mirror of
https://akkoma.dev/AkkomaGang/akkoma.git
synced 2024-12-15 06:39:05 +00:00
98cb255d12
OTP builds to 1.15
Changelog entry
Ensure policies are fully loaded
Fix :warn
use main branch for linkify
Fix warn in tests
Migrations for phoenix 1.17
Revert "Migrations for phoenix 1.17"
This reverts commit 6a3b2f15b7
.
Oban upgrade
Add default empty whitelist
mix format
limit test to amd64
OTP 26 tests for 1.15
use OTP_VERSION tag
baka
just 1.15
Massive deps update
Update locale, deps
Mix format
shell????
multiline???
?
max cases 1
use assert_recieve
don't put_env in async tests
don't async conn/fs tests
mix format
FIx some uploader issues
Fix tests
129 lines
3.6 KiB
Elixir
129 lines
3.6 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.Plugs.OAuthPlugTest do
|
|
use Pleroma.Web.ConnCase, async: false
|
|
|
|
alias Pleroma.Helpers.AuthHelper
|
|
alias Pleroma.Web.OAuth.Token
|
|
alias Pleroma.Web.OAuth.Token.Strategy.Revoke
|
|
alias Pleroma.Web.Plugs.OAuthPlug
|
|
alias Plug.Session
|
|
|
|
import Pleroma.Factory
|
|
|
|
setup %{conn: conn} do
|
|
user = insert(:user)
|
|
{:ok, oauth_token} = Token.create(insert(:oauth_app), user)
|
|
%{user: user, token: oauth_token, conn: conn}
|
|
end
|
|
|
|
test "it does nothing if a user is assigned", %{conn: conn} do
|
|
conn = assign(conn, :user, %Pleroma.User{})
|
|
ret_conn = OAuthPlug.call(conn, %{})
|
|
|
|
assert ret_conn == conn
|
|
end
|
|
|
|
test "with valid token (uppercase) in auth header, it assigns the user", %{conn: conn} = opts do
|
|
conn =
|
|
conn
|
|
|> put_req_header("authorization", "BEARER #{opts[:token].token}")
|
|
|> OAuthPlug.call(%{})
|
|
|
|
assert conn.assigns[:user] == opts[:user]
|
|
end
|
|
|
|
test "with valid token (downcase) in auth header, it assigns the user", %{conn: conn} = opts do
|
|
conn =
|
|
conn
|
|
|> put_req_header("authorization", "bearer #{opts[:token].token}")
|
|
|> OAuthPlug.call(%{})
|
|
|
|
assert conn.assigns[:user] == opts[:user]
|
|
end
|
|
|
|
test "with valid token (downcase) in url parameters, it assigns the user", opts do
|
|
conn =
|
|
:get
|
|
|> build_conn("/?access_token=#{opts[:token].token}")
|
|
|> put_req_header("content-type", "application/json")
|
|
|> fetch_query_params()
|
|
|> OAuthPlug.call(%{})
|
|
|
|
assert conn.assigns[:user] == opts[:user]
|
|
end
|
|
|
|
test "with valid token (downcase) in body parameters, it assigns the user", opts do
|
|
conn =
|
|
:post
|
|
|> build_conn("/api/v1/statuses", access_token: opts[:token].token, status: "test")
|
|
|> OAuthPlug.call(%{})
|
|
|
|
assert conn.assigns[:user] == opts[:user]
|
|
end
|
|
|
|
test "with invalid token, it does not assign the user", %{conn: conn} do
|
|
conn =
|
|
conn
|
|
|> put_req_header("authorization", "bearer TTTTT")
|
|
|> OAuthPlug.call(%{})
|
|
|
|
refute conn.assigns[:user]
|
|
end
|
|
|
|
describe "with :oauth_token in session, " do
|
|
setup %{token: oauth_token, conn: conn} do
|
|
session_opts = [
|
|
store: :cookie,
|
|
key: "_test",
|
|
signing_salt: "cooldude"
|
|
]
|
|
|
|
conn =
|
|
conn
|
|
|> Session.call(Session.init(session_opts))
|
|
|> fetch_session()
|
|
|> AuthHelper.put_session_token(oauth_token.token)
|
|
|
|
%{conn: conn}
|
|
end
|
|
|
|
test "if session-stored token matches a valid OAuth token, assigns :user and :token", %{
|
|
conn: conn,
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
conn = OAuthPlug.call(conn, %{})
|
|
|
|
assert conn.assigns.user && conn.assigns.user.id == user.id
|
|
assert conn.assigns.token && conn.assigns.token.id == oauth_token.id
|
|
end
|
|
|
|
test "if session-stored token matches an expired OAuth token, does nothing", %{
|
|
conn: conn,
|
|
token: oauth_token
|
|
} do
|
|
expired_valid_until = NaiveDateTime.add(NaiveDateTime.utc_now(), -3600 * 24, :second)
|
|
|
|
oauth_token
|
|
|> Ecto.Changeset.change(valid_until: expired_valid_until)
|
|
|> Pleroma.Repo.update()
|
|
|
|
ret_conn = OAuthPlug.call(conn, %{})
|
|
assert ret_conn == conn
|
|
end
|
|
|
|
test "if session-stored token matches a revoked OAuth token, does nothing", %{
|
|
conn: conn,
|
|
token: oauth_token
|
|
} do
|
|
Revoke.revoke(oauth_token)
|
|
|
|
ret_conn = OAuthPlug.call(conn, %{})
|
|
assert ret_conn == conn
|
|
end
|
|
end
|
|
end
|