You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

oauth2_application_test.go 7.9KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package models
  5. import (
  6. "testing"
  7. "github.com/stretchr/testify/assert"
  8. )
  9. //////////////////// Application
  10. func TestOAuth2Application_GenerateClientSecret(t *testing.T) {
  11. assert.NoError(t, PrepareTestDatabase())
  12. app := AssertExistsAndLoadBean(t, &OAuth2Application{ID: 1}).(*OAuth2Application)
  13. secret, err := app.GenerateClientSecret()
  14. assert.NoError(t, err)
  15. assert.True(t, len(secret) > 0)
  16. AssertExistsAndLoadBean(t, &OAuth2Application{ID: 1, ClientSecret: app.ClientSecret})
  17. }
  18. func BenchmarkOAuth2Application_GenerateClientSecret(b *testing.B) {
  19. assert.NoError(b, PrepareTestDatabase())
  20. app := AssertExistsAndLoadBean(b, &OAuth2Application{ID: 1}).(*OAuth2Application)
  21. for i := 0; i < b.N; i++ {
  22. _, _ = app.GenerateClientSecret()
  23. }
  24. }
  25. func TestOAuth2Application_ContainsRedirectURI(t *testing.T) {
  26. app := &OAuth2Application{
  27. RedirectURIs: []string{"a", "b", "c"},
  28. }
  29. assert.True(t, app.ContainsRedirectURI("a"))
  30. assert.True(t, app.ContainsRedirectURI("b"))
  31. assert.True(t, app.ContainsRedirectURI("c"))
  32. assert.False(t, app.ContainsRedirectURI("d"))
  33. }
  34. func TestOAuth2Application_ValidateClientSecret(t *testing.T) {
  35. assert.NoError(t, PrepareTestDatabase())
  36. app := AssertExistsAndLoadBean(t, &OAuth2Application{ID: 1}).(*OAuth2Application)
  37. secret, err := app.GenerateClientSecret()
  38. assert.NoError(t, err)
  39. assert.True(t, app.ValidateClientSecret([]byte(secret)))
  40. assert.False(t, app.ValidateClientSecret([]byte("fewijfowejgfiowjeoifew")))
  41. }
  42. func TestGetOAuth2ApplicationByClientID(t *testing.T) {
  43. assert.NoError(t, PrepareTestDatabase())
  44. app, err := GetOAuth2ApplicationByClientID("da7da3ba-9a13-4167-856f-3899de0b0138")
  45. assert.NoError(t, err)
  46. assert.Equal(t, "da7da3ba-9a13-4167-856f-3899de0b0138", app.ClientID)
  47. app, err = GetOAuth2ApplicationByClientID("invalid client id")
  48. assert.Error(t, err)
  49. assert.Nil(t, app)
  50. }
  51. func TestCreateOAuth2Application(t *testing.T) {
  52. assert.NoError(t, PrepareTestDatabase())
  53. app, err := CreateOAuth2Application(CreateOAuth2ApplicationOptions{Name: "newapp", UserID: 1})
  54. assert.NoError(t, err)
  55. assert.Equal(t, "newapp", app.Name)
  56. assert.Len(t, app.ClientID, 36)
  57. AssertExistsAndLoadBean(t, &OAuth2Application{Name: "newapp"})
  58. }
  59. func TestOAuth2Application_LoadUser(t *testing.T) {
  60. assert.NoError(t, PrepareTestDatabase())
  61. app := AssertExistsAndLoadBean(t, &OAuth2Application{ID: 1}).(*OAuth2Application)
  62. assert.NoError(t, app.LoadUser())
  63. assert.NotNil(t, app.User)
  64. }
  65. func TestOAuth2Application_TableName(t *testing.T) {
  66. assert.Equal(t, "oauth2_application", new(OAuth2Application).TableName())
  67. }
  68. func TestOAuth2Application_GetGrantByUserID(t *testing.T) {
  69. assert.NoError(t, PrepareTestDatabase())
  70. app := AssertExistsAndLoadBean(t, &OAuth2Application{ID: 1}).(*OAuth2Application)
  71. grant, err := app.GetGrantByUserID(1)
  72. assert.NoError(t, err)
  73. assert.Equal(t, int64(1), grant.UserID)
  74. grant, err = app.GetGrantByUserID(34923458)
  75. assert.NoError(t, err)
  76. assert.Nil(t, grant)
  77. }
  78. func TestOAuth2Application_CreateGrant(t *testing.T) {
  79. assert.NoError(t, PrepareTestDatabase())
  80. app := AssertExistsAndLoadBean(t, &OAuth2Application{ID: 1}).(*OAuth2Application)
  81. grant, err := app.CreateGrant(2, "")
  82. assert.NoError(t, err)
  83. assert.NotNil(t, grant)
  84. assert.Equal(t, int64(2), grant.UserID)
  85. assert.Equal(t, int64(1), grant.ApplicationID)
  86. assert.Equal(t, "", grant.Scope)
  87. }
  88. //////////////////// Grant
  89. func TestGetOAuth2GrantByID(t *testing.T) {
  90. assert.NoError(t, PrepareTestDatabase())
  91. grant, err := GetOAuth2GrantByID(1)
  92. assert.NoError(t, err)
  93. assert.Equal(t, int64(1), grant.ID)
  94. grant, err = GetOAuth2GrantByID(34923458)
  95. assert.NoError(t, err)
  96. assert.Nil(t, grant)
  97. }
  98. func TestOAuth2Grant_IncreaseCounter(t *testing.T) {
  99. assert.NoError(t, PrepareTestDatabase())
  100. grant := AssertExistsAndLoadBean(t, &OAuth2Grant{ID: 1, Counter: 1}).(*OAuth2Grant)
  101. assert.NoError(t, grant.IncreaseCounter())
  102. assert.Equal(t, int64(2), grant.Counter)
  103. AssertExistsAndLoadBean(t, &OAuth2Grant{ID: 1, Counter: 2})
  104. }
  105. func TestOAuth2Grant_ScopeContains(t *testing.T) {
  106. assert.NoError(t, PrepareTestDatabase())
  107. grant := AssertExistsAndLoadBean(t, &OAuth2Grant{ID: 1, Scope: "openid profile"}).(*OAuth2Grant)
  108. assert.True(t, grant.ScopeContains("openid"))
  109. assert.True(t, grant.ScopeContains("profile"))
  110. assert.False(t, grant.ScopeContains("profil"))
  111. assert.False(t, grant.ScopeContains("profile2"))
  112. }
  113. func TestOAuth2Grant_GenerateNewAuthorizationCode(t *testing.T) {
  114. assert.NoError(t, PrepareTestDatabase())
  115. grant := AssertExistsAndLoadBean(t, &OAuth2Grant{ID: 1}).(*OAuth2Grant)
  116. code, err := grant.GenerateNewAuthorizationCode("https://example2.com/callback", "CjvyTLSdR47G5zYenDA-eDWW4lRrO8yvjcWwbD_deOg", "S256")
  117. assert.NoError(t, err)
  118. assert.NotNil(t, code)
  119. assert.True(t, len(code.Code) > 32) // secret length > 32
  120. }
  121. func TestOAuth2Grant_TableName(t *testing.T) {
  122. assert.Equal(t, "oauth2_grant", new(OAuth2Grant).TableName())
  123. }
  124. func TestGetOAuth2GrantsByUserID(t *testing.T) {
  125. assert.NoError(t, PrepareTestDatabase())
  126. result, err := GetOAuth2GrantsByUserID(1)
  127. assert.NoError(t, err)
  128. assert.Len(t, result, 1)
  129. assert.Equal(t, int64(1), result[0].ID)
  130. assert.Equal(t, result[0].ApplicationID, result[0].Application.ID)
  131. result, err = GetOAuth2GrantsByUserID(34134)
  132. assert.NoError(t, err)
  133. assert.Empty(t, result)
  134. }
  135. func TestRevokeOAuth2Grant(t *testing.T) {
  136. assert.NoError(t, PrepareTestDatabase())
  137. assert.NoError(t, RevokeOAuth2Grant(1, 1))
  138. AssertNotExistsBean(t, &OAuth2Grant{ID: 1, UserID: 1})
  139. }
  140. //////////////////// Authorization Code
  141. func TestGetOAuth2AuthorizationByCode(t *testing.T) {
  142. assert.NoError(t, PrepareTestDatabase())
  143. code, err := GetOAuth2AuthorizationByCode("authcode")
  144. assert.NoError(t, err)
  145. assert.NotNil(t, code)
  146. assert.Equal(t, "authcode", code.Code)
  147. assert.Equal(t, int64(1), code.ID)
  148. code, err = GetOAuth2AuthorizationByCode("does not exist")
  149. assert.NoError(t, err)
  150. assert.Nil(t, code)
  151. }
  152. func TestOAuth2AuthorizationCode_ValidateCodeChallenge(t *testing.T) {
  153. // test plain
  154. code := &OAuth2AuthorizationCode{
  155. CodeChallengeMethod: "plain",
  156. CodeChallenge: "test123",
  157. }
  158. assert.True(t, code.ValidateCodeChallenge("test123"))
  159. assert.False(t, code.ValidateCodeChallenge("ierwgjoergjio"))
  160. // test S256
  161. code = &OAuth2AuthorizationCode{
  162. CodeChallengeMethod: "S256",
  163. CodeChallenge: "CjvyTLSdR47G5zYenDA-eDWW4lRrO8yvjcWwbD_deOg",
  164. }
  165. assert.True(t, code.ValidateCodeChallenge("N1Zo9-8Rfwhkt68r1r29ty8YwIraXR8eh_1Qwxg7yQXsonBt"))
  166. assert.False(t, code.ValidateCodeChallenge("wiogjerogorewngoenrgoiuenorg"))
  167. // test unknown
  168. code = &OAuth2AuthorizationCode{
  169. CodeChallengeMethod: "monkey",
  170. CodeChallenge: "foiwgjioriogeiogjerger",
  171. }
  172. assert.False(t, code.ValidateCodeChallenge("foiwgjioriogeiogjerger"))
  173. // test no code challenge
  174. code = &OAuth2AuthorizationCode{
  175. CodeChallengeMethod: "",
  176. CodeChallenge: "foierjiogerogerg",
  177. }
  178. assert.True(t, code.ValidateCodeChallenge(""))
  179. }
  180. func TestOAuth2AuthorizationCode_GenerateRedirectURI(t *testing.T) {
  181. code := &OAuth2AuthorizationCode{
  182. RedirectURI: "https://example.com/callback",
  183. Code: "thecode",
  184. }
  185. redirect, err := code.GenerateRedirectURI("thestate")
  186. assert.NoError(t, err)
  187. assert.Equal(t, redirect.String(), "https://example.com/callback?code=thecode&state=thestate")
  188. redirect, err = code.GenerateRedirectURI("")
  189. assert.NoError(t, err)
  190. assert.Equal(t, redirect.String(), "https://example.com/callback?code=thecode")
  191. }
  192. func TestOAuth2AuthorizationCode_Invalidate(t *testing.T) {
  193. assert.NoError(t, PrepareTestDatabase())
  194. code := AssertExistsAndLoadBean(t, &OAuth2AuthorizationCode{Code: "authcode"}).(*OAuth2AuthorizationCode)
  195. assert.NoError(t, code.Invalidate())
  196. AssertNotExistsBean(t, &OAuth2AuthorizationCode{Code: "authcode"})
  197. }
  198. func TestOAuth2AuthorizationCode_TableName(t *testing.T) {
  199. assert.Equal(t, "oauth2_authorization_code", new(OAuth2AuthorizationCode).TableName())
  200. }