OauthTest.php 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. <?php
  2. /**
  3. * CakePHP(tm) : Rapid Development Framework (http://cakephp.org)
  4. * Copyright (c) Cake Software Foundation, Inc. (http://cakefoundation.org)
  5. *
  6. * Licensed under The MIT License
  7. * Redistributions of files must retain the above copyright notice.
  8. *
  9. * @copyright Copyright (c) Cake Software Foundation, Inc. (http://cakefoundation.org)
  10. * @link http://cakephp.org CakePHP(tm) Project
  11. * @since 3.0.0
  12. * @license http://www.opensource.org/licenses/mit-license.php MIT License
  13. */
  14. namespace Cake\Test\TestCase\Http\Client\Auth;
  15. use Cake\Http\Client\Auth\Oauth;
  16. use Cake\Http\Client\Request;
  17. use Cake\TestSuite\TestCase;
  18. /**
  19. * Oauth test.
  20. */
  21. class OauthTest extends TestCase
  22. {
  23. private $privateKeyString = '-----BEGIN RSA PRIVATE KEY-----
  24. MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALRiMLAh9iimur8V
  25. A7qVvdqxevEuUkW4K+2KdMXmnQbG9Aa7k7eBjK1S+0LYmVjPKlJGNXHDGuy5Fw/d
  26. 7rjVJ0BLB+ubPK8iA/Tw3hLQgXMRRGRXXCn8ikfuQfjUS1uZSatdLB81mydBETlJ
  27. hI6GH4twrbDJCR2Bwy/XWXgqgGRzAgMBAAECgYBYWVtleUzavkbrPjy0T5FMou8H
  28. X9u2AC2ry8vD/l7cqedtwMPp9k7TubgNFo+NGvKsl2ynyprOZR1xjQ7WgrgVB+mm
  29. uScOM/5HVceFuGRDhYTCObE+y1kxRloNYXnx3ei1zbeYLPCHdhxRYW7T0qcynNmw
  30. rn05/KO2RLjgQNalsQJBANeA3Q4Nugqy4QBUCEC09SqylT2K9FrrItqL2QKc9v0Z
  31. zO2uwllCbg0dwpVuYPYXYvikNHHg+aCWF+VXsb9rpPsCQQDWR9TT4ORdzoj+Nccn
  32. qkMsDmzt0EfNaAOwHOmVJ2RVBspPcxt5iN4HI7HNeG6U5YsFBb+/GZbgfBT3kpNG
  33. WPTpAkBI+gFhjfJvRw38n3g/+UeAkwMI2TJQS4n8+hid0uus3/zOjDySH3XHCUno
  34. cn1xOJAyZODBo47E+67R4jV1/gzbAkEAklJaspRPXP877NssM5nAZMU0/O/NGCZ+
  35. 3jPgDUno6WbJn5cqm8MqWhW1xGkImgRk+fkDBquiq4gPiT898jusgQJAd5Zrr6Q8
  36. AO/0isr/3aa6O6NLQxISLKcPDk2NOccAfS/xOtfOz4sJYM3+Bs4Io9+dZGSDCA54
  37. Lw03eHTNQghS0A==
  38. -----END RSA PRIVATE KEY-----';
  39. private $privateKeyStringEnc = '-----BEGIN RSA PRIVATE KEY-----
  40. Proc-Type: 4,ENCRYPTED
  41. DEK-Info: DES-CBC,E65DB7AE7A05EF23
  42. QCXAQ/Uj1+7uQp0MyDUPlKvW/28PhbT4GxflBYmU6SxKZ2CVFPk0M8RgB6gkJyVv
  43. mwjo1Ch2Tlt7/VrNfLWGIh1XPhsC3gatv8Wv+g0keWWifaHlhXulgMGREJ7QeJg0
  44. 5THvdFuIs2qQnOzPCAwONjM6yMxPb2qxvwq0UKAL5V/CYVFWS6PYdR25f9ogXxBz
  45. c3QjvvnhQ7ipNjpjVp/XKYMYnZPCYkNYvRX+BcsWlqYtclO3m+xPG+mPAFs9hnBI
  46. wHI4yC2fl52giRc7XnSl7NNjun6RpHT/Cn7JDH6ql86pgMO0dw6PDzPf0KY9DCrR
  47. ldQyzQ8WjN3FU55+En+8zmSnxUu7EbdqZwhVEF+UwfJ7IqJUnHll0aDTUA/qq0dk
  48. DqtMKIXvRnDVZJqKxHyRvARf8Zp8USsq3cVdlA9PhtcKrs4CbTDL0lJ3eWj1bDS1
  49. kIHXYo19lBqcS1oX+6TqvEs69oW/aG8UZIONN0Xh5TbxuJMedXD1dexV9oOA9lGR
  50. cS6Ye0wC7fCdnA6jfAmHFJ5t2qk7FOzcFZwap7m+EWn11z+72GVqz3BDSe5qH2m2
  51. XOHl59rVtJsZFtjyQEV34IFYyb2qBHHqUUdKwIwT1JOZIq+IdTJxaieIb1mnlmDw
  52. DDf4Kwr0C9tti1R1IsPaAmjF7eH0PGbDGAB3fJSCXbHf7EXTz1AUdknd2MHXQ7wO
  53. UBABkD2ETB+EotdHTly5FQt0jwbHfF2najBmezxtEjIygCnDb02Rtuei4HTansBu
  54. shqoyFXJvizZzje7HaTQv/eJTuA6rUOzu/sAv/eBx2YAPkA8oa3qUw==
  55. -----END RSA PRIVATE KEY-----';
  56. /**
  57. * @expectedException \Cake\Core\Exception\Exception
  58. */
  59. public function testExceptionUnknownSigningMethod()
  60. {
  61. $auth = new Oauth();
  62. $creds = [
  63. 'consumerSecret' => 'it is secret',
  64. 'consumerKey' => 'a key',
  65. 'token' => 'a token value',
  66. 'tokenSecret' => 'also secret',
  67. 'method' => 'silly goose',
  68. ];
  69. $request = new Request();
  70. $auth->authentication($request, $creds);
  71. }
  72. /**
  73. * Test plain-text signing.
  74. *
  75. * @return void
  76. */
  77. public function testPlainTextSigning()
  78. {
  79. $auth = new Oauth();
  80. $creds = [
  81. 'consumerSecret' => 'it is secret',
  82. 'consumerKey' => 'a key',
  83. 'token' => 'a token value',
  84. 'tokenSecret' => 'also secret',
  85. 'method' => 'plaintext',
  86. ];
  87. $request = new Request();
  88. $request = $auth->authentication($request, $creds);
  89. $result = $request->getHeaderLine('Authorization');
  90. $this->assertContains('OAuth', $result);
  91. $this->assertContains('oauth_version="1.0"', $result);
  92. $this->assertContains('oauth_token="a%20token%20value"', $result);
  93. $this->assertContains('oauth_consumer_key="a%20key"', $result);
  94. $this->assertContains('oauth_signature_method="PLAINTEXT"', $result);
  95. $this->assertContains('oauth_signature="it%20is%20secret%26also%20secret"', $result);
  96. $this->assertContains('oauth_timestamp=', $result);
  97. $this->assertContains('oauth_nonce=', $result);
  98. }
  99. /**
  100. * Test that baseString() normalizes the URL.
  101. *
  102. * @return void
  103. */
  104. public function testBaseStringNormalizeUrl()
  105. {
  106. $request = new Request();
  107. $request->url('HTTP://exAmple.com:80/parts/foo');
  108. $auth = new Oauth();
  109. $creds = [];
  110. $result = $auth->baseString($request, $creds);
  111. $this->assertContains('GET&', $result, 'method was missing.');
  112. $this->assertContains('http%3A%2F%2Fexample.com%2Fparts%2Ffoo', $result);
  113. }
  114. /**
  115. * Test that the query string is stripped from the normalized host.
  116. *
  117. * @return void
  118. */
  119. public function testBaseStringWithQueryString()
  120. {
  121. $request = new Request();
  122. $request->url('http://example.com/search?q=pogo&cat=2');
  123. $auth = new Oauth();
  124. $values = [
  125. 'oauth_version' => '1.0',
  126. 'oauth_nonce' => uniqid(),
  127. 'oauth_timestamp' => time(),
  128. 'oauth_signature_method' => 'HMAC-SHA1',
  129. 'oauth_token' => 'token',
  130. 'oauth_consumer_key' => 'consumer-key',
  131. ];
  132. $result = $auth->baseString($request, $values);
  133. $this->assertContains('GET&', $result, 'method was missing.');
  134. $this->assertContains(
  135. 'http%3A%2F%2Fexample.com%2Fsearch&',
  136. $result
  137. );
  138. $this->assertContains(
  139. 'cat%3D2%26oauth_consumer_key%3Dconsumer-key' .
  140. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  141. '%26oauth_signature_method%3DHMAC-SHA1' .
  142. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  143. '%26oauth_token%3Dtoken' .
  144. '%26oauth_version%3D1.0' .
  145. '%26q%3Dpogo',
  146. $result
  147. );
  148. }
  149. /**
  150. * Ensure that post data is sorted and encoded.
  151. *
  152. * Keys with array values have to be serialized using
  153. * a more standard HTTP approach. PHP flavoured HTTP
  154. * is not part of the Oauth spec.
  155. *
  156. * See Normalize Request Parameters (section 9.1.1)
  157. * http://wiki.oauth.net/w/page/12238556/TestCases
  158. *
  159. * @return void
  160. */
  161. public function testBaseStringWithPostData()
  162. {
  163. $request = new Request();
  164. $request->url('http://example.com/search?q=pogo')
  165. ->method(Request::METHOD_POST)
  166. ->body([
  167. 'address' => 'post',
  168. 'tags' => ['oauth', 'cake'],
  169. 'zed' => 'last'
  170. ]);
  171. $auth = new Oauth();
  172. $values = [
  173. 'oauth_version' => '1.0',
  174. 'oauth_nonce' => uniqid(),
  175. 'oauth_timestamp' => time(),
  176. 'oauth_signature_method' => 'HMAC-SHA1',
  177. 'oauth_token' => 'token',
  178. 'oauth_consumer_key' => 'consumer-key',
  179. ];
  180. $result = $auth->baseString($request, $values);
  181. $this->assertContains('POST&', $result, 'method was missing.');
  182. $this->assertContains(
  183. 'http%3A%2F%2Fexample.com%2Fsearch&',
  184. $result
  185. );
  186. $this->assertContains(
  187. '&address%3Dpost' .
  188. '%26oauth_consumer_key%3Dconsumer-key' .
  189. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  190. '%26oauth_signature_method%3DHMAC-SHA1' .
  191. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  192. '%26oauth_token%3Dtoken' .
  193. '%26oauth_version%3D1.0' .
  194. '%26q%3Dpogo' .
  195. '%26tags%3Dcake' .
  196. '%26tags%3Doauth' .
  197. '%26zed%3Dlast',
  198. $result
  199. );
  200. }
  201. /**
  202. * Test HMAC-SHA1 signing
  203. *
  204. * Hash result + parameters taken from
  205. * http://wiki.oauth.net/w/page/12238556/TestCases
  206. *
  207. * @return void
  208. */
  209. public function testHmacSigning()
  210. {
  211. $request = new Request();
  212. $request->url('http://photos.example.net/photos')
  213. ->body([
  214. 'file' => 'vacation.jpg',
  215. 'size' => 'original'
  216. ]);
  217. $options = [
  218. 'consumerKey' => 'dpf43f3p2l4k3l03',
  219. 'consumerSecret' => 'kd94hf93k423kf44',
  220. 'tokenSecret' => 'pfkkdhi9sl3r4s00',
  221. 'token' => 'nnch734d00sl2jdk',
  222. 'nonce' => 'kllo9940pd9333jh',
  223. 'timestamp' => '1191242096'
  224. ];
  225. $auth = new Oauth();
  226. $request = $auth->authentication($request, $options);
  227. $result = $request->getHeaderLine('Authorization');
  228. $expected = 'tR3+Ty81lMeYAr/Fid0kMTYa/WM=';
  229. $this->assertContains(
  230. 'oauth_signature="' . $expected . '"',
  231. urldecode($result)
  232. );
  233. }
  234. /**
  235. * Test RSA-SHA1 signing with a private key string
  236. *
  237. * Hash result + parameters taken from
  238. * http://wiki.oauth.net/w/page/12238556/TestCases
  239. *
  240. * @return void
  241. */
  242. public function testRsaSigningString()
  243. {
  244. $request = new Request();
  245. $request->url('http://photos.example.net/photos')
  246. ->body([
  247. 'file' => 'vacaction.jpg',
  248. 'size' => 'original'
  249. ]);
  250. $privateKey = $this->privateKeyString;
  251. $options = [
  252. 'method' => 'RSA-SHA1',
  253. 'consumerKey' => 'dpf43f3p2l4k3l03',
  254. 'nonce' => '13917289812797014437',
  255. 'timestamp' => '1196666512',
  256. 'privateKey' => $privateKey
  257. ];
  258. $auth = new Oauth();
  259. $request = $auth->authentication($request, $options);
  260. $result = $request->header('Authorization');
  261. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  262. $this->assertContains(
  263. 'oauth_signature="' . $expected . '"',
  264. urldecode($result)
  265. );
  266. }
  267. /**
  268. * Test RSA-SHA1 signing with a private key file
  269. *
  270. * Hash result + parameters taken from
  271. * http://wiki.oauth.net/w/page/12238556/TestCases
  272. *
  273. * @return void
  274. */
  275. public function testRsaSigningFile()
  276. {
  277. $request = new Request();
  278. $request->url('http://photos.example.net/photos')
  279. ->body([
  280. 'file' => 'vacaction.jpg',
  281. 'size' => 'original'
  282. ]);
  283. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key.pem', 'r');
  284. $options = [
  285. 'method' => 'RSA-SHA1',
  286. 'consumerKey' => 'dpf43f3p2l4k3l03',
  287. 'nonce' => '13917289812797014437',
  288. 'timestamp' => '1196666512',
  289. 'privateKey' => $privateKey
  290. ];
  291. $auth = new Oauth();
  292. $request = $auth->authentication($request, $options);
  293. $result = $request->header('Authorization');
  294. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  295. $this->assertContains(
  296. 'oauth_signature="' . $expected . '"',
  297. urldecode($result)
  298. );
  299. }
  300. /**
  301. * Test RSA-SHA1 signing with a private key file passphrase string
  302. *
  303. * Hash result + parameters taken from
  304. * http://wiki.oauth.net/w/page/12238556/TestCases
  305. *
  306. * @return void
  307. */
  308. public function testRsaSigningWithPassphraseString()
  309. {
  310. $request = new Request();
  311. $request->url('http://photos.example.net/photos')
  312. ->body([
  313. 'file' => 'vacaction.jpg',
  314. 'size' => 'original'
  315. ]);
  316. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key_with_passphrase.pem', 'r');
  317. $passphrase = 'fancy-cakephp-passphrase';
  318. $options = [
  319. 'method' => 'RSA-SHA1',
  320. 'consumerKey' => 'dpf43f3p2l4k3l03',
  321. 'nonce' => '13917289812797014437',
  322. 'timestamp' => '1196666512',
  323. 'privateKey' => $privateKey,
  324. 'privateKeyPassphrase' => $passphrase,
  325. ];
  326. $auth = new Oauth();
  327. $request = $auth->authentication($request, $options);
  328. $result = $request->header('Authorization');
  329. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  330. $this->assertContains(
  331. 'oauth_signature="' . $expected . '"',
  332. urldecode($result)
  333. );
  334. }
  335. /**
  336. * Test RSA-SHA1 signing with a private key string and passphrase string
  337. *
  338. * Hash result + parameters taken from
  339. * http://wiki.oauth.net/w/page/12238556/TestCases
  340. *
  341. * @return void
  342. */
  343. public function testRsaSigningStringWithPassphraseString()
  344. {
  345. $request = new Request();
  346. $request->url('http://photos.example.net/photos')
  347. ->body([
  348. 'file' => 'vacaction.jpg',
  349. 'size' => 'original'
  350. ]);
  351. $privateKey = $this->privateKeyStringEnc;
  352. $passphrase = 'fancy-cakephp-passphrase';
  353. $options = [
  354. 'method' => 'RSA-SHA1',
  355. 'consumerKey' => 'dpf43f3p2l4k3l03',
  356. 'nonce' => '13917289812797014437',
  357. 'timestamp' => '1196666512',
  358. 'privateKey' => $privateKey,
  359. 'privateKeyPassphrase' => $passphrase,
  360. ];
  361. $auth = new Oauth();
  362. $request = $auth->authentication($request, $options);
  363. $result = $request->header('Authorization');
  364. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  365. $this->assertContains(
  366. 'oauth_signature="' . $expected . '"',
  367. urldecode($result)
  368. );
  369. }
  370. /**
  371. * Test RSA-SHA1 signing with passphrase file
  372. *
  373. * Hash result + parameters taken from
  374. * http://wiki.oauth.net/w/page/12238556/TestCases
  375. *
  376. * @return void
  377. */
  378. public function testRsaSigningWithPassphraseFile()
  379. {
  380. $this->skipIf(PHP_EOL != "\n", 'Just the line ending "\n" is supported. You can run the test again e.g. on a linux system.');
  381. $request = new Request();
  382. $request->url('http://photos.example.net/photos')
  383. ->body([
  384. 'file' => 'vacaction.jpg',
  385. 'size' => 'original'
  386. ]);
  387. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key_with_passphrase.pem', 'r');
  388. $passphrase = fopen(TEST_APP . DS . 'config' . DS . 'key_passphrase_lf', 'r');
  389. $options = [
  390. 'method' => 'RSA-SHA1',
  391. 'consumerKey' => 'dpf43f3p2l4k3l03',
  392. 'nonce' => '13917289812797014437',
  393. 'timestamp' => '1196666512',
  394. 'privateKey' => $privateKey,
  395. 'privateKeyPassphrase' => $passphrase,
  396. ];
  397. $auth = new Oauth();
  398. $request = $auth->authentication($request, $options);
  399. $result = $request->header('Authorization');
  400. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  401. $this->assertContains(
  402. 'oauth_signature="' . $expected . '"',
  403. urldecode($result)
  404. );
  405. $expected = 0;
  406. $this->assertEquals($expected, ftell($passphrase));
  407. }
  408. /**
  409. * Test RSA-SHA1 signing with a private key string and passphrase file
  410. *
  411. * Hash result + parameters taken from
  412. * http://wiki.oauth.net/w/page/12238556/TestCases
  413. *
  414. * @return void
  415. */
  416. public function testRsaSigningStringWithPassphraseFile()
  417. {
  418. $this->skipIf(PHP_EOL != "\n", 'Just the line ending "\n" is supported. You can run the test again e.g. on a linux system.');
  419. $request = new Request();
  420. $request->url('http://photos.example.net/photos')
  421. ->body([
  422. 'file' => 'vacaction.jpg',
  423. 'size' => 'original'
  424. ]);
  425. $privateKey = $this->privateKeyStringEnc;
  426. $passphrase = fopen(TEST_APP . DS . 'config' . DS . 'key_passphrase_lf', 'r');
  427. $options = [
  428. 'method' => 'RSA-SHA1',
  429. 'consumerKey' => 'dpf43f3p2l4k3l03',
  430. 'nonce' => '13917289812797014437',
  431. 'timestamp' => '1196666512',
  432. 'privateKey' => $privateKey,
  433. 'privateKeyPassphrase' => $passphrase,
  434. ];
  435. $auth = new Oauth();
  436. $request = $auth->authentication($request, $options);
  437. $result = $request->header('Authorization');
  438. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  439. $this->assertContains(
  440. 'oauth_signature="' . $expected . '"',
  441. urldecode($result)
  442. );
  443. $expected = 0;
  444. $this->assertEquals($expected, ftell($passphrase));
  445. }
  446. }