2018-12-23 20:11:29 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
|
|
|
# Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/>
|
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-09-09 10:02:59 +00:00
|
|
|
defmodule Pleroma.Web.OAuth.AuthorizationTest do
|
|
|
|
use Pleroma.DataCase
|
2019-02-10 21:57:38 +00:00
|
|
|
alias Pleroma.Web.OAuth.App
|
2019-03-05 02:52:23 +00:00
|
|
|
alias Pleroma.Web.OAuth.Authorization
|
2017-09-09 10:02:59 +00:00
|
|
|
import Pleroma.Factory
|
|
|
|
|
2019-02-19 19:28:21 +00:00
|
|
|
setup do
|
2018-03-30 13:01:53 +00:00
|
|
|
{:ok, app} =
|
|
|
|
Repo.insert(
|
|
|
|
App.register_changeset(%App{}, %{
|
|
|
|
client_name: "client",
|
2019-02-19 19:28:21 +00:00
|
|
|
scopes: ["read", "write"],
|
2018-03-30 13:01:53 +00:00
|
|
|
redirect_uris: "url"
|
|
|
|
})
|
|
|
|
)
|
|
|
|
|
2019-02-19 19:28:21 +00:00
|
|
|
%{app: app}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "create an authorization token for a valid app", %{app: app} do
|
2017-09-09 10:02:59 +00:00
|
|
|
user = insert(:user)
|
|
|
|
|
2019-02-19 19:28:21 +00:00
|
|
|
{:ok, auth1} = Authorization.create_authorization(app, user)
|
|
|
|
assert auth1.scopes == app.scopes
|
2017-09-09 10:02:59 +00:00
|
|
|
|
2019-02-19 19:28:21 +00:00
|
|
|
{:ok, auth2} = Authorization.create_authorization(app, user, ["read"])
|
|
|
|
assert auth2.scopes == ["read"]
|
2017-09-09 10:02:59 +00:00
|
|
|
|
2019-02-19 19:28:21 +00:00
|
|
|
for auth <- [auth1, auth2] do
|
|
|
|
assert auth.user_id == user.id
|
|
|
|
assert auth.app_id == app.id
|
|
|
|
assert String.length(auth.token) > 10
|
|
|
|
assert auth.used == false
|
|
|
|
end
|
|
|
|
end
|
2018-03-30 13:01:53 +00:00
|
|
|
|
2019-02-19 19:28:21 +00:00
|
|
|
test "use up a token", %{app: app} do
|
2017-09-09 10:02:59 +00:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
{:ok, auth} = Authorization.create_authorization(app, user)
|
|
|
|
|
|
|
|
{:ok, auth} = Authorization.use_token(auth)
|
|
|
|
|
|
|
|
assert auth.used == true
|
|
|
|
|
|
|
|
assert {:error, "already used"} == Authorization.use_token(auth)
|
|
|
|
|
|
|
|
expired_auth = %Authorization{
|
|
|
|
user_id: user.id,
|
|
|
|
app_id: app.id,
|
2018-03-30 13:01:53 +00:00
|
|
|
valid_until: NaiveDateTime.add(NaiveDateTime.utc_now(), -10),
|
2017-09-09 10:02:59 +00:00
|
|
|
token: "mytoken",
|
|
|
|
used: false
|
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, expired_auth} = Repo.insert(expired_auth)
|
|
|
|
|
|
|
|
assert {:error, "token expired"} == Authorization.use_token(expired_auth)
|
|
|
|
end
|
2018-10-13 23:45:11 +00:00
|
|
|
|
2019-02-19 19:28:21 +00:00
|
|
|
test "delete authorizations", %{app: app} do
|
2018-10-13 23:45:11 +00:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
{:ok, auth} = Authorization.create_authorization(app, user)
|
|
|
|
{:ok, auth} = Authorization.use_token(auth)
|
|
|
|
|
2018-12-11 12:31:52 +00:00
|
|
|
Authorization.delete_user_authorizations(user)
|
2018-10-13 23:45:11 +00:00
|
|
|
|
|
|
|
{_, invalid} = Authorization.use_token(auth)
|
|
|
|
|
|
|
|
assert auth != invalid
|
|
|
|
end
|
2017-09-09 10:02:59 +00:00
|
|
|
end
|