]> BookStack Code Mirror - bookstack/blob - tests/Auth/Saml2Test.php
Laravel 8 shift squash & merge (#3029)
[bookstack] / tests / Auth / Saml2Test.php
1 <?php
2
3 namespace Tests\Auth;
4
5 use BookStack\Auth\Role;
6 use BookStack\Auth\User;
7 use Tests\TestCase;
8
9 class Saml2Test extends TestCase
10 {
11     protected function setUp(): void
12     {
13         parent::setUp();
14         // Set default config for SAML2
15         config()->set([
16             'auth.method'                                   => 'saml2',
17             'auth.defaults.guard'                           => 'saml2',
18             'saml2.name'                                    => 'SingleSignOn-Testing',
19             'saml2.email_attribute'                         => 'email',
20             'saml2.display_name_attributes'                 => ['first_name', 'last_name'],
21             'saml2.external_id_attribute'                   => 'uid',
22             'saml2.user_to_groups'                          => false,
23             'saml2.group_attribute'                         => 'user_groups',
24             'saml2.remove_from_groups'                      => false,
25             'saml2.onelogin_overrides'                      => null,
26             'saml2.onelogin.idp.entityId'                   => 'http://saml.local/saml2/idp/metadata.php',
27             'saml2.onelogin.idp.singleSignOnService.url'    => 'http://saml.local/saml2/idp/SSOService.php',
28             'saml2.onelogin.idp.singleLogoutService.url'    => 'http://saml.local/saml2/idp/SingleLogoutService.php',
29             'saml2.autoload_from_metadata'                  => false,
30             'saml2.onelogin.idp.x509cert'                   => $this->testCert,
31             'saml2.onelogin.debug'                          => false,
32             'saml2.onelogin.security.requestedAuthnContext' => true,
33         ]);
34     }
35
36     public function test_metadata_endpoint_displays_xml_as_expected()
37     {
38         $req = $this->get('/saml2/metadata');
39         $req->assertHeader('Content-Type', 'text/xml; charset=UTF-8');
40         $req->assertSee('md:EntityDescriptor');
41         $req->assertSee(url('/saml2/acs'));
42     }
43
44     public function test_onelogin_overrides_functions_as_expected()
45     {
46         $json = '{"sp": {"assertionConsumerService": {"url": "https://example.com/super-cats"}}, "contactPerson": {"technical": {"givenName": "Barry Scott", "emailAddress": "[email protected]"}}}';
47         config()->set(['saml2.onelogin_overrides' => $json]);
48
49         $req = $this->get('/saml2/metadata');
50         $req->assertSee('https://example.com/super-cats');
51         $req->assertSee('md:ContactPerson');
52         $req->assertSee('<md:GivenName>Barry Scott</md:GivenName>', false);
53     }
54
55     public function test_login_option_shows_on_login_page()
56     {
57         $req = $this->get('/login');
58         $req->assertSeeText('SingleSignOn-Testing');
59         $req->assertElementExists('form[action$="/saml2/login"][method=POST] button');
60     }
61
62     public function test_login()
63     {
64         $req = $this->post('/saml2/login');
65         $redirect = $req->headers->get('location');
66         $this->assertStringStartsWith('http://saml.local/saml2/idp/SSOService.php', $redirect, 'Login redirects to SSO location');
67
68         config()->set(['saml2.onelogin.strict' => false]);
69         $this->assertFalse($this->isAuthenticated());
70
71         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
72         $redirect = $acsPost->headers->get('Location');
73         $acsId = explode('?id=', $redirect)[1];
74         $this->assertTrue(strlen($acsId) > 12);
75
76         $this->assertStringContainsString('/saml2/acs?id=', $redirect);
77         $this->assertTrue(cache()->has('saml2_acs:' . $acsId));
78
79         $acsGet = $this->get($redirect);
80         $acsGet->assertRedirect('/');
81         $this->assertFalse(cache()->has('saml2_acs:' . $acsId));
82
83         $this->assertTrue($this->isAuthenticated());
84         $this->assertDatabaseHas('users', [
85             'email'            => '[email protected]',
86             'external_auth_id' => 'user',
87             'email_confirmed'  => false,
88             'name'             => 'Barry Scott',
89         ]);
90     }
91
92     public function test_acs_process_id_randomly_generated()
93     {
94         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
95         $redirectA = $acsPost->headers->get('Location');
96
97         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
98         $redirectB = $acsPost->headers->get('Location');
99
100         $this->assertFalse($redirectA === $redirectB);
101     }
102
103     public function test_process_acs_endpoint_cant_be_called_with_invalid_id()
104     {
105         $resp = $this->get('/saml2/acs');
106         $resp->assertRedirect('/login');
107         $this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
108
109         $resp = $this->get('/saml2/acs?id=abc123');
110         $resp->assertRedirect('/login');
111         $this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
112     }
113
114     public function test_group_role_sync_on_login()
115     {
116         config()->set([
117             'saml2.onelogin.strict'    => false,
118             'saml2.user_to_groups'     => true,
119             'saml2.remove_from_groups' => false,
120         ]);
121
122         $memberRole = Role::factory()->create(['external_auth_id' => 'member']);
123         $adminRole = Role::getSystemRole('admin');
124
125         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
126         $user = User::query()->where('external_auth_id', '=', 'user')->first();
127
128         $userRoleIds = $user->roles()->pluck('id');
129         $this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
130         $this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
131     }
132
133     public function test_group_role_sync_removal_option_works_as_expected()
134     {
135         config()->set([
136             'saml2.onelogin.strict'    => false,
137             'saml2.user_to_groups'     => true,
138             'saml2.remove_from_groups' => true,
139         ]);
140
141         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
142         $user = User::query()->where('external_auth_id', '=', 'user')->first();
143
144         $randomRole = Role::factory()->create(['external_auth_id' => 'random']);
145         $user->attachRole($randomRole);
146         $this->assertContains($randomRole->id, $user->roles()->pluck('id'));
147
148         auth()->logout();
149         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
150         $this->assertNotContains($randomRole->id, $user->roles()->pluck('id'));
151     }
152
153     public function test_logout_link_directs_to_saml_path()
154     {
155         config()->set([
156             'saml2.onelogin.strict' => false,
157         ]);
158
159         $resp = $this->actingAs($this->getEditor())->get('/');
160         $resp->assertElementExists('a[href$="/saml2/logout"]');
161         $resp->assertElementContains('a[href$="/saml2/logout"]', 'Logout');
162     }
163
164     public function test_logout_sls_flow()
165     {
166         config()->set([
167             'saml2.onelogin.strict' => false,
168         ]);
169
170         $handleLogoutResponse = function () {
171             $this->assertTrue($this->isAuthenticated());
172
173             $req = $this->get('/saml2/sls');
174             $req->assertRedirect('/');
175             $this->assertFalse($this->isAuthenticated());
176         };
177
178         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
179
180         $req = $this->get('/saml2/logout');
181         $redirect = $req->headers->get('location');
182         $this->assertStringStartsWith('http://saml.local/saml2/idp/SingleLogoutService.php', $redirect);
183         $this->withGet(['SAMLResponse' => $this->sloResponseData], $handleLogoutResponse);
184     }
185
186     public function test_logout_sls_flow_when_sls_not_configured()
187     {
188         config()->set([
189             'saml2.onelogin.strict'                      => false,
190             'saml2.onelogin.idp.singleLogoutService.url' => null,
191         ]);
192
193         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
194         $this->assertTrue($this->isAuthenticated());
195
196         $req = $this->get('/saml2/logout');
197         $req->assertRedirect('/');
198         $this->assertFalse($this->isAuthenticated());
199     }
200
201     public function test_dump_user_details_option_works()
202     {
203         config()->set([
204             'saml2.onelogin.strict'   => false,
205             'saml2.dump_user_details' => true,
206         ]);
207
208         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
209         $acsPost->assertJsonStructure([
210             'id_from_idp',
211             'attrs_from_idp'      => [],
212             'attrs_after_parsing' => [],
213         ]);
214     }
215
216     public function test_saml_routes_are_only_active_if_saml_enabled()
217     {
218         config()->set(['auth.method' => 'standard']);
219         $getRoutes = ['/logout', '/metadata', '/sls'];
220         foreach ($getRoutes as $route) {
221             $req = $this->get('/saml2' . $route);
222             $this->assertPermissionError($req);
223         }
224
225         $postRoutes = ['/login', '/acs'];
226         foreach ($postRoutes as $route) {
227             $req = $this->post('/saml2' . $route);
228             $this->assertPermissionError($req);
229         }
230     }
231
232     public function test_forgot_password_routes_inaccessible()
233     {
234         $resp = $this->get('/password/email');
235         $this->assertPermissionError($resp);
236
237         $resp = $this->post('/password/email');
238         $this->assertPermissionError($resp);
239
240         $resp = $this->get('/password/reset/abc123');
241         $this->assertPermissionError($resp);
242
243         $resp = $this->post('/password/reset');
244         $this->assertPermissionError($resp);
245     }
246
247     public function test_standard_login_routes_inaccessible()
248     {
249         $resp = $this->post('/login');
250         $this->assertPermissionError($resp);
251
252         $resp = $this->get('/logout');
253         $this->assertPermissionError($resp);
254     }
255
256     public function test_user_invite_routes_inaccessible()
257     {
258         $resp = $this->get('/register/invite/abc123');
259         $this->assertPermissionError($resp);
260
261         $resp = $this->post('/register/invite/abc123');
262         $this->assertPermissionError($resp);
263     }
264
265     public function test_user_register_routes_inaccessible()
266     {
267         $resp = $this->get('/register');
268         $this->assertPermissionError($resp);
269
270         $resp = $this->post('/register');
271         $this->assertPermissionError($resp);
272     }
273
274     public function test_email_domain_restriction_active_on_new_saml_login()
275     {
276         $this->setSettings([
277             'registration-restrict' => 'testing.com',
278         ]);
279         config()->set([
280             'saml2.onelogin.strict' => false,
281         ]);
282
283         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
284         $acsPost->assertSeeText('That email domain does not have access to this application');
285         $this->assertFalse(auth()->check());
286         $this->assertDatabaseMissing('users', ['email' => '[email protected]']);
287     }
288
289     public function test_group_sync_functions_when_email_confirmation_required()
290     {
291         setting()->put('registration-confirmation', 'true');
292         config()->set([
293             'saml2.onelogin.strict'    => false,
294             'saml2.user_to_groups'     => true,
295             'saml2.remove_from_groups' => false,
296         ]);
297
298         $memberRole = Role::factory()->create(['external_auth_id' => 'member']);
299         $adminRole = Role::getSystemRole('admin');
300
301         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
302
303         $this->assertEquals('http://localhost/register/confirm', url()->current());
304         $acsPost->assertSee('Please check your email and click the confirmation button to access BookStack.');
305         /** @var User $user */
306         $user = User::query()->where('external_auth_id', '=', 'user')->first();
307
308         $userRoleIds = $user->roles()->pluck('id');
309         $this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
310         $this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
311         $this->assertFalse(boolval($user->email_confirmed), 'User email remains unconfirmed');
312
313         $this->assertNull(auth()->user());
314         $homeGet = $this->get('/');
315         $homeGet->assertRedirect('/login');
316     }
317
318     public function test_login_where_existing_non_saml_user_shows_warning()
319     {
320         $this->post('/saml2/login');
321         config()->set(['saml2.onelogin.strict' => false]);
322
323         // Make the user pre-existing in DB with different auth_id
324         User::query()->forceCreate([
325             'email'            => '[email protected]',
326             'external_auth_id' => 'old_system_user_id',
327             'email_confirmed'  => false,
328             'name'             => 'Barry Scott',
329         ]);
330
331         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
332         $this->assertFalse($this->isAuthenticated());
333         $this->assertDatabaseHas('users', [
334             'email'            => '[email protected]',
335             'external_auth_id' => 'old_system_user_id',
336         ]);
337
338         $acsPost->assertSee('A user with the email [email protected] already exists but with different credentials');
339     }
340
341     public function test_login_request_contains_expected_default_authncontext()
342     {
343         $authReq = $this->getAuthnRequest();
344         $this->assertStringContainsString('samlp:RequestedAuthnContext Comparison="exact"', $authReq);
345         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>', $authReq);
346     }
347
348     public function test_false_idp_authncontext_option_does_not_pass_authncontext_in_saml_request()
349     {
350         config()->set(['saml2.onelogin.security.requestedAuthnContext' => false]);
351         $authReq = $this->getAuthnRequest();
352         $this->assertStringNotContainsString('samlp:RequestedAuthnContext', $authReq);
353         $this->assertStringNotContainsString('<saml:AuthnContextClassRef>', $authReq);
354     }
355
356     public function test_array_idp_authncontext_option_passes_value_as_authncontextclassref_in_request()
357     {
358         config()->set(['saml2.onelogin.security.requestedAuthnContext' => ['urn:federation:authentication:windows', 'urn:federation:authentication:linux']]);
359         $authReq = $this->getAuthnRequest();
360         $this->assertStringContainsString('samlp:RequestedAuthnContext', $authReq);
361         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:windows</saml:AuthnContextClassRef>', $authReq);
362         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:linux</saml:AuthnContextClassRef>', $authReq);
363     }
364
365     protected function getAuthnRequest(): string
366     {
367         $req = $this->post('/saml2/login');
368         $location = $req->headers->get('Location');
369         $query = explode('?', $location)[1];
370         $params = [];
371         parse_str($query, $params);
372
373         return gzinflate(base64_decode($params['SAMLRequest']));
374     }
375
376     protected function withGet(array $options, callable $callback)
377     {
378         return $this->withGlobal($_GET, $options, $callback);
379     }
380
381     protected function withGlobal(array &$global, array $options, callable $callback)
382     {
383         $original = [];
384         foreach ($options as $key => $val) {
385             $original[$key] = $global[$key] ?? null;
386             $global[$key] = $val;
387         }
388
389         $callback();
390
391         foreach ($options as $key => $val) {
392             $val = $original[$key];
393             if ($val) {
394                 $global[$key] = $val;
395             } else {
396                 unset($global[$key]);
397             }
398         }
399     }
400
401     /**
402      * The post data for a callback for single-sign-in.
403      * Provides the following attributes:
404      * array:5 [
405      * "uid" => array:1 [
406      * 0 => "user"
407      * ]
408      * "first_name" => array:1 [
409      * 0 => "Barry"
410      * ]
411      * "last_name" => array:1 [
412      * 0 => "Scott"
413      * ]
414      * "email" => array:1 [
415      * 0 => "[email protected]"
416      * ]
417      * "user_groups" => array:2 [
418      * 0 => "member"
419      * 1 => "admin"
420      * ]
421      * ].
422      */
423     protected $acsPostData = '<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_4dd4564dc794061ef1baa0467d79028ced3ce54bee" Version="2.0" IssueInstant="2019-11-17T17:53:39Z" Destination="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_4dd4564dc794061ef1baa0467d79028ced3ce54bee"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>vmh/S75Nf+g+ecDJCzAbZWKJVlug7BfsC+9aWNeIreQ=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_6842df9c659f13fe5196cd9ef6c2f028364ae943b1" Version="2.0" IssueInstant="2019-11-17T17:53:39Z"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_6842df9c659f13fe5196cd9ef6c2f028364ae943b1"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>krb5w6S8toXc/eSwZPUOBvQzn3os4JACuxxrJkxpgFw=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Subject><saml:NameID SPNameQualifier="http://bookstack.local/saml2/metadata" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_2c7ab86eb8f1d1063443f219cc5868ff66708912e3</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2019-11-17T17:58:39Z" Recipient="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2019-11-17T17:53:09Z" NotOnOrAfter="2019-11-17T17:58:39Z"><saml:AudienceRestriction><saml:Audience>http://bookstack.local/saml2/metadata</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2019-11-17T17:53:39Z" SessionNotOnOrAfter="2019-11-18T01:53:39Z" SessionIndex="_4fe7c0d1572d64b27f930aa6f236a6f42e930901cc"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue></saml:Attribute><saml:Attribute Name="first_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Barry</saml:AttributeValue></saml:Attribute><saml:Attribute Name="last_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Scott</saml:AttributeValue></saml:Attribute><saml:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="user_groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">member</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>';
424
425     protected $sloResponseData = 'fZHRa8IwEMb/lZJ3bdJa04a2MOYYglOY4sNe5JKms9gmpZfC/vxF3ZjC8OXgLvl938ddjtC1vVjZTzu6d429NaiDr641KC5PBRkHIyxgg8JAp1E4JbZPbysRTanoB+ussi25QR4TgKgH11hDguWiIIeawTxOaK1iPYt5XcczHUlJeVRlMklBJjOuM1qDVCTY6wE9WRAv5HHEUS8NOjDOjyjLJoxNGN+xVESpSNgHCRYaXWPAXaijc70IQ2ntyUPqNG2tgjY8Z45CbNFLmt8V7GxBNuuX1eZ1uT7EcZJKAE4TJhXPaMxlVlFffPKKJnXE5ryusoiU+VlMXJIN5Y/feXRn1VR92GkHFTiY9sc+D2+p/HqRrQM34n33bCsd7KEd9eMd4+W32I5KaUQSlleHP9Hwv6uX3w==';
426
427     protected $testCert = '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';
428 }