The reauth flow ran validate_jsessionid against HA's shared aiohttp
session, then update_cookies({"JSESSIONID": ...}) added the new value
with no domain. aiohttp's cookie jar still held the previous
JSESSIONID pinned to smartthingsfind.samsung.com (set via Set-Cookie
during the previous load), and aiohttp prefers the more-specific
domain match — so the *stale* cookie went out, Samsung returned no
_csrf header, and the user saw "Cookie was rejected by SmartThings
Find" even though their cookie was fine.
Two fixes:
* validate_jsessionid now runs in an isolated aiohttp.ClientSession
with its own jar, so the shared HA jar can't shadow the cookie
under test.
* async_setup_entry clear_domain()s the smartthingsfind.samsung.com
cookies before reseating JSESSIONID with response_url, otherwise
the same shadowing breaks the entry reload that follows a
successful UI reauth.
Also remove the QR-code login code (do_login_stage_one / _two,
gen_qr_code_base64, the legacy URL constants and qrcode/base64/
random/string/re/asyncio/io/timedelta imports) — Samsung migrated
account.samsung.com to a SPA-driven IAM/OAuth2 flow months ago, so
the QR scrape no longer works and nothing in the integration
references those helpers anymore. Drops the qrcode/pillow/requests
manifest requirements.
Tests: a minimal conftest stubs the homeassistant.* imports the
integration uses, and four async tests cover validate_jsessionid
including the regression case where a domain-bound stale cookie
sits in the shared jar.
Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
94 lines
3.2 KiB
Python
94 lines
3.2 KiB
Python
"""Tests for validate_jsessionid.
|
|
|
|
The interesting case is cookie-jar pollution: HA's shared aiohttp session can
|
|
already hold a JSESSIONID cookie that was stored from a previous Set-Cookie
|
|
response (so it carries a real domain attribute). When we then pre-load a new
|
|
JSESSIONID via update_cookies({"JSESSIONID": ...}) without specifying a
|
|
response_url, the new cookie gets stored with no domain and aiohttp ships the
|
|
older, more-specific one — making the new (valid) cookie look invalid to
|
|
Samsung."""
|
|
from __future__ import annotations
|
|
|
|
import aiohttp
|
|
import pytest
|
|
from aioresponses import aioresponses
|
|
from yarl import URL
|
|
|
|
from custom_components.smartthings_find.utils import (
|
|
URL_GET_CSRF,
|
|
validate_jsessionid,
|
|
)
|
|
|
|
|
|
@pytest.fixture
|
|
async def hass(monkeypatch):
|
|
from homeassistant.core import HomeAssistant
|
|
|
|
h = HomeAssistant()
|
|
async with aiohttp.ClientSession() as session:
|
|
h.clientsession = session
|
|
yield h
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_valid_cookie_returns_true(hass):
|
|
with aioresponses() as m:
|
|
m.get(URL_GET_CSRF, status=200, headers={"_csrf": "tok123"})
|
|
assert await validate_jsessionid(hass, "fresh-cookie") is True
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_no_csrf_header_returns_false(hass):
|
|
with aioresponses() as m:
|
|
m.get(URL_GET_CSRF, status=200, body="fail")
|
|
assert await validate_jsessionid(hass, "expired-cookie") is False
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_non_200_returns_false(hass):
|
|
with aioresponses() as m:
|
|
m.get(URL_GET_CSRF, status=401, body="Logout")
|
|
assert await validate_jsessionid(hass, "anything") is False
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_validation_does_not_touch_shared_session(hass):
|
|
"""The shared HA session may already hold a JSESSIONID cookie with a real
|
|
domain (set by a previous Set-Cookie). Validation must run in an isolated
|
|
aiohttp session so:
|
|
|
|
* the shared jar is not mutated as a side-effect of validation, and
|
|
* a stale domain-bound JSESSIONID can't shadow the cookie we're validating.
|
|
|
|
Without this, aiohttp's cookie jar prefers the domain-matched (stale)
|
|
cookie over the bare cookie we just added, so Samsung sees the expired
|
|
session, returns no `_csrf`, and we tell the user their cookie was
|
|
rejected even though it was perfectly fine."""
|
|
hass.clientsession.cookie_jar.update_cookies(
|
|
{"JSESSIONID": "STALE_VALUE"},
|
|
response_url=URL("https://smartthingsfind.samsung.com/"),
|
|
)
|
|
before = sorted(
|
|
(c.key, c["domain"], c.value)
|
|
for c in hass.clientsession.cookie_jar
|
|
)
|
|
|
|
with aioresponses() as m:
|
|
m.get(URL_GET_CSRF, status=200, headers={"_csrf": "tok"})
|
|
result = await validate_jsessionid(hass, "FRESH_VALUE")
|
|
|
|
after = sorted(
|
|
(c.key, c["domain"], c.value)
|
|
for c in hass.clientsession.cookie_jar
|
|
)
|
|
|
|
assert before == after, (
|
|
"validate_jsessionid mutated the shared HA session's cookie jar; "
|
|
"it must use an isolated session.\n"
|
|
f" before: {before}\n after: {after}"
|
|
)
|
|
assert result is True, (
|
|
"validate_jsessionid returned False even though the mocked server "
|
|
"would have replied with _csrf — the stale shared-jar cookie likely "
|
|
"shadowed the fresh one"
|
|
)
|