2020-02-29 07:19:32 +01:00
|
|
|
// Copyright 2020 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.package models
|
|
|
|
|
2022-09-02 21:18:23 +02:00
|
|
|
package integration
|
2020-02-29 07:19:32 +01:00
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"testing"
|
|
|
|
|
2022-01-02 14:12:35 +01:00
|
|
|
"code.gitea.io/gitea/models/auth"
|
2021-11-16 09:53:21 +01:00
|
|
|
"code.gitea.io/gitea/models/unittest"
|
2021-11-24 10:49:20 +01:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2020-02-29 07:19:32 +01:00
|
|
|
api "code.gitea.io/gitea/modules/structs"
|
2022-09-02 21:18:23 +02:00
|
|
|
"code.gitea.io/gitea/tests"
|
2020-02-29 07:19:32 +01:00
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestOAuth2Application(t *testing.T) {
|
2022-09-02 21:18:23 +02:00
|
|
|
defer tests.PrepareTestEnv(t)()
|
2020-02-29 07:19:32 +01:00
|
|
|
testAPICreateOAuth2Application(t)
|
|
|
|
testAPIListOAuth2Applications(t)
|
2020-04-10 02:37:31 +02:00
|
|
|
testAPIGetOAuth2Application(t)
|
|
|
|
testAPIUpdateOAuth2Application(t)
|
2020-02-29 07:19:32 +01:00
|
|
|
testAPIDeleteOAuth2Application(t)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testAPICreateOAuth2Application(t *testing.T) {
|
2022-08-16 04:22:25 +02:00
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
2020-02-29 07:19:32 +01:00
|
|
|
appBody := api.CreateOAuth2ApplicationOptions{
|
|
|
|
Name: "test-app-1",
|
|
|
|
RedirectURIs: []string{
|
|
|
|
"http://www.google.com",
|
|
|
|
},
|
2022-10-24 09:59:24 +02:00
|
|
|
ConfidentialClient: true,
|
2020-02-29 07:19:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
req := NewRequestWithJSON(t, "POST", "/api/v1/user/applications/oauth2", &appBody)
|
|
|
|
req = AddBasicAuthHeader(req, user.Name)
|
|
|
|
resp := MakeRequest(t, req, http.StatusCreated)
|
|
|
|
|
|
|
|
var createdApp *api.OAuth2Application
|
|
|
|
DecodeJSON(t, resp, &createdApp)
|
|
|
|
|
|
|
|
assert.EqualValues(t, appBody.Name, createdApp.Name)
|
2022-02-04 18:03:15 +01:00
|
|
|
assert.Len(t, createdApp.ClientSecret, 56)
|
2020-02-29 07:19:32 +01:00
|
|
|
assert.Len(t, createdApp.ClientID, 36)
|
2022-10-24 09:59:24 +02:00
|
|
|
assert.True(t, createdApp.ConfidentialClient)
|
2020-02-29 07:19:32 +01:00
|
|
|
assert.NotEmpty(t, createdApp.Created)
|
|
|
|
assert.EqualValues(t, appBody.RedirectURIs[0], createdApp.RedirectURIs[0])
|
2022-01-02 14:12:35 +01:00
|
|
|
unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{UID: user.ID, Name: createdApp.Name})
|
2020-02-29 07:19:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func testAPIListOAuth2Applications(t *testing.T) {
|
2022-08-16 04:22:25 +02:00
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
2020-02-29 07:19:32 +01:00
|
|
|
session := loginUser(t, user.Name)
|
|
|
|
token := getTokenForLoggedInUser(t, session)
|
|
|
|
|
2022-01-02 14:12:35 +01:00
|
|
|
existApp := unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{
|
2020-02-29 07:19:32 +01:00
|
|
|
UID: user.ID,
|
|
|
|
Name: "test-app-1",
|
|
|
|
RedirectURIs: []string{
|
|
|
|
"http://www.google.com",
|
|
|
|
},
|
2022-10-24 09:59:24 +02:00
|
|
|
ConfidentialClient: true,
|
2022-08-16 04:22:25 +02:00
|
|
|
})
|
2020-02-29 07:19:32 +01:00
|
|
|
|
|
|
|
urlStr := fmt.Sprintf("/api/v1/user/applications/oauth2?token=%s", token)
|
|
|
|
req := NewRequest(t, "GET", urlStr)
|
|
|
|
resp := session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
|
|
|
|
var appList api.OAuth2ApplicationList
|
|
|
|
DecodeJSON(t, resp, &appList)
|
|
|
|
expectedApp := appList[0]
|
|
|
|
|
|
|
|
assert.EqualValues(t, existApp.Name, expectedApp.Name)
|
|
|
|
assert.EqualValues(t, existApp.ClientID, expectedApp.ClientID)
|
2022-10-24 09:59:24 +02:00
|
|
|
assert.Equal(t, existApp.ConfidentialClient, expectedApp.ConfidentialClient)
|
2020-02-29 07:19:32 +01:00
|
|
|
assert.Len(t, expectedApp.ClientID, 36)
|
|
|
|
assert.Empty(t, expectedApp.ClientSecret)
|
|
|
|
assert.EqualValues(t, existApp.RedirectURIs[0], expectedApp.RedirectURIs[0])
|
2022-01-02 14:12:35 +01:00
|
|
|
unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{ID: expectedApp.ID, Name: expectedApp.Name})
|
2020-02-29 07:19:32 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func testAPIDeleteOAuth2Application(t *testing.T) {
|
2022-08-16 04:22:25 +02:00
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
2020-02-29 07:19:32 +01:00
|
|
|
session := loginUser(t, user.Name)
|
|
|
|
token := getTokenForLoggedInUser(t, session)
|
|
|
|
|
2022-01-02 14:12:35 +01:00
|
|
|
oldApp := unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{
|
2020-02-29 07:19:32 +01:00
|
|
|
UID: user.ID,
|
|
|
|
Name: "test-app-1",
|
2022-08-16 04:22:25 +02:00
|
|
|
})
|
2020-02-29 07:19:32 +01:00
|
|
|
|
|
|
|
urlStr := fmt.Sprintf("/api/v1/user/applications/oauth2/%d?token=%s", oldApp.ID, token)
|
|
|
|
req := NewRequest(t, "DELETE", urlStr)
|
|
|
|
session.MakeRequest(t, req, http.StatusNoContent)
|
|
|
|
|
2022-01-02 14:12:35 +01:00
|
|
|
unittest.AssertNotExistsBean(t, &auth.OAuth2Application{UID: oldApp.UID, Name: oldApp.Name})
|
2021-04-10 22:49:10 +02:00
|
|
|
|
|
|
|
// Delete again will return not found
|
|
|
|
req = NewRequest(t, "DELETE", urlStr)
|
|
|
|
session.MakeRequest(t, req, http.StatusNotFound)
|
2020-02-29 07:19:32 +01:00
|
|
|
}
|
2020-04-10 02:37:31 +02:00
|
|
|
|
|
|
|
func testAPIGetOAuth2Application(t *testing.T) {
|
2022-08-16 04:22:25 +02:00
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
2020-04-10 02:37:31 +02:00
|
|
|
session := loginUser(t, user.Name)
|
|
|
|
token := getTokenForLoggedInUser(t, session)
|
|
|
|
|
2022-01-02 14:12:35 +01:00
|
|
|
existApp := unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{
|
2020-04-10 02:37:31 +02:00
|
|
|
UID: user.ID,
|
|
|
|
Name: "test-app-1",
|
|
|
|
RedirectURIs: []string{
|
|
|
|
"http://www.google.com",
|
|
|
|
},
|
2022-10-24 09:59:24 +02:00
|
|
|
ConfidentialClient: true,
|
2022-08-16 04:22:25 +02:00
|
|
|
})
|
2020-04-10 02:37:31 +02:00
|
|
|
|
|
|
|
urlStr := fmt.Sprintf("/api/v1/user/applications/oauth2/%d?token=%s", existApp.ID, token)
|
|
|
|
req := NewRequest(t, "GET", urlStr)
|
|
|
|
resp := session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
|
|
|
|
var app api.OAuth2Application
|
|
|
|
DecodeJSON(t, resp, &app)
|
|
|
|
expectedApp := app
|
|
|
|
|
|
|
|
assert.EqualValues(t, existApp.Name, expectedApp.Name)
|
|
|
|
assert.EqualValues(t, existApp.ClientID, expectedApp.ClientID)
|
2022-10-24 09:59:24 +02:00
|
|
|
assert.Equal(t, existApp.ConfidentialClient, expectedApp.ConfidentialClient)
|
2020-04-10 02:37:31 +02:00
|
|
|
assert.Len(t, expectedApp.ClientID, 36)
|
|
|
|
assert.Empty(t, expectedApp.ClientSecret)
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Len(t, expectedApp.RedirectURIs, 1)
|
2020-04-10 02:37:31 +02:00
|
|
|
assert.EqualValues(t, existApp.RedirectURIs[0], expectedApp.RedirectURIs[0])
|
2022-01-02 14:12:35 +01:00
|
|
|
unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{ID: expectedApp.ID, Name: expectedApp.Name})
|
2020-04-10 02:37:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func testAPIUpdateOAuth2Application(t *testing.T) {
|
2022-08-16 04:22:25 +02:00
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
2020-04-10 02:37:31 +02:00
|
|
|
|
2022-01-02 14:12:35 +01:00
|
|
|
existApp := unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{
|
2020-04-10 02:37:31 +02:00
|
|
|
UID: user.ID,
|
|
|
|
Name: "test-app-1",
|
|
|
|
RedirectURIs: []string{
|
|
|
|
"http://www.google.com",
|
|
|
|
},
|
2022-08-16 04:22:25 +02:00
|
|
|
})
|
2020-04-10 02:37:31 +02:00
|
|
|
|
|
|
|
appBody := api.CreateOAuth2ApplicationOptions{
|
|
|
|
Name: "test-app-1",
|
|
|
|
RedirectURIs: []string{
|
|
|
|
"http://www.google.com/",
|
|
|
|
"http://www.github.com/",
|
|
|
|
},
|
2022-10-24 09:59:24 +02:00
|
|
|
ConfidentialClient: true,
|
2020-04-10 02:37:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
urlStr := fmt.Sprintf("/api/v1/user/applications/oauth2/%d", existApp.ID)
|
|
|
|
req := NewRequestWithJSON(t, "PATCH", urlStr, &appBody)
|
|
|
|
req = AddBasicAuthHeader(req, user.Name)
|
|
|
|
resp := MakeRequest(t, req, http.StatusOK)
|
|
|
|
|
|
|
|
var app api.OAuth2Application
|
|
|
|
DecodeJSON(t, resp, &app)
|
|
|
|
expectedApp := app
|
|
|
|
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Len(t, expectedApp.RedirectURIs, 2)
|
2020-04-10 02:37:31 +02:00
|
|
|
assert.EqualValues(t, expectedApp.RedirectURIs[0], appBody.RedirectURIs[0])
|
|
|
|
assert.EqualValues(t, expectedApp.RedirectURIs[1], appBody.RedirectURIs[1])
|
2022-10-24 09:59:24 +02:00
|
|
|
assert.Equal(t, expectedApp.ConfidentialClient, appBody.ConfidentialClient)
|
2022-01-02 14:12:35 +01:00
|
|
|
unittest.AssertExistsAndLoadBean(t, &auth.OAuth2Application{ID: expectedApp.ID, Name: expectedApp.Name})
|
2020-04-10 02:37:31 +02:00
|
|
|
}
|