From 768a6ce989bead40a01b90abe956dac1d11ccd44 Mon Sep 17 00:00:00 2001 From: Joel Speed Date: Mon, 2 Oct 2017 10:19:24 +0100 Subject: [PATCH] Test IsValidRedirect method --- oauthproxy_test.go | 38 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) diff --git a/oauthproxy_test.go b/oauthproxy_test.go index adc3cfb..b53c79b 100644 --- a/oauthproxy_test.go +++ b/oauthproxy_test.go @@ -93,6 +93,44 @@ func TestRobotsTxt(t *testing.T) { assert.Equal(t, "User-agent: *\nDisallow: /", rw.Body.String()) } +func TestIsValidRedirect(t *testing.T) { + opts := NewOptions() + opts.ClientID = "bazquux" + opts.ClientSecret = "foobar" + opts.CookieSecret = "xyzzyplugh" + opts.WhitelistDomains = []string{"foo.bar"} + opts.Validate() + + proxy := NewOAuthProxy(opts, func(string) bool { return true }) + + noRD := proxy.IsValidRedirect("") + assert.Equal(t, false, noRD) + + singleSlash := proxy.IsValidRedirect("/redirect") + assert.Equal(t, true, singleSlash) + + doubleSlash := proxy.IsValidRedirect("//redirect") + assert.Equal(t, false, doubleSlash) + + validHTTP := proxy.IsValidRedirect("http://baz.foo.bar/redirect") + assert.Equal(t, true, validHTTP) + + validHTTPS := proxy.IsValidRedirect("https://baz.foo.bar/redirect") + assert.Equal(t, true, validHTTPS) + + invalidHTTP1 := proxy.IsValidRedirect("http://foo.bar.evil.corp/redirect") + assert.Equal(t, false, invalidHTTP1) + + invalidHTTPS1 := proxy.IsValidRedirect("https://foo.bar.evil.corp/redirect") + assert.Equal(t, false, invalidHTTPS1) + + invalidHTTP2 := proxy.IsValidRedirect("http://evil.corp/redirect?rd=foo.bar") + assert.Equal(t, false, invalidHTTP2) + + invalidHTTPS2 := proxy.IsValidRedirect("https://evil.corp/redirect?rd=foo.bar") + assert.Equal(t, false, invalidHTTPS2) +} + type TestProvider struct { *providers.ProviderData EmailAddress string