Skip to content

Commit

Permalink
Fix http digest authentication with trailing '/' or '?' (fixes rails#…
Browse files Browse the repository at this point in the history
  • Loading branch information
drogus committed Jan 10, 2012
1 parent c2af40b commit 238d80c
Show file tree
Hide file tree
Showing 2 changed files with 51 additions and 7 deletions.
13 changes: 8 additions & 5 deletions actionpack/lib/action_controller/metal/http_authentication.rb
Expand Up @@ -192,12 +192,15 @@ def validate_digest_response(request, realm, &password_procedure)
return false unless password

method = request.env['rack.methodoverride.original_method'] || request.env['REQUEST_METHOD']
uri = credentials[:uri][0,1] == '/' ? request.fullpath : request.url
uri = credentials[:uri][0,1] == '/' ? request.original_fullpath : request.original_url

[true, false].any? do |password_is_ha1|
expected = expected_response(method, uri, credentials, password, password_is_ha1)
expected == credentials[:response]
end
[true, false].any? do |trailing_question_mark|
[true, false].any? do |password_is_ha1|
_uri = trailing_question_mark ? uri + "?" : uri
expected = expected_response(method, _uri, credentials, password, password_is_ha1)
expected == credentials[:response]
end
end
end
end

Expand Down
45 changes: 43 additions & 2 deletions actionpack/test/controller/http_digest_authentication_test.rb
Expand Up @@ -139,7 +139,7 @@ def authenticate_with_request

test "authentication request with request-uri that doesn't match credentials digest-uri" do
@request.env['HTTP_AUTHORIZATION'] = encode_credentials(:username => 'pretty', :password => 'please')
@request.env['PATH_INFO'] = "/http_digest_authentication_test/dummy_digest/altered/uri"
@request.env['ORIGINAL_FULLPATH'] = "/http_digest_authentication_test/dummy_digest/altered/uri"
get :display

assert_response :unauthorized
Expand Down Expand Up @@ -208,6 +208,44 @@ def authenticate_with_request
assert !ActionController::HttpAuthentication::Digest.validate_digest_response(@request, "SuperSecret"){nil}
end

test "authentication request with request-uri ending in '/'" do
@request.env['PATH_INFO'] = "/http_digest_authentication_test/dummy_digest/"
@request.env['HTTP_AUTHORIZATION'] = encode_credentials(:username => 'pretty', :password => 'please')

# simulate normalizing PATH_INFO
@request.env['PATH_INFO'] = "/http_digest_authentication_test/dummy_digest"
get :display

assert_response :success
assert_equal 'Definitely Maybe', @response.body
end

test "authentication request with request-uri ending in '?'" do
@request.env['PATH_INFO'] = "/http_digest_authentication_test/dummy_digest/?"
@request.env['HTTP_AUTHORIZATION'] = encode_credentials(:username => 'pretty', :password => 'please')

# simulate normalizing PATH_INFO
@request.env['PATH_INFO'] = "/http_digest_authentication_test/dummy_digest"
get :display

assert_response :success
assert_equal 'Definitely Maybe', @response.body
end

test "authentication request with absolute uri in credentials (as in IE) ending with /" do
@request.env['PATH_INFO'] = "/http_digest_authentication_test/dummy_digest/"
@request.env['HTTP_AUTHORIZATION'] = encode_credentials(:uri => "http://test.host/http_digest_authentication_test/dummy_digest/",
:username => 'pretty', :password => 'please')

# simulate normalizing PATH_INFO
@request.env['PATH_INFO'] = "/http_digest_authentication_test/dummy_digest"
get :display

assert_response :success
assert assigns(:logged_in)
assert_equal 'Definitely Maybe', @response.body
end

private

def encode_credentials(options)
Expand All @@ -228,7 +266,10 @@ def encode_credentials(options)

credentials = decode_credentials(@response.headers['WWW-Authenticate'])
credentials.merge!(options)
credentials.merge!(:uri => @request.env['PATH_INFO'].to_s)
path_info = @request.env['PATH_INFO'].to_s
uri = options[:uri] || path_info
credentials.merge!(:uri => uri)
@request.env["ORIGINAL_FULLPATH"] = path_info
ActionController::HttpAuthentication::Digest.encode_credentials(method, credentials, password, options[:password_is_ha1])
end

Expand Down

0 comments on commit 238d80c

Please sign in to comment.