Hacked By AnonymousFox
require 'rack/session/cookie'
require 'rack/lint'
require 'rack/mock'
describe Rack::Session::Cookie do
incrementor = lambda do |env|
env["rack.session"]["counter"] ||= 0
env["rack.session"]["counter"] += 1
hash = env["rack.session"].dup
hash.delete("session_id")
Rack::Response.new(hash.inspect).to_a
end
session_id = lambda do |env|
Rack::Response.new(env["rack.session"].to_hash.inspect).to_a
end
session_option = lambda do |opt|
lambda do |env|
Rack::Response.new(env["rack.session.options"][opt].inspect).to_a
end
end
nothing = lambda do |env|
Rack::Response.new("Nothing").to_a
end
renewer = lambda do |env|
env["rack.session.options"][:renew] = true
Rack::Response.new("Nothing").to_a
end
only_session_id = lambda do |env|
Rack::Response.new(env["rack.session"]["session_id"].to_s).to_a
end
bigcookie = lambda do |env|
env["rack.session"]["cookie"] = "big" * 3000
Rack::Response.new(env["rack.session"].inspect).to_a
end
destroy_session = lambda do |env|
env["rack.session"].destroy
Rack::Response.new("Nothing").to_a
end
def response_for(options={})
request_options = options.fetch(:request, {})
cookie = if options[:cookie].is_a?(Rack::Response)
options[:cookie]["Set-Cookie"]
else
options[:cookie]
end
request_options["HTTP_COOKIE"] = cookie || ""
app_with_cookie = Rack::Session::Cookie.new(*options[:app])
app_with_cookie = Rack::Lint.new(app_with_cookie)
Rack::MockRequest.new(app_with_cookie).get("/", request_options)
end
before do
@warnings = warnings = []
Rack::Session::Cookie.class_eval do
define_method(:warn) { |m| warnings << m }
end
end
after do
Rack::Session::Cookie.class_eval { remove_method :warn }
end
describe 'Base64' do
it 'uses base64 to encode' do
coder = Rack::Session::Cookie::Base64.new
str = 'fuuuuu'
coder.encode(str).should.equal [str].pack('m')
end
it 'uses base64 to decode' do
coder = Rack::Session::Cookie::Base64.new
str = ['fuuuuu'].pack('m')
coder.decode(str).should.equal str.unpack('m').first
end
describe 'Marshal' do
it 'marshals and base64 encodes' do
coder = Rack::Session::Cookie::Base64::Marshal.new
str = 'fuuuuu'
coder.encode(str).should.equal [::Marshal.dump(str)].pack('m')
end
it 'marshals and base64 decodes' do
coder = Rack::Session::Cookie::Base64::Marshal.new
str = [::Marshal.dump('fuuuuu')].pack('m')
coder.decode(str).should.equal ::Marshal.load(str.unpack('m').first)
end
it 'rescues failures on decode' do
coder = Rack::Session::Cookie::Base64::Marshal.new
coder.decode('lulz').should.equal nil
end
end
describe 'JSON' do
it 'marshals and base64 encodes' do
coder = Rack::Session::Cookie::Base64::JSON.new
obj = %w[fuuuuu]
coder.encode(obj).should.equal [::Rack::Utils::OkJson.encode(obj)].pack('m')
end
it 'marshals and base64 decodes' do
coder = Rack::Session::Cookie::Base64::JSON.new
str = [::Rack::Utils::OkJson.encode(%w[fuuuuu])].pack('m')
coder.decode(str).should.equal ::Rack::Utils::OkJson.decode(str.unpack('m').first)
end
it 'rescues failures on decode' do
coder = Rack::Session::Cookie::Base64::JSON.new
coder.decode('lulz').should.equal nil
end
end
describe 'ZipJSON' do
it 'jsons, deflates, and base64 encodes' do
coder = Rack::Session::Cookie::Base64::ZipJSON.new
obj = %w[fuuuuu]
json = Rack::Utils::OkJson.encode(obj)
coder.encode(obj).should.equal [Zlib::Deflate.deflate(json)].pack('m')
end
it 'base64 decodes, inflates, and decodes json' do
coder = Rack::Session::Cookie::Base64::ZipJSON.new
obj = %w[fuuuuu]
json = Rack::Utils::OkJson.encode(obj)
b64 = [Zlib::Deflate.deflate(json)].pack('m')
coder.decode(b64).should.equal obj
end
it 'rescues failures on decode' do
coder = Rack::Session::Cookie::Base64::ZipJSON.new
coder.decode('lulz').should.equal nil
end
end
end
it "warns if no secret is given" do
Rack::Session::Cookie.new(incrementor)
@warnings.first.should =~ /no secret/i
@warnings.clear
Rack::Session::Cookie.new(incrementor, :secret => 'abc')
@warnings.should.be.empty?
end
it 'uses a coder' do
identity = Class.new {
attr_reader :calls
def initialize
@calls = []
end
def encode(str); @calls << :encode; str; end
def decode(str); @calls << :decode; str; end
}.new
response = response_for(:app => [incrementor, { :coder => identity }])
response["Set-Cookie"].should.include("rack.session=")
response.body.should.equal '{"counter"=>1}'
identity.calls.should.equal [:decode, :encode]
end
it "creates a new cookie" do
response = response_for(:app => incrementor)
response["Set-Cookie"].should.include("rack.session=")
response.body.should.equal '{"counter"=>1}'
end
it "loads from a cookie" do
response = response_for(:app => incrementor)
response = response_for(:app => incrementor, :cookie => response)
response.body.should.equal '{"counter"=>2}'
response = response_for(:app => incrementor, :cookie => response)
response.body.should.equal '{"counter"=>3}'
end
it "renew session id" do
response = response_for(:app => incrementor)
cookie = response['Set-Cookie']
response = response_for(:app => only_session_id, :cookie => cookie)
cookie = response['Set-Cookie'] if response['Set-Cookie']
response.body.should.not.equal ""
old_session_id = response.body
response = response_for(:app => renewer, :cookie => cookie)
cookie = response['Set-Cookie'] if response['Set-Cookie']
response = response_for(:app => only_session_id, :cookie => cookie)
response.body.should.not.equal ""
response.body.should.not.equal old_session_id
end
it "destroys session" do
response = response_for(:app => incrementor)
response = response_for(:app => only_session_id, :cookie => response)
response.body.should.not.equal ""
old_session_id = response.body
response = response_for(:app => destroy_session, :cookie => response)
response = response_for(:app => only_session_id, :cookie => response)
response.body.should.not.equal ""
response.body.should.not.equal old_session_id
end
it "survives broken cookies" do
response = response_for(
:app => incrementor,
:cookie => "rack.session=blarghfasel"
)
response.body.should.equal '{"counter"=>1}'
response = response_for(
:app => [incrementor, { :secret => "test" }],
:cookie => "rack.session="
)
response.body.should.equal '{"counter"=>1}'
end
it "barks on too big cookies" do
lambda{
response_for(:app => bigcookie, :request => { :fatal => true })
}.should.raise(Rack::MockRequest::FatalWarning)
end
it "loads from a cookie with integrity hash" do
app = [incrementor, { :secret => "test" }]
response = response_for(:app => app)
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>2}'
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>3}'
app = [incrementor, { :secret => "other" }]
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>1}'
end
it "loads from a cookie wih accept-only integrity hash for graceful key rotation" do
response = response_for(:app => [incrementor, { :secret => "test" }])
app = [incrementor, { :secret => "test2", :old_secret => "test" }]
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>2}'
app = [incrementor, { :secret => "test3", :old_secret => "test2" }]
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>3}'
end
it "ignores tampered with session cookies" do
app = [incrementor, { :secret => "test" }]
response = response_for(:app => app)
response.body.should.equal '{"counter"=>1}'
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>2}'
_, digest = response["Set-Cookie"].split("--")
tampered_with_cookie = "hackerman-was-here" + "--" + digest
response = response_for(:app => app, :cookie => tampered_with_cookie)
response.body.should.equal '{"counter"=>1}'
end
it "supports either of secret or old_secret" do
app = [incrementor, { :secret => "test" }]
response = response_for(:app => app)
response.body.should.equal '{"counter"=>1}'
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>2}'
app = [incrementor, { :old_secret => "test" }]
response = response_for(:app => app)
response.body.should.equal '{"counter"=>1}'
response = response_for(:app => app, :cookie => response)
response.body.should.equal '{"counter"=>2}'
end
it "can handle Rack::Lint middleware" do
response = response_for(:app => incrementor)
lint = Rack::Lint.new(session_id)
response = response_for(:app => lint, :cookie => response)
response.body.should.not.be.nil
end
it "can handle middleware that inspects the env" do
class TestEnvInspector
def initialize(app)
@app = app
end
def call(env)
env.inspect
@app.call(env)
end
end
response = response_for(:app => incrementor)
inspector = TestEnvInspector.new(session_id)
response = response_for(:app => inspector, :cookie => response)
response.body.should.not.be.nil
end
it "returns the session id in the session hash" do
response = response_for(:app => incrementor)
response.body.should.equal '{"counter"=>1}'
response = response_for(:app => session_id, :cookie => response)
response.body.should.match(/"session_id"=>/)
response.body.should.match(/"counter"=>1/)
end
it "does not return a cookie if set to secure but not using ssl" do
app = [incrementor, { :secure => true }]
response = response_for(:app => app)
response["Set-Cookie"].should.be.nil
response = response_for(:app => app, :request => { "HTTPS" => "on" })
response["Set-Cookie"].should.not.be.nil
response["Set-Cookie"].should.match(/secure/)
end
it "does not return a cookie if cookie was not read/written" do
response = response_for(:app => nothing)
response["Set-Cookie"].should.be.nil
end
it "does not return a cookie if cookie was not written (only read)" do
response = response_for(:app => session_id)
response["Set-Cookie"].should.be.nil
end
it "returns even if not read/written if :expire_after is set" do
app = [nothing, { :expire_after => 3600 }]
request = { "rack.session" => { "not" => "empty" }}
response = response_for(:app => app, :request => request)
response["Set-Cookie"].should.not.be.nil
end
it "returns no cookie if no data was written and no session was created previously, even if :expire_after is set" do
app = [nothing, { :expire_after => 3600 }]
response = response_for(:app => app)
response["Set-Cookie"].should.be.nil
end
it "exposes :secret in env['rack.session.option']" do
response = response_for(:app => [session_option[:secret], { :secret => "foo" }])
response.body.should == '"foo"'
end
it "exposes :coder in env['rack.session.option']" do
response = response_for(:app => session_option[:coder])
response.body.should.match(/Base64::Marshal/)
end
it "allows passing in a hash with session data from middleware in front" do
request = { 'rack.session' => { :foo => 'bar' }}
response = response_for(:app => session_id, :request => request)
response.body.should.match(/foo/)
end
it "allows modifying session data with session data from middleware in front" do
request = { 'rack.session' => { :foo => 'bar' }}
response = response_for(:app => incrementor, :request => request)
response.body.should.match(/counter/)
response.body.should.match(/foo/)
end
it "allows more than one '--' in the cookie when calculating digests" do
@counter = 0
app = lambda do |env|
env["rack.session"]["message"] ||= ""
env["rack.session"]["message"] << "#{(@counter += 1).to_s}--"
hash = env["rack.session"].dup
hash.delete("session_id")
Rack::Response.new(hash["message"]).to_a
end
# another example of an unsafe coder is Base64.urlsafe_encode64
unsafe_coder = Class.new {
def encode(hash); hash.inspect end
def decode(str); eval(str) if str; end
}.new
_app = [ app, { :secret => "test", :coder => unsafe_coder } ]
response = response_for(:app => _app)
response.body.should.equal "1--"
response = response_for(:app => _app, :cookie => response)
response.body.should.equal "1--2--"
end
end
Hacked By AnonymousFox1.0, Coded By AnonymousFox