3
3
using System . Security . Claims ;
4
4
using GraphQL . AspNetCore3 . Errors ;
5
5
using GraphQL . Execution ;
6
+ using Microsoft . AspNetCore . Authentication . Cookies ;
6
7
using Microsoft . AspNetCore . Authentication . JwtBearer ;
7
8
using Microsoft . Extensions . Hosting ;
8
9
@@ -12,9 +13,14 @@ public class AuthorizationTests
12
13
{
13
14
private GraphQLHttpMiddlewareOptions _options = null ! ;
14
15
private bool _enableCustomErrorInfoProvider ;
15
- private readonly TestServer _server ;
16
+ private TestServer _server ;
16
17
17
18
public AuthorizationTests ( )
19
+ {
20
+ _server = CreateServer ( ) ;
21
+ }
22
+
23
+ private TestServer CreateServer ( Action < IServiceCollection > ? configureServices = null )
18
24
{
19
25
var hostBuilder = new WebHostBuilder ( ) ;
20
26
hostBuilder . ConfigureServices ( services => {
@@ -42,6 +48,7 @@ public AuthorizationTests()
42
48
#if NETCOREAPP2_1 || NET48
43
49
services . AddHostApplicationLifetime ( ) ;
44
50
#endif
51
+ configureServices ? . Invoke ( services ) ;
45
52
} ) ;
46
53
hostBuilder . Configure ( app => {
47
54
app . UseWebSockets ( ) ;
@@ -53,7 +60,7 @@ public AuthorizationTests()
53
60
_options = opts ;
54
61
} ) ;
55
62
} ) ;
56
- _server = new TestServer ( hostBuilder ) ;
63
+ return new TestServer ( hostBuilder ) ;
57
64
}
58
65
59
66
private string CreateJwtToken ( )
@@ -254,6 +261,86 @@ public async Task Authorized_Policy()
254
261
actual . ShouldBe ( @"{""data"":{""__typename"":""Query""}}" ) ;
255
262
}
256
263
264
+ [ Fact ]
265
+ public async Task NotAuthorized_WrongScheme ( )
266
+ {
267
+ _server = CreateServer ( services => {
268
+ services . AddAuthentication ( CookieAuthenticationDefaults . AuthenticationScheme ) ; // change default scheme to Cookie authentication
269
+ } ) ;
270
+ _options . AuthorizationRequired = true ;
271
+ using var response = await PostQueryAsync ( "{ __typename }" , true ) ; // send an authenticated request (with JWT bearer scheme)
272
+ response . StatusCode . ShouldBe ( HttpStatusCode . Unauthorized ) ;
273
+ var actual = await response . Content . ReadAsStringAsync ( ) ;
274
+ actual . ShouldBe ( @"{""errors"":[{""message"":""Access denied for schema."",""extensions"":{""code"":""ACCESS_DENIED"",""codes"":[""ACCESS_DENIED""]}}]}" ) ;
275
+ }
276
+
277
+ [ Fact ]
278
+ public async Task NotAuthorized_WrongScheme_2 ( )
279
+ {
280
+ _server . Dispose ( ) ;
281
+ _server = CreateServer ( services => {
282
+ services . AddAuthentication ( ) . AddCookie ( ) ; // add Cookie authentication
283
+ } ) ;
284
+ _options . AuthorizationRequired = true ;
285
+ _options . AuthenticationSchemes . Add ( CookieAuthenticationDefaults . AuthenticationScheme ) ; // change authentication scheme for GraphQL requests to Cookie (which is not used by the test client)
286
+ using var response = await PostQueryAsync ( "{ __typename }" , true ) ; // send an authenticated request (with JWT bearer scheme)
287
+ response . StatusCode . ShouldBe ( HttpStatusCode . Unauthorized ) ;
288
+ var actual = await response . Content . ReadAsStringAsync ( ) ;
289
+ actual . ShouldBe ( @"{""errors"":[{""message"":""Access denied for schema."",""extensions"":{""code"":""ACCESS_DENIED"",""codes"":[""ACCESS_DENIED""]}}]}" ) ;
290
+ }
291
+
292
+ [ Fact ]
293
+ public async Task NotAuthorized_WrongScheme_VerifyUser ( )
294
+ {
295
+ bool validatedUser = false ;
296
+ _server = CreateServer ( services => {
297
+ services . AddAuthentication ( CookieAuthenticationDefaults . AuthenticationScheme ) ; // change default scheme to Cookie authentication
298
+ services . AddGraphQL ( b => b
299
+ . ConfigureExecutionOptions ( opts => {
300
+ opts . User . ShouldNotBeNull ( ) . Identity . ShouldNotBeNull ( ) . IsAuthenticated . ShouldBeFalse ( ) ;
301
+ validatedUser = true ;
302
+ } ) ) ;
303
+ } ) ;
304
+ _options . AuthorizationRequired = false ; // disable authorization requirements; we just want to verify that an anonymous user is passed to the execution options
305
+ using var response = await PostQueryAsync ( "{ __typename }" , true ) ; // send an authenticated request (with JWT bearer scheme)
306
+ response . StatusCode . ShouldBe ( HttpStatusCode . OK ) ;
307
+ var actual = await response . Content . ReadAsStringAsync ( ) ;
308
+ actual . ShouldBe ( @"{""data"":{""__typename"":""Query""}}" ) ;
309
+ validatedUser . ShouldBeTrue ( ) ;
310
+ }
311
+
312
+ [ Fact ]
313
+ public async Task Authorized_DifferentScheme ( )
314
+ {
315
+ bool validatedUser = false ;
316
+ _server = CreateServer ( services => {
317
+ services . AddAuthentication ( CookieAuthenticationDefaults . AuthenticationScheme ) ; // change default scheme to Cookie authentication
318
+ services . AddGraphQL ( b => b . ConfigureExecutionOptions ( opts => {
319
+ opts . User . ShouldNotBeNull ( ) . Identity . ShouldNotBeNull ( ) . IsAuthenticated . ShouldBeTrue ( ) ;
320
+ validatedUser = true ;
321
+ } ) ) ;
322
+ } ) ;
323
+ _options . AuthorizationRequired = true ;
324
+ _options . AuthenticationSchemes . Add ( JwtBearerDefaults . AuthenticationScheme ) ;
325
+ using var response = await PostQueryAsync ( "{ __typename }" , true ) ;
326
+ response . StatusCode . ShouldBe ( HttpStatusCode . OK ) ;
327
+ var actual = await response . Content . ReadAsStringAsync ( ) ;
328
+ actual . ShouldBe ( @"{""data"":{""__typename"":""Query""}}" ) ;
329
+ validatedUser . ShouldBeTrue ( ) ;
330
+ }
331
+
332
+ [ Fact ]
333
+ public void SecurityHelperTests ( )
334
+ {
335
+ SecurityHelper . MergeUserPrincipal ( null , null ) . ShouldNotBeNull ( ) . Identity . ShouldBeNull ( ) ; // Note that ASP.NET Core does not return null for anonymous user
336
+ var principal1 = new ClaimsPrincipal ( new ClaimsIdentity ( ) ) ; // empty identity for primary identity (default for ASP.NET Core)
337
+ SecurityHelper . MergeUserPrincipal ( null , principal1 ) . ShouldBe ( principal1 ) ;
338
+ var principal2 = new ClaimsPrincipal ( new ClaimsIdentity ( "test1" ) ) ; // non-empty identity for secondary identity
339
+ SecurityHelper . MergeUserPrincipal ( principal1 , principal2 ) . Identities . ShouldHaveSingleItem ( ) . AuthenticationType . ShouldBe ( "test1" ) ;
340
+ var principal3 = new ClaimsPrincipal ( new ClaimsIdentity ( "test2" ) ) ; // merge two non-empty identities together
341
+ SecurityHelper . MergeUserPrincipal ( principal2 , principal3 ) . Identities . Select ( x => x . AuthenticationType ) . ShouldBe ( new [ ] { "test2" , "test1" } ) ; // last one wins
342
+ }
343
+
257
344
private class CustomErrorInfoProvider : ErrorInfoProvider
258
345
{
259
346
private readonly AuthorizationTests _authorizationTests ;
0 commit comments