123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271 |
- # frozen_string_literal: true
- require 'rails_helper'
- RSpec.describe 'Using OAuth from an external app' do
- include ProfileStories
- subject { visit "/oauth/authorize?#{params.to_query}" }
- let(:client_app) { Doorkeeper::Application.create!(name: 'test', redirect_uri: about_url(host: Rails.application.config.x.local_domain), scopes: 'read') }
- let(:params) do
- { client_id: client_app.uid, response_type: 'code', redirect_uri: client_app.redirect_uri, scope: 'read' }
- end
- context 'when the user is already logged in' do
- let!(:user) { Fabricate(:user) }
- before do
- visit new_user_session_path
- fill_in_auth_details(user.email, user.password)
- end
- it 'when accepting the authorization request' do
- subject
- # It presents the user with an authorization page
- expect(page).to have_content(oauth_authorize_text)
- # It grants the app access to the account
- expect { click_on oauth_authorize_text }
- .to change { user_has_grant_with_client_app? }.to(true)
- # Upon authorizing, it redirects to the apps' callback URL
- expect(page).to redirect_to_callback_url
- end
- it 'when rejecting the authorization request' do
- subject
- # It presents the user with an authorization page
- expect(page).to have_content(oauth_deny_text)
- # It does not grant the app access to the account
- expect { click_on oauth_deny_text }
- .to_not change { user_has_grant_with_client_app? }.from(false)
- # Upon denying, it redirects to the apps' callback URL
- expect(page).to redirect_to_callback_url
- end
- # The tests in this context ensures that requests without PKCE parameters
- # still work; In the future we likely want to force usage of PKCE for
- # security reasons, as per:
- #
- # https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-27.html#section-2.1.1-9
- context 'when not using PKCE' do
- it 'does not include the PKCE values in the hidden inputs' do
- subject
- code_challenge_inputs = all('.oauth-prompt input[name=code_challenge]', visible: false)
- code_challenge_method_inputs = all('.oauth-prompt input[name=code_challenge_method]', visible: false)
- expect(code_challenge_inputs).to_not be_empty
- expect(code_challenge_method_inputs).to_not be_empty
- (code_challenge_inputs.to_a + code_challenge_method_inputs.to_a).each do |input|
- expect(input.value).to be_nil
- end
- end
- end
- context 'when using PKCE' do
- let(:params) do
- { client_id: client_app.uid, response_type: 'code', redirect_uri: client_app.redirect_uri, scope: 'read', code_challenge_method: pkce_code_challenge_method, code_challenge: pkce_code_challenge }
- end
- let(:pkce_code_challenge) { SecureRandom.hex(32) }
- let(:pkce_code_challenge_method) { 'S256' }
- context 'when using S256 code challenge method' do
- it 'includes the PKCE values in the hidden inputs' do
- subject
- code_challenge_inputs = all('.oauth-prompt input[name=code_challenge]', visible: false)
- code_challenge_method_inputs = all('.oauth-prompt input[name=code_challenge_method]', visible: false)
- expect(code_challenge_inputs).to_not be_empty
- expect(code_challenge_method_inputs).to_not be_empty
- code_challenge_inputs.each do |input|
- expect(input.value).to eq pkce_code_challenge
- end
- code_challenge_method_inputs.each do |input|
- expect(input.value).to eq pkce_code_challenge_method
- end
- end
- end
- context 'when using plain code challenge method' do
- let(:pkce_code_challenge_method) { 'plain' }
- it 'does not include the PKCE values in the response' do
- subject
- expect(page).to have_no_css('.oauth-prompt input[name=code_challenge]')
- expect(page).to have_no_css('.oauth-prompt input[name=code_challenge_method]')
- end
- it 'does not include the authorize button' do
- subject
- expect(page).to have_no_css('.oauth-prompt button[type="submit"]')
- end
- it 'includes an error message' do
- subject
- within '.form-container .flash-message' do
- expect(page).to have_content(I18n.t('doorkeeper.errors.messages.invalid_code_challenge_method'))
- end
- end
- end
- end
- end
- context 'when the user is not already logged in' do
- let(:email) { 'test@example.com' }
- let(:password) { 'testpassword' }
- let(:user) { Fabricate(:user, email: email, password: password) }
- before do
- user.mark_email_as_confirmed!
- user.approve!
- end
- it 'when accepting the authorization request' do
- visit "/oauth/authorize?#{params.to_query}"
- # It presents the user with a log-in page
- expect(page).to have_content(I18n.t('auth.login'))
- # Failing to log-in presents the form again
- fill_in_auth_details(email, 'wrong password')
- expect(page).to have_content(I18n.t('auth.login'))
- # Logging in redirects to an authorization page
- fill_in_auth_details(email, password)
- expect(page).to have_content(oauth_authorize_text)
- # It grants the app access to the account
- expect { click_on oauth_authorize_text }
- .to change { user_has_grant_with_client_app? }.to(true)
- # Upon authorizing, it redirects to the apps' callback URL
- expect(page).to redirect_to_callback_url
- end
- it 'when rejecting the authorization request' do
- visit "/oauth/authorize?#{params.to_query}"
- # It presents the user with a log-in page
- expect(page).to have_content(I18n.t('auth.login'))
- # Failing to log-in presents the form again
- fill_in_auth_details(email, 'wrong password')
- expect(page).to have_content(I18n.t('auth.login'))
- # Logging in redirects to an authorization page
- fill_in_auth_details(email, password)
- expect(page).to have_content(oauth_authorize_text)
- # It does not grant the app access to the account
- expect { click_on oauth_deny_text }
- .to_not change { user_has_grant_with_client_app? }.from(false)
- # Upon denying, it redirects to the apps' callback URL
- expect(page).to redirect_to_callback_url
- end
- context 'when the user has set up TOTP' do
- let(:user) { Fabricate(:user, email: email, password: password, otp_required_for_login: true, otp_secret: User.generate_otp_secret) }
- it 'when accepting the authorization request' do
- visit "/oauth/authorize?#{params.to_query}"
- # It presents the user with a log-in page
- expect(page).to have_content(I18n.t('auth.login'))
- # Failing to log-in presents the form again
- fill_in_auth_details(email, 'wrong password')
- expect(page).to have_content(I18n.t('auth.login'))
- # Logging in redirects to a two-factor authentication page
- fill_in_auth_details(email, password)
- expect(page).to have_content(I18n.t('simple_form.hints.sessions.otp'))
- # Filling in an incorrect two-factor authentication code presents the form again
- fill_in_otp_details('wrong')
- expect(page).to have_content(I18n.t('simple_form.hints.sessions.otp'))
- # Filling in the correct TOTP code redirects to an app authorization page
- fill_in_otp_details(user.current_otp)
- expect(page).to have_content(oauth_authorize_text)
- # It grants the app access to the account
- expect { click_on oauth_authorize_text }
- .to change { user_has_grant_with_client_app? }.to(true)
- # Upon authorizing, it redirects to the apps' callback URL
- expect(page).to redirect_to_callback_url
- end
- it 'when rejecting the authorization request' do
- visit "/oauth/authorize?#{params.to_query}"
- # It presents the user with a log-in page
- expect(page).to have_content(I18n.t('auth.login'))
- # Failing to log-in presents the form again
- fill_in_auth_details(email, 'wrong password')
- expect(page).to have_content(I18n.t('auth.login'))
- # Logging in redirects to a two-factor authentication page
- fill_in_auth_details(email, password)
- expect(page).to have_content(I18n.t('simple_form.hints.sessions.otp'))
- # Filling in an incorrect two-factor authentication code presents the form again
- fill_in_otp_details('wrong')
- expect(page).to have_content(I18n.t('simple_form.hints.sessions.otp'))
- # Filling in the correct TOTP code redirects to an app authorization page
- fill_in_otp_details(user.current_otp)
- expect(page).to have_content(oauth_authorize_text)
- # It does not grant the app access to the account
- expect { click_on oauth_deny_text }
- .to_not change { user_has_grant_with_client_app? }.from(false)
- # Upon denying, it redirects to the apps' callback URL
- expect(page).to redirect_to_callback_url
- end
- end
- # TODO: external auth
- end
- private
- def fill_in_otp_details(value)
- fill_in 'user_otp_attempt', with: value
- click_on I18n.t('auth.login')
- end
- def oauth_authorize_text
- I18n.t('doorkeeper.authorizations.buttons.authorize')
- end
- def oauth_deny_text
- I18n.t('doorkeeper.authorizations.buttons.deny')
- end
- def redirect_to_callback_url
- have_current_path(/\A#{client_app.redirect_uri}/, url: true)
- end
- def user_has_grant_with_client_app?
- Doorkeeper::AccessGrant
- .exists?(
- application: client_app,
- resource_owner_id: user.id
- )
- end
- end
|