mirror of
https://github.com/mastodon/mastodon.git
synced 2025-09-05 17:31:12 +00:00
95 lines
3.2 KiB
Ruby
95 lines
3.2 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'rails_helper'
|
|
|
|
RSpec.configure do |config|
|
|
config.include Devise::Test::IntegrationHelpers, type: :request
|
|
end
|
|
|
|
RSpec.describe 'GET /magic' do
|
|
let(:user) { Fabricate(:user) }
|
|
let(:token) { SecureRandom.hex(32) }
|
|
|
|
owa_magic_dest_nok = 'https://invalid.owas.testing.net'
|
|
owa_magic_dest_ok = 'https://valid.owas.testing.net'
|
|
|
|
# mock an encrypted token that can be decrypted by the user
|
|
def owa_magic_encrypt_token
|
|
public_key = OpenSSL::PKey.read(user.account.public_key)
|
|
Base64.urlsafe_encode64(public_key.public_encrypt(token))
|
|
end
|
|
|
|
endp = '/magic'
|
|
owa_endp = "#{endp}?owa=1"
|
|
owa_dest_nok_endp = "#{owa_endp}&dest=#{owa_magic_dest_nok}"
|
|
bdest_nok = owa_magic_dest_nok.unpack1('H*')
|
|
owa_bdest_nok_endp = "#{owa_endp}&bdest=#{bdest_nok}"
|
|
|
|
before do
|
|
# HTTP OK response, success = true, correct token provided
|
|
stub_request(:post, "#{owa_magic_dest_ok}/owa")
|
|
.to_return({ body: { 'success' => true, 'encrypted_token' => owa_magic_encrypt_token }.to_json.to_s })
|
|
end
|
|
|
|
it 'redirects to sign in when no user is signed in' do
|
|
get owa_dest_nok_endp
|
|
expect(response).to redirect_to('/auth/sign_in')
|
|
end
|
|
|
|
it 'falls through to destination in case of invalid response received from OpenWebAuth server' do
|
|
stub_request(:post, "#{owa_magic_dest_nok}/owa").
|
|
# run1: no HTTP OK status
|
|
to_return({ status: 404 }).then.
|
|
# run2: success = false
|
|
to_return({ body: { 'success' => false }.to_json.to_s }).
|
|
# run3: success = true, but no token provided
|
|
to_return({ body: { 'success' => true }.to_json.to_s }).
|
|
# run4: success = true, wrong token provided
|
|
to_return({ body: { 'success' => true, 'encrypted_token' => 'LALA' }.to_json.to_s })
|
|
|
|
sign_in user
|
|
|
|
# run1: no HTTP OK status
|
|
get owa_dest_nok_endp
|
|
expect(response).to have_http_status(302)
|
|
expect(response).to redirect_to(owa_magic_dest_nok)
|
|
|
|
# run2: success = false
|
|
get owa_dest_nok_endp
|
|
expect(response).to have_http_status(302)
|
|
expect(response).to redirect_to(owa_magic_dest_nok)
|
|
|
|
# run3: success = true, but no token provided
|
|
get owa_bdest_nok_endp
|
|
expect(response).to have_http_status(302)
|
|
expect(response).to redirect_to(owa_magic_dest_nok)
|
|
|
|
# run4: success = true, invalid token provided
|
|
get owa_bdest_nok_endp
|
|
expect(response).to have_http_status(302)
|
|
expect(response).to redirect_to(owa_magic_dest_nok)
|
|
end
|
|
|
|
# Happy case testing - destination is a working OpenWebAuth server
|
|
owa_dest_ok_endp = "#{owa_endp}&dest=#{owa_magic_dest_ok}"
|
|
bdest_ok = owa_magic_dest_ok.unpack1('H*')
|
|
owa_bdest_ok_endp = "#{owa_endp}&bdest=#{bdest_ok}"
|
|
def generate_args
|
|
"?f=&owt=#{token}"
|
|
end
|
|
|
|
it 'returns a remotely authenticated redirect to the destination when using dest parameter' do
|
|
sign_in user
|
|
get owa_dest_ok_endp
|
|
expect(response).to have_http_status(302)
|
|
expect(response).to redirect_to("#{owa_magic_dest_ok}#{generate_args}")
|
|
end
|
|
|
|
it 'returns a remotely authenticated redirect to the destination when using hex encoded dest parameter' do
|
|
sign_in user
|
|
get owa_bdest_ok_endp
|
|
expect(response).to have_http_status(302)
|
|
expect(response).to redirect_to("#{owa_magic_dest_ok}#{generate_args}")
|
|
end
|
|
end
|