesn't matter in the case of invalid IP
Mockito.doThrow(new RateLimitExceededException(RETRY_AFTER, true)).when(RATE_LIMITER).validate(Mockito.anyString());
validateFailure("/test/loose", VALID_X_FORWARDED_FOR, RETRY_AFTER);
validateSuccess("/test/loose", INVALID_X_FORWARDED_FOR);
validateSuccess("/test/loose", "");
}
private static void validateSuccess(final String path, final String xff) {
final Response response = RESOURCES.getJerseyTest() final Response response = RESOURCES.getJerseyTest()
.target(path) .target(path)
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, xff)
.get(); .get();
assertEquals(200, response.getStatus()); assertEquals(200, response.getStatus());
} }
private static void validateFailure(final String path, final String xff, final Duration expectedRetryAfter) { private static void validateFailure(final String path, final Duration expectedRetryAfter) {
final Response response = RESOURCES.getJerseyTest() final Response response = RESOURCES.getJerseyTest()
.target(path) .target(path)
.request() .request()
.header(HttpHeaders.X_FORWARDED_FOR, xff)
.get(); .get();
assertEquals(413, response.getStatus()); assertEquals(413, response.getStatus());