protected function ApdqcSessionHttpsTestCase::testHttpsSession in Asynchronous Prefetch Database Query Cache 7
Test HTTPS sessions.
File
- ./
apdqc.test, line 747 - Tests for the Asynchronous Prefetch Database Query Cache module.
Class
- ApdqcSessionHttpsTestCase
- Ensure that when running under HTTPS two session cookies are generated.
Code
protected function testHttpsSession() {
global $is_https;
if ($is_https) {
$secure_session_name = session_name();
$insecure_session_name = substr(session_name(), 1);
}
else {
$secure_session_name = 'S' . session_name();
$insecure_session_name = session_name();
}
$user = $this
->drupalCreateUser(array(
'access administration pages',
));
// Test HTTPS session handling by altering the form action to submit the
// login form through https.php, which creates a mock HTTPS request.
$this
->drupalGet('user');
$form = $this
->xpath('//form[@id="user-login"]');
$form[0]['action'] = $this
->httpsUrl('user');
$edit = array(
'name' => $user->name,
'pass' => $user->pass_raw,
);
$this
->drupalPost(NULL, $edit, t('Log in'));
// Test a second concurrent session.
$this
->curlClose();
$this
->drupalGet('user');
$form = $this
->xpath('//form[@id="user-login"]');
$form[0]['action'] = $this
->httpsUrl('user');
$this
->drupalPost(NULL, $edit, t('Log in'));
// Check secure cookie on secure page.
$this
->assertTrue($this->cookies[$secure_session_name]['secure'], 'The secure cookie has the secure attribute');
// Check insecure cookie is not set.
$this
->assertFalse(isset($this->cookies[$insecure_session_name]));
$ssid = $this->cookies[$secure_session_name]['value'];
$this
->assertSessionIds($ssid, $ssid, 'Session has a non-empty SID and a correct secure SID.');
$cookie = $secure_session_name . '=' . $ssid;
// Verify that user is logged in on secure URL.
$this
->curlClose();
$this
->drupalGet($this
->httpsUrl('admin/config'), array(), array(
'Cookie: ' . $cookie,
));
$this
->assertText(t('Configuration'));
$this
->assertResponse(200);
// Verify that user is not logged in on non-secure URL.
$this
->curlClose();
$this
->drupalGet($this
->httpUrl('admin/config'), array(), array(
'Cookie: ' . $cookie,
));
$this
->assertNoText(t('Configuration'));
$this
->assertResponse(403);
// Verify that empty SID cannot be used on the non-secure site.
$this
->curlClose();
$cookie = $insecure_session_name . '=';
$this
->drupalGet($this
->httpUrl('admin/config'), array(), array(
'Cookie: ' . $cookie,
));
$this
->assertResponse(403);
// Test HTTP session handling by altering the form action to submit the
// login form through http.php, which creates a mock HTTP request on HTTPS
// test environments.
$this
->curlClose();
$this
->drupalGet('user');
$form = $this
->xpath('//form[@id="user-login"]');
$form[0]['action'] = $this
->httpUrl('user');
$edit = array(
'name' => $user->name,
'pass' => $user->pass_raw,
);
$this
->drupalPost(NULL, $edit, t('Log in'));
$this
->drupalGet($this
->httpUrl('admin/config'));
$this
->assertResponse(200);
$sid = $this->cookies[$insecure_session_name]['value'];
$this
->assertSessionIds($sid, '', 'Session has the correct SID and an empty secure SID.');
// Verify that empty secure SID cannot be used on the secure site.
$this
->curlClose();
$cookie = $secure_session_name . '=';
$this
->drupalGet($this
->httpsUrl('admin/config'), array(), array(
'Cookie: ' . $cookie,
));
$this
->assertResponse(403);
// Clear browser cookie jar.
$this->cookies = array();
if ($is_https) {
// The functionality does not make sense when running on HTTPS.
return;
}
// Enable secure pages.
variable_set('https', TRUE);
$this
->curlClose();
// Start an anonymous session on the insecure site.
$session_data = $this
->randomName();
$this
->drupalGet('session-test/set/' . $session_data);
// Check secure cookie on insecure page.
$this
->assertFalse(isset($this->cookies[$secure_session_name]), 'The secure cookie is not sent on insecure pages.');
// Check insecure cookie on insecure page.
$this
->assertFalse($this->cookies[$insecure_session_name]['secure'], 'The insecure cookie does not have the secure attribute');
// Store the anonymous cookie so we can validate that its session is killed
// after login.
$anonymous_cookie = $insecure_session_name . '=' . $this->cookies[$insecure_session_name]['value'];
// Check that password request form action is not secure.
$this
->drupalGet('user/password');
$form = $this
->xpath('//form[@id="user-pass"]');
$this
->assertNotEqual(substr($form[0]['action'], 0, 6), 'https:', 'Password request form action is not secure');
$form[0]['action'] = $this
->httpsUrl('user');
// Check that user login form action is secure.
$this
->drupalGet('user');
$form = $this
->xpath('//form[@id="user-login"]');
$this
->assertEqual(substr($form[0]['action'], 0, 6), 'https:', 'Login form action is secure');
$form[0]['action'] = $this
->httpsUrl('user');
$edit = array(
'name' => $user->name,
'pass' => $user->pass_raw,
);
$this
->drupalPost(NULL, $edit, t('Log in'));
// Check secure cookie on secure page.
$this
->assertTrue($this->cookies[$secure_session_name]['secure'], 'The secure cookie has the secure attribute');
// Check insecure cookie on secure page.
$this
->assertFalse($this->cookies[$insecure_session_name]['secure'], 'The insecure cookie does not have the secure attribute');
$sid = $this->cookies[$insecure_session_name]['value'];
$ssid = $this->cookies[$secure_session_name]['value'];
$this
->assertSessionIds($sid, $ssid, 'Session has both secure and insecure SIDs');
$cookies = array(
$insecure_session_name . '=' . $sid,
$secure_session_name . '=' . $ssid,
);
// Test that session data saved before login is still available on the
// authenticated session.
$this
->drupalGet('session-test/get');
$this
->assertText($session_data, 'Session correctly returned the stored data set by the anonymous session.');
foreach ($cookies as $cookie_key => $cookie) {
foreach (array(
'admin/config',
$this
->httpsUrl('admin/config'),
) as $url_key => $url) {
$this
->curlClose();
$this
->drupalGet($url, array(), array(
'Cookie: ' . $cookie,
));
if ($cookie_key == $url_key) {
$this
->assertText(t('Configuration'));
$this
->assertResponse(200);
}
else {
$this
->assertNoText(t('Configuration'));
$this
->assertResponse(403);
}
}
}
// Test that session data saved before login is not available using the
// pre-login anonymous cookie.
$this->cookies = array();
$this
->drupalGet('session-test/get', array(
'Cookie: ' . $anonymous_cookie,
));
$this
->assertNoText($session_data, 'Initial anonymous session is inactive after login.');
// Clear browser cookie jar.
$this->cookies = array();
// Start an anonymous session on the secure site.
$this
->drupalGet($this
->httpsUrl('session-test/set/1'));
// Mock a login to the secure site using the secure session cookie.
$this
->drupalGet('user');
$form = $this
->xpath('//form[@id="user-login"]');
$form[0]['action'] = $this
->httpsUrl('user');
$this
->drupalPost(NULL, $edit, t('Log in'));
// Test that the user is also authenticated on the insecure site.
$this
->drupalGet("user/{$user->uid}/edit");
$this
->assertResponse(200);
}