|
11 | 11 | import java.util.stream.Collectors; |
12 | 12 | import java.util.stream.Stream; |
13 | 13 |
|
| 14 | +import static org.junit.jupiter.api.Assertions.assertDoesNotThrow; |
14 | 15 | import static org.junit.jupiter.api.Assertions.assertEquals; |
15 | 16 | import static org.junit.jupiter.api.Assertions.assertFalse; |
| 17 | +import static org.junit.jupiter.api.Assertions.assertNotEquals; |
| 18 | +import static org.junit.jupiter.api.Assertions.assertThrows; |
16 | 19 | import static org.junit.jupiter.api.Assertions.assertTrue; |
17 | 20 | import static org.junit.jupiter.api.Assertions.fail; |
18 | 21 |
|
@@ -61,15 +64,28 @@ void testParseValidSpiffeId(String input, TrustDomain expectedTrustDomain, Strin |
61 | 64 |
|
62 | 65 | static Stream<Arguments> provideTestValidSpiffeIds() { |
63 | 66 | return Stream.of( |
| 67 | + Arguments.of("spiffe://trustdomain", TrustDomain.parse("trustdomain"), ""), |
64 | 68 | Arguments.of("spiffe://trustdomain/path", TrustDomain.parse("trustdomain"), "/path"), |
65 | 69 | Arguments.of("spiffe://trustdomain/path1/path2", TrustDomain.parse("trustdomain"), "/path1/path2"), |
66 | 70 | Arguments.of("spiffe://trustdomain/PATH1/PATH2", TrustDomain.parse("trustdomain"), "/PATH1/PATH2"), |
67 | 71 | Arguments.of("spiffe://trustdomain/9eebccd2-12bf-40a6-b262-65fe0487d453", TrustDomain.parse("trustdomain"), "/9eebccd2-12bf-40a6-b262-65fe0487d453"), |
| 72 | + Arguments.of("spiffe://a_b.example/foo", TrustDomain.parse("a_b.example"), "/foo"), |
| 73 | + Arguments.of("spiffe://1.2.3.4/service", TrustDomain.parse("1.2.3.4"), "/service"), |
68 | 74 | Arguments.of("SPIFFE://trustdomain/path", TrustDomain.parse("trustdomain"), "/path"), |
69 | 75 | Arguments.of("SpIfFe://TrUsTdOmAiN/Workload", TrustDomain.parse("trustdomain"), "/Workload") |
70 | 76 | ); |
71 | 77 | } |
72 | 78 |
|
| 79 | + static Stream<String> provideNonDnsShapedTrustDomains() { |
| 80 | + return Stream.of( |
| 81 | + "example..org", |
| 82 | + ".example.org", |
| 83 | + "example.org.", |
| 84 | + "-example.org", |
| 85 | + "example-.org" |
| 86 | + ); |
| 87 | + } |
| 88 | + |
73 | 89 | @ParameterizedTest |
74 | 90 | @MethodSource("provideInvalidSpiffeIds") |
75 | 91 | void testParseInvalidSpiffeId(String input, String expected) { |
@@ -101,6 +117,8 @@ static Stream<Arguments> provideInvalidSpiffeIds() { |
101 | 117 | Arguments.of("spiffe://trustdomain/../other", "Path cannot contain dot segments"), |
102 | 118 | Arguments.of("spiffe://trustdomain/", "Path cannot have a trailing slash"), |
103 | 119 | Arguments.of("spiffe://trustdomain/path/", "Path cannot have a trailing slash"), |
| 120 | + Arguments.of("spiffe://[::1]/service", "Trust domain characters are limited to lowercase letters, numbers, dots, dashes, and underscores"), |
| 121 | + Arguments.of("spiffe://[2001:db8::1]/service", "Trust domain characters are limited to lowercase letters, numbers, dots, dashes, and underscores"), |
104 | 122 | Arguments.of("xspiffe://trustdomain/path", "Scheme is missing or invalid") |
105 | 123 | ); |
106 | 124 | } |
@@ -140,13 +158,13 @@ void testOfInvalid(TrustDomain trustDomain, String[] inputPath, String expectedE |
140 | 158 | static Stream<Arguments> provideInvalidArguments() { |
141 | 159 | return Stream.of( |
142 | 160 | Arguments.of(null, new String[]{""}, "trustDomain must not be null"), |
143 | | - Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"/ele%5ment"}, "Path segment characters are limited to letters, numbers, dots, dashes, and underscores"), |
144 | | - Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"/path/"}, "Path cannot have a trailing slash"), |
145 | | - Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"/ /"}, "Path segment characters are limited to letters, numbers, dots, dashes, and underscores"), |
146 | | - Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"/"}, "Path cannot have a trailing slash"), |
147 | | - Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"//"}, "Path cannot contain empty segments"), |
148 | | - Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"/./"}, "Path cannot contain dot segments"), |
149 | | - Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"/../"}, "Path cannot contain dot segments") |
| 161 | + Arguments.of(TrustDomain.parse("trustdomain"), new String[]{""}, "Cannot be empty"), |
| 162 | + Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"ele%5ment"}, "Path segment characters are limited to letters, numbers, dots, dashes, and underscores"), |
| 163 | + Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"/service"}, "Path segment characters are limited to letters, numbers, dots, dashes, and underscores"), |
| 164 | + Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"service/"}, "Path segment characters are limited to letters, numbers, dots, dashes, and underscores"), |
| 165 | + Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"foo/bar"}, "Path segment characters are limited to letters, numbers, dots, dashes, and underscores"), |
| 166 | + Arguments.of(TrustDomain.parse("trustdomain"), new String[]{"."}, "Path cannot contain dot segments"), |
| 167 | + Arguments.of(TrustDomain.parse("trustdomain"), new String[]{".."}, "Path cannot contain dot segments") |
150 | 168 | ); |
151 | 169 | } |
152 | 170 |
|
@@ -239,4 +257,114 @@ void memberOf_aTrustDomainAndASpiffeIdWithDifferentTrustDomain_ReturnsFalse() { |
239 | 257 |
|
240 | 258 | assertFalse(isMemberOf); |
241 | 259 | } |
| 260 | + |
| 261 | + @Test |
| 262 | + void parseMixedCaseSchemeAndTrustDomain_toStringReturnsCanonicalFormAndPreservesPathCase() { |
| 263 | + SpiffeId spiffeId = SpiffeId.parse("SPIFFE://EXAMPLE.ORG/MyService"); |
| 264 | + |
| 265 | + assertEquals("spiffe://example.org/MyService", spiffeId.toString()); |
| 266 | + } |
| 267 | + |
| 268 | + @Test |
| 269 | + void parseEquivalentIdsWithDifferentSchemeAndTrustDomainCase_areEqual() { |
| 270 | + SpiffeId lowercase = SpiffeId.parse("spiffe://example.org/service"); |
| 271 | + SpiffeId uppercaseScheme = SpiffeId.parse("SPIFFE://example.org/service"); |
| 272 | + SpiffeId uppercaseTrustDomain = SpiffeId.parse("spiffe://EXAMPLE.ORG/service"); |
| 273 | + SpiffeId uppercaseBoth = SpiffeId.parse("SPIFFE://EXAMPLE.ORG/service"); |
| 274 | + |
| 275 | + assertEquals(lowercase, uppercaseScheme); |
| 276 | + assertEquals(lowercase, uppercaseTrustDomain); |
| 277 | + assertEquals(lowercase, uppercaseBoth); |
| 278 | + assertEquals(lowercase.hashCode(), uppercaseBoth.hashCode()); |
| 279 | + } |
| 280 | + |
| 281 | + @Test |
| 282 | + void parseIdsWithDifferentPathCase_areNotEqual() { |
| 283 | + SpiffeId lowercasePath = SpiffeId.parse("spiffe://example.org/service"); |
| 284 | + SpiffeId uppercasePath = SpiffeId.parse("spiffe://example.org/Service"); |
| 285 | + |
| 286 | + assertNotEquals(lowercasePath, uppercasePath); |
| 287 | + } |
| 288 | + |
| 289 | + @ParameterizedTest |
| 290 | + @MethodSource("provideNonDnsShapedTrustDomains") |
| 291 | + void parseSpiffeIdWithNonDnsShapedTrustDomain_isAccepted(String trustDomainName) { |
| 292 | + SpiffeId spiffeId = SpiffeId.parse("spiffe://" + trustDomainName + "/service"); |
| 293 | + |
| 294 | + assertEquals(TrustDomain.parse(trustDomainName), spiffeId.getTrustDomain()); |
| 295 | + assertEquals("/service", spiffeId.getPath()); |
| 296 | + assertEquals("spiffe://" + trustDomainName + "/service", spiffeId.toString()); |
| 297 | + } |
| 298 | + |
| 299 | + @ParameterizedTest |
| 300 | + @MethodSource("provideNonDnsShapedTrustDomains") |
| 301 | + void fromSegmentsWithNonDnsShapedTrustDomain_isAccepted(String trustDomainName) { |
| 302 | + TrustDomain trustDomain = TrustDomain.parse(trustDomainName); |
| 303 | + |
| 304 | + SpiffeId spiffeId = SpiffeId.fromSegments(trustDomain, "service"); |
| 305 | + |
| 306 | + assertEquals(trustDomain, spiffeId.getTrustDomain()); |
| 307 | + assertEquals("/service", spiffeId.getPath()); |
| 308 | + assertEquals("spiffe://" + trustDomainName + "/service", spiffeId.toString()); |
| 309 | + } |
| 310 | + |
| 311 | + @ParameterizedTest |
| 312 | + @MethodSource("provideInvalidSegmentsForFromSegments") |
| 313 | + void fromSegments_invalidSegment_throwsInvalidSpiffeIdException(String segment, String expectedMessage) { |
| 314 | + InvalidSpiffeIdException ex = assertThrows( |
| 315 | + InvalidSpiffeIdException.class, |
| 316 | + () -> SpiffeId.fromSegments(TrustDomain.parse("example.org"), segment)); |
| 317 | + assertEquals(expectedMessage, ex.getMessage()); |
| 318 | + } |
| 319 | + |
| 320 | + static Stream<Arguments> provideInvalidSegmentsForFromSegments() { |
| 321 | + return Stream.of( |
| 322 | + Arguments.of(null, SpiffeId.EMPTY), |
| 323 | + Arguments.of("", SpiffeId.EMPTY), |
| 324 | + Arguments.of(" ", SpiffeId.BAD_PATH_SEGMENT_CHAR) |
| 325 | + ); |
| 326 | + } |
| 327 | + |
| 328 | + @ParameterizedTest |
| 329 | + @MethodSource("provideInvalidPathsForValidatePath") |
| 330 | + void validatePath_invalidPath_throwsInvalidSpiffeIdException(String path, String expectedMessage) { |
| 331 | + InvalidSpiffeIdException ex = assertThrows( |
| 332 | + InvalidSpiffeIdException.class, |
| 333 | + () -> SpiffeId.validatePath(path)); |
| 334 | + assertEquals(expectedMessage, ex.getMessage()); |
| 335 | + } |
| 336 | + |
| 337 | + static Stream<Arguments> provideInvalidPathsForValidatePath() { |
| 338 | + return Stream.of( |
| 339 | + Arguments.of(" ", SpiffeId.EMPTY), |
| 340 | + Arguments.of("foo", SpiffeId.MISSING_LEADING_SLASH), |
| 341 | + Arguments.of("foo/bar", SpiffeId.MISSING_LEADING_SLASH), |
| 342 | + Arguments.of("/foo//bar", SpiffeId.EMPTY_SEGMENT), |
| 343 | + Arguments.of("/./other", SpiffeId.DOT_SEGMENT), |
| 344 | + Arguments.of("/../other", SpiffeId.DOT_SEGMENT), |
| 345 | + Arguments.of("/foo/.", SpiffeId.DOT_SEGMENT), |
| 346 | + Arguments.of("/foo/..", SpiffeId.DOT_SEGMENT), |
| 347 | + Arguments.of("/foo/", SpiffeId.TRAILING_SLASH), |
| 348 | + Arguments.of("/", SpiffeId.TRAILING_SLASH), |
| 349 | + Arguments.of("/ ", SpiffeId.BAD_PATH_SEGMENT_CHAR), |
| 350 | + Arguments.of("/foo%5Cbar", SpiffeId.BAD_PATH_SEGMENT_CHAR), |
| 351 | + Arguments.of("/foo bar", SpiffeId.BAD_PATH_SEGMENT_CHAR) |
| 352 | + ); |
| 353 | + } |
| 354 | + |
| 355 | + @ParameterizedTest |
| 356 | + @MethodSource("provideValidPathsForValidatePath") |
| 357 | + void validatePath_validPath_doesNotThrow(String path) { |
| 358 | + assertDoesNotThrow(() -> SpiffeId.validatePath(path)); |
| 359 | + } |
| 360 | + |
| 361 | + static Stream<String> provideValidPathsForValidatePath() { |
| 362 | + return Stream.of( |
| 363 | + "/foo", |
| 364 | + "/foo/bar", |
| 365 | + "/PATH/path", |
| 366 | + "/.../svc", |
| 367 | + "/9eebccd2-12bf-40a6-b262-65fe0487d453" |
| 368 | + ); |
| 369 | + } |
242 | 370 | } |
0 commit comments