mirror of https://github.com/go-gitea/gitea.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
175 lines
5.7 KiB
175 lines
5.7 KiB
// Copyright 2020 The Gitea Authors. All rights reserved. |
|
// SPDX-License-Identifier: MIT |
|
|
|
package integration |
|
|
|
import ( |
|
"fmt" |
|
"net/http" |
|
"testing" |
|
|
|
auth_model "code.gitea.io/gitea/models/auth" |
|
"code.gitea.io/gitea/models/unittest" |
|
user_model "code.gitea.io/gitea/models/user" |
|
api "code.gitea.io/gitea/modules/structs" |
|
"code.gitea.io/gitea/tests" |
|
|
|
"github.com/stretchr/testify/assert" |
|
) |
|
|
|
func TestOAuth2Application(t *testing.T) { |
|
defer tests.PrepareTestEnv(t)() |
|
testAPICreateOAuth2Application(t) |
|
testAPIListOAuth2Applications(t) |
|
testAPIGetOAuth2Application(t) |
|
testAPIUpdateOAuth2Application(t) |
|
testAPIDeleteOAuth2Application(t) |
|
} |
|
|
|
func testAPICreateOAuth2Application(t *testing.T) { |
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) |
|
appBody := api.CreateOAuth2ApplicationOptions{ |
|
Name: "test-app-1", |
|
RedirectURIs: []string{ |
|
"http://www.google.com", |
|
}, |
|
ConfidentialClient: true, |
|
} |
|
|
|
req := NewRequestWithJSON(t, "POST", "/api/v1/user/applications/oauth2", &appBody). |
|
AddBasicAuth(user.Name) |
|
resp := MakeRequest(t, req, http.StatusCreated) |
|
|
|
var createdApp *api.OAuth2Application |
|
DecodeJSON(t, resp, &createdApp) |
|
|
|
assert.Equal(t, appBody.Name, createdApp.Name) |
|
assert.Len(t, createdApp.ClientSecret, 56) |
|
assert.Len(t, createdApp.ClientID, 36) |
|
assert.True(t, createdApp.ConfidentialClient) |
|
assert.NotEmpty(t, createdApp.Created) |
|
assert.Equal(t, appBody.RedirectURIs[0], createdApp.RedirectURIs[0]) |
|
unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{UID: user.ID, Name: createdApp.Name}) |
|
} |
|
|
|
func testAPIListOAuth2Applications(t *testing.T) { |
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) |
|
session := loginUser(t, user.Name) |
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadUser) |
|
|
|
existApp := unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{ |
|
UID: user.ID, |
|
Name: "test-app-1", |
|
RedirectURIs: []string{ |
|
"http://www.google.com", |
|
}, |
|
ConfidentialClient: true, |
|
}) |
|
|
|
req := NewRequest(t, "GET", "/api/v1/user/applications/oauth2"). |
|
AddTokenAuth(token) |
|
resp := MakeRequest(t, req, http.StatusOK) |
|
|
|
var appList api.OAuth2ApplicationList |
|
DecodeJSON(t, resp, &appList) |
|
expectedApp := appList[0] |
|
|
|
assert.Equal(t, expectedApp.Name, existApp.Name) |
|
assert.Equal(t, expectedApp.ClientID, existApp.ClientID) |
|
assert.Equal(t, expectedApp.ConfidentialClient, existApp.ConfidentialClient) |
|
assert.Len(t, expectedApp.ClientID, 36) |
|
assert.Empty(t, expectedApp.ClientSecret) |
|
assert.Equal(t, existApp.RedirectURIs[0], expectedApp.RedirectURIs[0]) |
|
unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{ID: expectedApp.ID, Name: expectedApp.Name}) |
|
} |
|
|
|
func testAPIDeleteOAuth2Application(t *testing.T) { |
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) |
|
session := loginUser(t, user.Name) |
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteUser) |
|
|
|
oldApp := unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{ |
|
UID: user.ID, |
|
Name: "test-app-1", |
|
}) |
|
|
|
urlStr := fmt.Sprintf("/api/v1/user/applications/oauth2/%d", oldApp.ID) |
|
req := NewRequest(t, "DELETE", urlStr). |
|
AddTokenAuth(token) |
|
MakeRequest(t, req, http.StatusNoContent) |
|
|
|
unittest.AssertNotExistsBean(t, &auth_model.OAuth2Application{UID: oldApp.UID, Name: oldApp.Name}) |
|
|
|
// Delete again will return not found |
|
req = NewRequest(t, "DELETE", urlStr). |
|
AddTokenAuth(token) |
|
MakeRequest(t, req, http.StatusNotFound) |
|
} |
|
|
|
func testAPIGetOAuth2Application(t *testing.T) { |
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) |
|
session := loginUser(t, user.Name) |
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadUser) |
|
|
|
existApp := unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{ |
|
UID: user.ID, |
|
Name: "test-app-1", |
|
RedirectURIs: []string{ |
|
"http://www.google.com", |
|
}, |
|
ConfidentialClient: true, |
|
}) |
|
|
|
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/user/applications/oauth2/%d", existApp.ID)). |
|
AddTokenAuth(token) |
|
resp := MakeRequest(t, req, http.StatusOK) |
|
|
|
var app api.OAuth2Application |
|
DecodeJSON(t, resp, &app) |
|
expectedApp := app |
|
|
|
assert.Equal(t, expectedApp.Name, existApp.Name) |
|
assert.Equal(t, expectedApp.ClientID, existApp.ClientID) |
|
assert.Equal(t, expectedApp.ConfidentialClient, existApp.ConfidentialClient) |
|
assert.Len(t, expectedApp.ClientID, 36) |
|
assert.Empty(t, expectedApp.ClientSecret) |
|
assert.Len(t, expectedApp.RedirectURIs, 1) |
|
assert.Equal(t, expectedApp.RedirectURIs[0], existApp.RedirectURIs[0]) |
|
unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{ID: expectedApp.ID, Name: expectedApp.Name}) |
|
} |
|
|
|
func testAPIUpdateOAuth2Application(t *testing.T) { |
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) |
|
|
|
existApp := unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{ |
|
UID: user.ID, |
|
Name: "test-app-1", |
|
RedirectURIs: []string{ |
|
"http://www.google.com", |
|
}, |
|
}) |
|
|
|
appBody := api.CreateOAuth2ApplicationOptions{ |
|
Name: "test-app-1", |
|
RedirectURIs: []string{ |
|
"http://www.google.com/", |
|
"http://www.github.com/", |
|
}, |
|
ConfidentialClient: true, |
|
} |
|
|
|
urlStr := fmt.Sprintf("/api/v1/user/applications/oauth2/%d", existApp.ID) |
|
req := NewRequestWithJSON(t, "PATCH", urlStr, &appBody). |
|
AddBasicAuth(user.Name) |
|
resp := MakeRequest(t, req, http.StatusOK) |
|
|
|
var app api.OAuth2Application |
|
DecodeJSON(t, resp, &app) |
|
expectedApp := app |
|
|
|
assert.Len(t, expectedApp.RedirectURIs, 2) |
|
assert.Equal(t, expectedApp.RedirectURIs[0], appBody.RedirectURIs[0]) |
|
assert.Equal(t, expectedApp.RedirectURIs[1], appBody.RedirectURIs[1]) |
|
assert.Equal(t, expectedApp.ConfidentialClient, appBody.ConfidentialClient) |
|
unittest.AssertExistsAndLoadBean(t, &auth_model.OAuth2Application{ID: expectedApp.ID, Name: expectedApp.Name}) |
|
}
|
|
|