Spiegel von
https://github.com/paviliondev/discourse-custom-wizard.git
synchronisiert 2024-11-23 01:40:29 +01:00
125 Zeilen
4 KiB
Ruby
125 Zeilen
4 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require_relative '../../plugin_helper'
|
|
|
|
describe CustomWizard::Pro do
|
|
fab!(:user) { Fabricate(:user) }
|
|
|
|
it "initializes pro authentication and subscription" do
|
|
pro = described_class.new
|
|
expect(pro.authentication.class).to eq(CustomWizard::ProAuthentication)
|
|
expect(pro.subscription.class).to eq(CustomWizard::ProSubscription)
|
|
end
|
|
|
|
it "returns authorized and subscribed states" do
|
|
pro = described_class.new
|
|
expect(pro.authorized?).to eq(false)
|
|
expect(pro.subscribed?).to eq(false)
|
|
end
|
|
|
|
context "subscription" do
|
|
before do
|
|
@pro = described_class.new
|
|
end
|
|
|
|
it "updates valid subscriptions" do
|
|
stub_subscription_request(200, valid_subscription)
|
|
expect(@pro.update_subscription).to eq(true)
|
|
expect(@pro.subscribed?).to eq(true)
|
|
end
|
|
|
|
it "handles invalid subscriptions" do
|
|
stub_subscription_request(200, invalid_subscription)
|
|
expect(@pro.update_subscription).to eq(false)
|
|
expect(@pro.subscribed?).to eq(false)
|
|
end
|
|
|
|
it "handles subscription http errors" do
|
|
stub_subscription_request(404, {})
|
|
expect(@pro.update_subscription).to eq(false)
|
|
expect(@pro.subscribed?).to eq(false)
|
|
end
|
|
|
|
it "destroys subscriptions" do
|
|
stub_subscription_request(200, valid_subscription)
|
|
expect(@pro.update_subscription).to eq(true)
|
|
expect(@pro.destroy_subscription).to eq(true)
|
|
expect(@pro.subscribed?).to eq(false)
|
|
end
|
|
|
|
it "has class aliases" do
|
|
authenticate_pro
|
|
stub_subscription_request(200, valid_subscription)
|
|
expect(described_class.update_subscription).to eq(true)
|
|
expect(described_class.subscribed?).to eq(true)
|
|
end
|
|
end
|
|
|
|
context "authentication" do
|
|
before do
|
|
@pro = described_class.new
|
|
user.update!(admin: true)
|
|
end
|
|
|
|
it "generates a valid authentication request url" do
|
|
request_id = SecureRandom.hex(32)
|
|
uri = URI(@pro.authentication_url(user.id, request_id))
|
|
expect(uri.host).to eq(@pro.server)
|
|
|
|
parsed_query = Rack::Utils.parse_query uri.query
|
|
expect(parsed_query['public_key'].present?).to eq(true)
|
|
expect(parsed_query['nonce'].present?).to eq(true)
|
|
expect(parsed_query['client_id'].present?).to eq(true)
|
|
expect(parsed_query['auth_redirect'].present?).to eq(true)
|
|
expect(parsed_query['application_name']).to eq(SiteSetting.title)
|
|
expect(parsed_query['scopes']).to eq(@pro.scope)
|
|
end
|
|
|
|
def generate_payload(request_id, user_id)
|
|
uri = URI(@pro.authentication_url(user_id, request_id))
|
|
keys = @pro.authentication.get_keys(request_id)
|
|
raw_payload = {
|
|
key: "12345",
|
|
nonce: keys.nonce,
|
|
push: false,
|
|
api: UserApiKeysController::AUTH_API_VERSION
|
|
}.to_json
|
|
public_key = OpenSSL::PKey::RSA.new(keys.pem)
|
|
Base64.encode64(public_key.public_encrypt(raw_payload))
|
|
end
|
|
|
|
it "handles authentication response if request and response is valid" do
|
|
request_id = SecureRandom.hex(32)
|
|
payload = generate_payload(request_id, user.id)
|
|
|
|
expect(@pro.authentication_response(request_id, payload)).to eq(true)
|
|
expect(@pro.authorized?).to eq(true)
|
|
end
|
|
|
|
it "discards authentication response if user who made request as not an admin" do
|
|
user.update!(admin: false)
|
|
|
|
request_id = SecureRandom.hex(32)
|
|
payload = generate_payload(request_id, user.id)
|
|
|
|
expect(@pro.authentication_response(request_id, payload)).to eq(false)
|
|
expect(@pro.authorized?).to eq(false)
|
|
end
|
|
|
|
it "discards authentication response if request_id is invalid" do
|
|
payload = generate_payload(SecureRandom.hex(32), user.id)
|
|
|
|
expect(@pro.authentication_response(SecureRandom.hex(32), payload)).to eq(false)
|
|
expect(@pro.authorized?).to eq(false)
|
|
end
|
|
|
|
it "destroys authentication" do
|
|
request_id = SecureRandom.hex(32)
|
|
payload = generate_payload(request_id, user.id)
|
|
@pro.authentication_response(request_id, payload)
|
|
|
|
expect(@pro.destroy_authentication).to eq(true)
|
|
expect(@pro.authorized?).to eq(false)
|
|
end
|
|
end
|
|
end
|