logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://hacktivis.me/git/pleroma.git

o_auth_plug_test.exs (3640B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.Plugs.OAuthPlugTest do
  5. use Pleroma.Web.ConnCase, async: true
  6. alias Pleroma.Helpers.AuthHelper
  7. alias Pleroma.Web.OAuth.Token
  8. alias Pleroma.Web.OAuth.Token.Strategy.Revoke
  9. alias Pleroma.Web.Plugs.OAuthPlug
  10. alias Plug.Session
  11. import Pleroma.Factory
  12. setup %{conn: conn} do
  13. user = insert(:user)
  14. {:ok, oauth_token} = Token.create(insert(:oauth_app), user)
  15. %{user: user, token: oauth_token, conn: conn}
  16. end
  17. test "it does nothing if a user is assigned", %{conn: conn} do
  18. conn = assign(conn, :user, %Pleroma.User{})
  19. ret_conn = OAuthPlug.call(conn, %{})
  20. assert ret_conn == conn
  21. end
  22. test "with valid token (uppercase) in auth header, it assigns the user", %{conn: conn} = opts do
  23. conn =
  24. conn
  25. |> put_req_header("authorization", "BEARER #{opts[:token].token}")
  26. |> OAuthPlug.call(%{})
  27. assert conn.assigns[:user] == opts[:user]
  28. end
  29. test "with valid token (downcase) in auth header, it assigns the user", %{conn: conn} = opts do
  30. conn =
  31. conn
  32. |> put_req_header("authorization", "bearer #{opts[:token].token}")
  33. |> OAuthPlug.call(%{})
  34. assert conn.assigns[:user] == opts[:user]
  35. end
  36. test "with valid token (downcase) in url parameters, it assigns the user", opts do
  37. conn =
  38. :get
  39. |> build_conn("/?access_token=#{opts[:token].token}")
  40. |> put_req_header("content-type", "application/json")
  41. |> fetch_query_params()
  42. |> OAuthPlug.call(%{})
  43. assert conn.assigns[:user] == opts[:user]
  44. end
  45. test "with valid token (downcase) in body parameters, it assigns the user", opts do
  46. conn =
  47. :post
  48. |> build_conn("/api/v1/statuses", access_token: opts[:token].token, status: "test")
  49. |> OAuthPlug.call(%{})
  50. assert conn.assigns[:user] == opts[:user]
  51. end
  52. test "with invalid token, it does not assign the user", %{conn: conn} do
  53. conn =
  54. conn
  55. |> put_req_header("authorization", "bearer TTTTT")
  56. |> OAuthPlug.call(%{})
  57. refute conn.assigns[:user]
  58. end
  59. describe "with :oauth_token in session, " do
  60. setup %{token: oauth_token, conn: conn} do
  61. session_opts = [
  62. store: :cookie,
  63. key: "_test",
  64. signing_salt: "cooldude"
  65. ]
  66. conn =
  67. conn
  68. |> Session.call(Session.init(session_opts))
  69. |> fetch_session()
  70. |> AuthHelper.put_session_token(oauth_token.token)
  71. %{conn: conn}
  72. end
  73. test "if session-stored token matches a valid OAuth token, assigns :user and :token", %{
  74. conn: conn,
  75. user: user,
  76. token: oauth_token
  77. } do
  78. conn = OAuthPlug.call(conn, %{})
  79. assert conn.assigns.user && conn.assigns.user.id == user.id
  80. assert conn.assigns.token && conn.assigns.token.id == oauth_token.id
  81. end
  82. test "if session-stored token matches an expired OAuth token, does nothing", %{
  83. conn: conn,
  84. token: oauth_token
  85. } do
  86. expired_valid_until = NaiveDateTime.add(NaiveDateTime.utc_now(), -3600 * 24, :second)
  87. oauth_token
  88. |> Ecto.Changeset.change(valid_until: expired_valid_until)
  89. |> Pleroma.Repo.update()
  90. ret_conn = OAuthPlug.call(conn, %{})
  91. assert ret_conn == conn
  92. end
  93. test "if session-stored token matches a revoked OAuth token, does nothing", %{
  94. conn: conn,
  95. token: oauth_token
  96. } do
  97. Revoke.revoke(oauth_token)
  98. ret_conn = OAuthPlug.call(conn, %{})
  99. assert ret_conn == conn
  100. end
  101. end
  102. end