doorkeeper-sequel 1.2.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (197) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +10 -0
  3. data/.gitmodules +3 -0
  4. data/.rspec +1 -0
  5. data/.rubocop.yml +13 -0
  6. data/.travis.yml +24 -0
  7. data/CHANGELOG.md +24 -0
  8. data/Gemfile +23 -0
  9. data/Gemfile.lock +172 -0
  10. data/LICENSE +21 -0
  11. data/README.md +76 -0
  12. data/Rakefile +56 -0
  13. data/config/locales/en.yml +16 -0
  14. data/doorkeeper-sequel.gemspec +32 -0
  15. data/gemfiles/rails-4.2.gemfile +11 -0
  16. data/gemfiles/rails-5.0.gemfile +11 -0
  17. data/lib/doorkeeper/orm/sequel/access_grant.rb +9 -0
  18. data/lib/doorkeeper/orm/sequel/access_token.rb +32 -0
  19. data/lib/doorkeeper/orm/sequel/application.rb +18 -0
  20. data/lib/doorkeeper/orm/sequel/models/access_grant_mixin.rb +50 -0
  21. data/lib/doorkeeper/orm/sequel/models/access_token_mixin.rb +163 -0
  22. data/lib/doorkeeper/orm/sequel/models/application_mixin.rb +70 -0
  23. data/lib/doorkeeper/orm/sequel/models/concerns/ownership.rb +19 -0
  24. data/lib/doorkeeper/orm/sequel/models/concerns/sequel_compat.rb +40 -0
  25. data/lib/doorkeeper/orm/sequel/validators/redirect_uri_validator.rb +49 -0
  26. data/lib/doorkeeper/orm/sequel.rb +18 -0
  27. data/lib/doorkeeper-sequel/gem_version.rb +13 -0
  28. data/lib/doorkeeper-sequel/version.rb +7 -0
  29. data/lib/doorkeeper-sequel.rb +18 -0
  30. data/lib/generators/doorkeeper/sequel/application_owner_generator.rb +23 -0
  31. data/lib/generators/doorkeeper/sequel/migration_generator.rb +23 -0
  32. data/lib/generators/doorkeeper/sequel/previous_refresh_token_generator.rb +23 -0
  33. data/lib/generators/doorkeeper/sequel/templates/add_owner_to_application.rb +9 -0
  34. data/lib/generators/doorkeeper/sequel/templates/add_previous_refresh_token_to_access_tokens.rb +7 -0
  35. data/lib/generators/doorkeeper/sequel/templates/migration.rb +59 -0
  36. data/spec/controllers/application_metal_controller.rb +10 -0
  37. data/spec/controllers/applications_controller_spec.rb +58 -0
  38. data/spec/controllers/authorizations_controller_spec.rb +189 -0
  39. data/spec/controllers/protected_resources_controller_spec.rb +300 -0
  40. data/spec/controllers/token_info_controller_spec.rb +52 -0
  41. data/spec/controllers/tokens_controller_spec.rb +88 -0
  42. data/spec/dummy/Rakefile +7 -0
  43. data/spec/dummy/app/controllers/application_controller.rb +3 -0
  44. data/spec/dummy/app/controllers/custom_authorizations_controller.rb +7 -0
  45. data/spec/dummy/app/controllers/full_protected_resources_controller.rb +12 -0
  46. data/spec/dummy/app/controllers/home_controller.rb +17 -0
  47. data/spec/dummy/app/controllers/metal_controller.rb +11 -0
  48. data/spec/dummy/app/controllers/semi_protected_resources_controller.rb +11 -0
  49. data/spec/dummy/app/helpers/application_helper.rb +5 -0
  50. data/spec/dummy/app/models/user.rb +11 -0
  51. data/spec/dummy/app/views/home/index.html.erb +0 -0
  52. data/spec/dummy/app/views/layouts/application.html.erb +14 -0
  53. data/spec/dummy/config/application.rb +29 -0
  54. data/spec/dummy/config/boot.rb +9 -0
  55. data/spec/dummy/config/database.yml +15 -0
  56. data/spec/dummy/config/environment.rb +5 -0
  57. data/spec/dummy/config/environments/development.rb +29 -0
  58. data/spec/dummy/config/environments/production.rb +62 -0
  59. data/spec/dummy/config/environments/test.rb +44 -0
  60. data/spec/dummy/config/initializers/backtrace_silencers.rb +7 -0
  61. data/spec/dummy/config/initializers/db.rb +74 -0
  62. data/spec/dummy/config/initializers/doorkeeper.rb +96 -0
  63. data/spec/dummy/config/initializers/secret_token.rb +9 -0
  64. data/spec/dummy/config/initializers/session_store.rb +8 -0
  65. data/spec/dummy/config/initializers/wrap_parameters.rb +14 -0
  66. data/spec/dummy/config/locales/doorkeeper.en.yml +5 -0
  67. data/spec/dummy/config/routes.rb +52 -0
  68. data/spec/dummy/config.ru +4 -0
  69. data/spec/dummy/db/migrate/20111122132257_create_users.rb +9 -0
  70. data/spec/dummy/db/migrate/20120312140401_add_password_to_users.rb +5 -0
  71. data/spec/dummy/db/migrate/20151223192035_create_doorkeeper_tables.rb +60 -0
  72. data/spec/dummy/db/migrate/20151223200000_add_owner_to_application.rb +7 -0
  73. data/spec/dummy/db/migrate/20160320211015_add_previous_refresh_token_to_access_tokens.rb +11 -0
  74. data/spec/dummy/db/schema.rb +67 -0
  75. data/spec/dummy/log/test.log +19813 -0
  76. data/spec/dummy/public/404.html +26 -0
  77. data/spec/dummy/public/422.html +26 -0
  78. data/spec/dummy/public/500.html +26 -0
  79. data/spec/dummy/public/favicon.ico +0 -0
  80. data/spec/dummy/script/rails +6 -0
  81. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/-T/-TZF6Ae6YipbyKuHghb9wlTx4_b9itbSHRc_2PmqjiU.cache +1 -0
  82. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/0p/0pa3wNbGHqFC6gxrMvdOJiP6gPwFv9VJ_npjEfRWxAE.cache +1 -0
  83. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/2e/2eYh115US2lIRhM2KTEaJFa6aV_cX8iv6JAdjuq0Uio.cache +1 -0
  84. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/3P/3PoguHEOEeItUjmwC74MWLLP-_Ijow7798bF5U6K2dw.cache +1 -0
  85. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/6b/6b0anrSo7Fvoc05t4Ca0zZmfS_cpERy1DsG3ea6lBOg.cache +0 -0
  86. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/BA/BAC3ZaGoeZ9Od-kKg-UQYelvRgsCa0H72-52nLdcTNw.cache +1 -0
  87. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Bw/Bw6Nimjvy5Yv1AYbZb1t-v0eMNhv-bhwBzR-b5mY7FU.cache +0 -0
  88. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Fq/FqQWjMAz8yjZQlMC_dUsztaOxGruI2IXyGAAUF9SvQ0.cache +1 -0
  89. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/J_/J_D9clwKidN28hnVB1O3zEfKDwg90Usdb5ToKiPq_aw.cache +0 -0
  90. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Ji/JitNKkP1dYdu9ObSdIkkEAsiFxEmRO5oy1UIyhT_hYs.cache +0 -0
  91. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Jq/JqTLVvnY2AgGkHftWPwqt_HkbwhYRsmgHxk37VqKJAY.cache +0 -0
  92. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/QX/QXcp8DweOJ6BfMedGMfeHvVXv2hjDIleln1LSJk7vOE.cache +2 -0
  93. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Qy/Qy1ldbz6vKa_fv4E4ByxWslKFoV1qReQR5DKJ525z88.cache +1 -0
  94. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Rl/RlCJ_X5xFsE3VBDhkYrY7r_R6sMgiAc03cT8nr7Q2vY.cache +0 -0
  95. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Ta/TaYxNn81MhqC3DnMC6_y_Q7xap5Ntn4ggFo94EUaiak.cache +0 -0
  96. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Wq/WqbLVKOcTMZtttygYt_ncr1mGIDrzevSTaPGNmzV1D8.cache +1 -0
  97. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/YF/YF60qiQ28QMoYDrLmrbHWZr7X7bl5MxVPR5QrrVCFak.cache +1 -0
  98. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Yf/YfJJZvm_NONHd4eCasDibCcRapZ_WYIO5MUxSUUbYFk.cache +0 -0
  99. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Z0/Z0e47cT2a-21U-w-3gkbgqC3o5jWnEzOB8vW06aJH1E.cache +0 -0
  100. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/_u/_uy-z8SVnhffUNelRxbPDL2aAUPb_GbqREXVsfy8uGc.cache +0 -0
  101. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/dL/dL7SLUWUIeVdyA1UuH-rvif0nzesOar3LdEtqzdb4bE.cache +0 -0
  102. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/f8/f8WT8jqR1qNIdQaRDpXbyLN7E5AWkbYFBwdh9Ozk7gk.cache +1 -0
  103. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/hk/hk2YB6skvc72qL4IzzQKU8Emyfe5vARjoD1bvQTw4zE.cache +1 -0
  104. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/iO/iOpDp_7ZvBNO5WIpTmqNewUl9bB2satqXWulyNvAaX8.cache +0 -0
  105. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/ii/iiJRBZIsxKiwyzU_Z7UtQeUTXMRJRPTreTKRvAWO7_8.cache +1 -0
  106. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/mj/mjuMepngMLrtgilLlJ9oTTSqoGO1YUww1rXphQ1pOm4.cache +0 -0
  107. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/qo/qo6SpT75QykYB63Aqq5bgzpXyNU1Y4dGFvCCJgoWQpE.cache +1 -0
  108. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/sp/sprzBMBliJDI__s-0D3q82tn1MpBkFV0N651hTr3XE8.cache +1 -0
  109. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/tM/tM6A7CR8QluP_u4u59vN1GjSZGNqNH3TXkkNzb9EPXA.cache +0 -0
  110. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/vO/vOXN0mER62j4JiPpMTSVS7MMqs0067cZx14vD5B8qiQ.cache +0 -0
  111. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/zz/zzlQ_kom0liFOvGYDcjtVw6yAHOyA-bbzP8f0e_Tq1A.cache +1 -0
  112. data/spec/factories.rb +28 -0
  113. data/spec/generators/application_owner_generator_spec.rb +20 -0
  114. data/spec/generators/migration_generator_spec.rb +20 -0
  115. data/spec/generators/previous_refresh_token_generator_spec.rb +20 -0
  116. data/spec/generators/templates/routes.rb +3 -0
  117. data/spec/generators/tmp/dummy/db/migrate/20161012132809_create_doorkeeper_tables.rb +59 -0
  118. data/spec/helpers/doorkeeper/dashboard_helper_spec.rb +24 -0
  119. data/spec/lib/config_spec.rb +334 -0
  120. data/spec/lib/doorkeeper_spec.rb +28 -0
  121. data/spec/lib/models/expirable_spec.rb +51 -0
  122. data/spec/lib/models/revocable_spec.rb +59 -0
  123. data/spec/lib/models/scopes_spec.rb +43 -0
  124. data/spec/lib/oauth/authorization/uri_builder_spec.rb +42 -0
  125. data/spec/lib/oauth/authorization_code_request_spec.rb +80 -0
  126. data/spec/lib/oauth/client/credentials_spec.rb +47 -0
  127. data/spec/lib/oauth/client/methods_spec.rb +54 -0
  128. data/spec/lib/oauth/client_credentials/creator_spec.rb +44 -0
  129. data/spec/lib/oauth/client_credentials/issuer_spec.rb +86 -0
  130. data/spec/lib/oauth/client_credentials/validation_spec.rb +54 -0
  131. data/spec/lib/oauth/client_credentials_integration_spec.rb +27 -0
  132. data/spec/lib/oauth/client_credentials_request_spec.rb +104 -0
  133. data/spec/lib/oauth/client_spec.rb +39 -0
  134. data/spec/lib/oauth/code_request_spec.rb +45 -0
  135. data/spec/lib/oauth/code_response_spec.rb +34 -0
  136. data/spec/lib/oauth/error_response_spec.rb +61 -0
  137. data/spec/lib/oauth/error_spec.rb +23 -0
  138. data/spec/lib/oauth/forbidden_token_response_spec.rb +23 -0
  139. data/spec/lib/oauth/helpers/scope_checker_spec.rb +64 -0
  140. data/spec/lib/oauth/helpers/unique_token_spec.rb +20 -0
  141. data/spec/lib/oauth/helpers/uri_checker_spec.rb +104 -0
  142. data/spec/lib/oauth/invalid_token_response_spec.rb +28 -0
  143. data/spec/lib/oauth/password_access_token_request_spec.rb +90 -0
  144. data/spec/lib/oauth/pre_authorization_spec.rb +155 -0
  145. data/spec/lib/oauth/refresh_token_request_spec.rb +154 -0
  146. data/spec/lib/oauth/scopes_spec.rb +122 -0
  147. data/spec/lib/oauth/token_request_spec.rb +98 -0
  148. data/spec/lib/oauth/token_response_spec.rb +85 -0
  149. data/spec/lib/oauth/token_spec.rb +116 -0
  150. data/spec/lib/request/strategy_spec.rb +53 -0
  151. data/spec/lib/server_spec.rb +52 -0
  152. data/spec/models/doorkeeper/access_grant_spec.rb +36 -0
  153. data/spec/models/doorkeeper/access_token_spec.rb +394 -0
  154. data/spec/models/doorkeeper/application_spec.rb +179 -0
  155. data/spec/requests/applications/applications_request_spec.rb +94 -0
  156. data/spec/requests/applications/authorized_applications_spec.rb +30 -0
  157. data/spec/requests/endpoints/authorization_spec.rb +72 -0
  158. data/spec/requests/endpoints/token_spec.rb +64 -0
  159. data/spec/requests/flows/authorization_code_errors_spec.rb +66 -0
  160. data/spec/requests/flows/authorization_code_spec.rb +156 -0
  161. data/spec/requests/flows/client_credentials_spec.rb +58 -0
  162. data/spec/requests/flows/implicit_grant_errors_spec.rb +32 -0
  163. data/spec/requests/flows/implicit_grant_spec.rb +61 -0
  164. data/spec/requests/flows/password_spec.rb +115 -0
  165. data/spec/requests/flows/refresh_token_spec.rb +174 -0
  166. data/spec/requests/flows/revoke_token_spec.rb +157 -0
  167. data/spec/requests/flows/skip_authorization_spec.rb +59 -0
  168. data/spec/requests/protected_resources/metal_spec.rb +14 -0
  169. data/spec/requests/protected_resources/private_api_spec.rb +81 -0
  170. data/spec/routing/custom_controller_routes_spec.rb +71 -0
  171. data/spec/routing/default_routes_spec.rb +35 -0
  172. data/spec/routing/scoped_routes_spec.rb +31 -0
  173. data/spec/spec_helper.rb +2 -0
  174. data/spec/spec_helper_integration.rb +50 -0
  175. data/spec/stubs/config/application.rb +29 -0
  176. data/spec/stubs/config/initializers/db.rb +74 -0
  177. data/spec/stubs/generators/application_owner_generator_spec.rb +20 -0
  178. data/spec/stubs/generators/migration_generator_spec.rb +20 -0
  179. data/spec/stubs/generators/previous_refresh_token_generator_spec.rb +20 -0
  180. data/spec/stubs/generators/tmp/dummy/db/migrate/20161012132810_add_owner_to_application.rb +9 -0
  181. data/spec/stubs/models/user.rb +11 -0
  182. data/spec/stubs/spec_helper_integration.rb +50 -0
  183. data/spec/stubs/support/sequel.rb +0 -0
  184. data/spec/support/dependencies/factory_girl.rb +2 -0
  185. data/spec/support/helpers/access_token_request_helper.rb +11 -0
  186. data/spec/support/helpers/authorization_request_helper.rb +41 -0
  187. data/spec/support/helpers/config_helper.rb +9 -0
  188. data/spec/support/helpers/model_helper.rb +67 -0
  189. data/spec/support/helpers/request_spec_helper.rb +76 -0
  190. data/spec/support/helpers/url_helper.rb +55 -0
  191. data/spec/support/http_method_shim.rb +24 -0
  192. data/spec/support/orm/active_record.rb +3 -0
  193. data/spec/support/orm/sequel.rb +0 -0
  194. data/spec/support/shared/controllers_shared_context.rb +69 -0
  195. data/spec/support/shared/models_shared_examples.rb +52 -0
  196. data/spec/validators/redirect_uri_validator_spec.rb +78 -0
  197. metadata +570 -0
@@ -0,0 +1,72 @@
1
+ require 'spec_helper_integration'
2
+
3
+ feature 'Authorization endpoint' do
4
+ background do
5
+ config_is_set(:authenticate_resource_owner) { User.first || redirect_to('/sign_in') }
6
+ client_exists(name: 'MyApp')
7
+ end
8
+
9
+ scenario 'requires resource owner to be authenticated' do
10
+ visit authorization_endpoint_url(client: @client)
11
+ i_should_see 'Sign in'
12
+ i_should_be_on '/'
13
+ end
14
+
15
+ context 'with authenticated resource owner' do
16
+ background do
17
+ create_resource_owner
18
+ sign_in
19
+ end
20
+
21
+ scenario 'displays the authorization form' do
22
+ visit authorization_endpoint_url(client: @client)
23
+ i_should_see 'Authorize MyApp to use your account?'
24
+ end
25
+
26
+ scenario 'displays all requested scopes' do
27
+ default_scopes_exist :public
28
+ optional_scopes_exist :write
29
+ visit authorization_endpoint_url(client: @client, scope: 'public write')
30
+ i_should_see 'Access your public data'
31
+ i_should_see 'Update your data'
32
+ end
33
+ end
34
+
35
+ context 'with a invalid request' do
36
+ background do
37
+ create_resource_owner
38
+ sign_in
39
+ end
40
+
41
+ scenario 'displays the related error' do
42
+ visit authorization_endpoint_url(client: @client, response_type: '')
43
+ i_should_not_see 'Authorize'
44
+ i_should_see_translated_error_message :unsupported_response_type
45
+ end
46
+
47
+ scenario "displays unsupported_response_type error when using a disabled response type" do
48
+ config_is_set(:grant_flows, ['implicit'])
49
+ visit authorization_endpoint_url(client: @client, response_type: 'code')
50
+ i_should_not_see "Authorize"
51
+ i_should_see_translated_error_message :unsupported_response_type
52
+ end
53
+ end
54
+
55
+ context 'forgery protection enabled' do
56
+ background do
57
+ create_resource_owner
58
+ sign_in
59
+ end
60
+
61
+ scenario 'raises exception on forged requests' do
62
+ skip 'TODO: need to add request helpers to this feature spec'
63
+ allow_any_instance_of(ActionController::Base).to receive(:handle_unverified_request)
64
+ allowing_forgery_protection do
65
+ post "/oauth/authorize",
66
+ client_id: @client.uid,
67
+ redirect_uri: @client.redirect_uri,
68
+ response_type: 'code'
69
+ end
70
+ end
71
+ end
72
+ end
@@ -0,0 +1,64 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Token endpoint' do
4
+ before do
5
+ client_exists
6
+ authorization_code_exists application: @client, scopes: 'public'
7
+ end
8
+
9
+ it 'respond with correct headers' do
10
+ post token_endpoint_url(code: @authorization.token, client: @client)
11
+ should_have_header 'Pragma', 'no-cache'
12
+ should_have_header 'Cache-Control', 'no-store'
13
+ should_have_header 'Content-Type', 'application/json; charset=utf-8'
14
+ end
15
+
16
+ it 'accepts client credentials with basic auth header' do
17
+ post token_endpoint_url(
18
+ code: @authorization.token,
19
+ redirect_uri: @client.redirect_uri
20
+ ), {}, 'HTTP_AUTHORIZATION' => basic_auth_header_for_client(@client)
21
+
22
+ should_have_json 'access_token', Doorkeeper::AccessToken.first.token
23
+ end
24
+
25
+ it 'returns null for expires_in when a permanent token is set' do
26
+ config_is_set(:access_token_expires_in, nil)
27
+ post token_endpoint_url(code: @authorization.token, client: @client)
28
+ should_have_json 'access_token', Doorkeeper::AccessToken.first.token
29
+ should_not_have_json 'expires_in'
30
+ end
31
+
32
+ it 'returns unsupported_grant_type for invalid grant_type param' do
33
+ post token_endpoint_url(code: @authorization.token, client: @client, grant_type: 'nothing')
34
+
35
+ should_not_have_json 'access_token'
36
+ should_have_json 'error', 'unsupported_grant_type'
37
+ should_have_json 'error_description', translated_error_message('unsupported_grant_type')
38
+ end
39
+
40
+ it 'returns unsupported_grant_type for disabled grant flows' do
41
+ config_is_set(:grant_flows, ['implicit'])
42
+ post token_endpoint_url(code: @authorization.token, client: @client, grant_type: 'authorization_code')
43
+
44
+ should_not_have_json 'access_token'
45
+ should_have_json 'error', 'unsupported_grant_type'
46
+ should_have_json 'error_description', translated_error_message('unsupported_grant_type')
47
+ end
48
+
49
+ it 'returns unsupported_grant_type when refresh_token is not in use' do
50
+ post token_endpoint_url(code: @authorization.token, client: @client, grant_type: 'refresh_token')
51
+
52
+ should_not_have_json 'access_token'
53
+ should_have_json 'error', 'unsupported_grant_type'
54
+ should_have_json 'error_description', translated_error_message('unsupported_grant_type')
55
+ end
56
+
57
+ it 'returns invalid_request if grant_type is missing' do
58
+ post token_endpoint_url(code: @authorization.token, client: @client, grant_type: '')
59
+
60
+ should_not_have_json 'access_token'
61
+ should_have_json 'error', 'invalid_request'
62
+ should_have_json 'error_description', translated_error_message('invalid_request')
63
+ end
64
+ end
@@ -0,0 +1,66 @@
1
+ require 'spec_helper_integration'
2
+
3
+ feature 'Authorization Code Flow Errors' do
4
+ background do
5
+ config_is_set(:authenticate_resource_owner) { User.first || redirect_to('/sign_in') }
6
+ client_exists
7
+ create_resource_owner
8
+ sign_in
9
+ end
10
+
11
+ after do
12
+ access_grant_should_not_exist
13
+ end
14
+
15
+ context 'when access was denied' do
16
+ scenario 'redirects with error' do
17
+ visit authorization_endpoint_url(client: @client)
18
+ click_on 'Deny'
19
+
20
+ i_should_be_on_client_callback @client
21
+ url_should_not_have_param 'code'
22
+ url_should_have_param 'error', 'access_denied'
23
+ url_should_have_param 'error_description', translated_error_message(:access_denied)
24
+ end
25
+
26
+ scenario 'redirects with state parameter' do
27
+ visit authorization_endpoint_url(client: @client, state: 'return-this')
28
+ click_on 'Deny'
29
+
30
+ i_should_be_on_client_callback @client
31
+ url_should_not_have_param 'code'
32
+ url_should_have_param 'state', 'return-this'
33
+ end
34
+ end
35
+ end
36
+
37
+ describe 'Authorization Code Flow Errors', 'after authorization' do
38
+ before do
39
+ client_exists
40
+ authorization_code_exists application: @client
41
+ end
42
+
43
+ it 'returns :invalid_grant error when posting an already revoked grant code' do
44
+ # First successful request
45
+ post token_endpoint_url(code: @authorization.token, client: @client)
46
+
47
+ # Second attempt with same token
48
+ expect do
49
+ post token_endpoint_url(code: @authorization.token, client: @client)
50
+ end.to_not change { Doorkeeper::AccessToken.count }
51
+
52
+ should_not_have_json 'access_token'
53
+ should_have_json 'error', 'invalid_grant'
54
+ should_have_json 'error_description', translated_error_message('invalid_grant')
55
+ end
56
+
57
+ it 'returns :invalid_grant error for invalid grant code' do
58
+ post token_endpoint_url(code: 'invalid', client: @client)
59
+
60
+ access_token_should_not_exist
61
+
62
+ should_not_have_json 'access_token'
63
+ should_have_json 'error', 'invalid_grant'
64
+ should_have_json 'error_description', translated_error_message('invalid_grant')
65
+ end
66
+ end
@@ -0,0 +1,156 @@
1
+ require 'spec_helper_integration'
2
+
3
+ feature 'Authorization Code Flow' do
4
+ background do
5
+ config_is_set(:authenticate_resource_owner) { User.first || redirect_to('/sign_in') }
6
+ client_exists
7
+ create_resource_owner
8
+ sign_in
9
+ end
10
+
11
+ scenario 'resource owner authorizes the client' do
12
+ visit authorization_endpoint_url(client: @client)
13
+ click_on 'Authorize'
14
+
15
+ access_grant_should_exist_for(@client, @resource_owner)
16
+
17
+ i_should_be_on_client_callback(@client)
18
+
19
+ url_should_have_param('code', Doorkeeper::AccessGrant.first.token)
20
+ url_should_not_have_param('state')
21
+ url_should_not_have_param('error')
22
+ end
23
+
24
+ scenario 'resource owner authorizes using test url' do
25
+ @client.redirect_uri = Doorkeeper.configuration.native_redirect_uri
26
+ @client.save!
27
+ visit authorization_endpoint_url(client: @client)
28
+ click_on 'Authorize'
29
+
30
+ access_grant_should_exist_for(@client, @resource_owner)
31
+
32
+ i_should_see 'Authorization code:'
33
+ i_should_see Doorkeeper::AccessGrant.first.token
34
+ end
35
+
36
+ scenario 'resource owner authorizes the client with state parameter set' do
37
+ visit authorization_endpoint_url(client: @client, state: 'return-me')
38
+ click_on 'Authorize'
39
+ url_should_have_param('code', Doorkeeper::AccessGrant.first.token)
40
+ url_should_have_param('state', 'return-me')
41
+ end
42
+
43
+ scenario 'resource owner requests an access token with authorization code' do
44
+ skip 'TODO: need to add request helpers to this feature spec'
45
+
46
+ visit authorization_endpoint_url(client: @client)
47
+ click_on 'Authorize'
48
+
49
+ authorization_code = Doorkeeper::AccessGrant.first.token
50
+ post token_endpoint_url(code: authorization_code, client: @client)
51
+
52
+ access_token_should_exist_for(@client, @resource_owner)
53
+
54
+ should_not_have_json 'error'
55
+
56
+ should_have_json 'access_token', Doorkeeper::AccessToken.first.token
57
+ should_have_json 'token_type', 'bearer'
58
+ should_have_json_within 'expires_in', Doorkeeper::AccessToken.first.expires_in, 1
59
+ end
60
+
61
+ context 'with scopes' do
62
+ background do
63
+ default_scopes_exist :public
64
+ optional_scopes_exist :write
65
+ end
66
+
67
+ scenario 'resource owner authorizes the client with default scopes' do
68
+ visit authorization_endpoint_url(client: @client)
69
+ click_on 'Authorize'
70
+ access_grant_should_exist_for(@client, @resource_owner)
71
+ access_grant_should_have_scopes :public
72
+ end
73
+
74
+ scenario 'resource owner authorizes the client with required scopes' do
75
+ visit authorization_endpoint_url(client: @client, scope: 'public write')
76
+ click_on 'Authorize'
77
+ access_grant_should_have_scopes :public, :write
78
+ end
79
+
80
+ scenario 'resource owner authorizes the client with required scopes (without defaults)' do
81
+ visit authorization_endpoint_url(client: @client, scope: 'write')
82
+ click_on 'Authorize'
83
+ access_grant_should_have_scopes :write
84
+ end
85
+
86
+ scenario 'new access token matches required scopes' do
87
+ skip 'TODO: need to add request helpers to this feature spec'
88
+
89
+ visit authorization_endpoint_url(client: @client, scope: 'public write')
90
+ click_on 'Authorize'
91
+
92
+ authorization_code = Doorkeeper::AccessGrant.first.token
93
+ post token_endpoint_url(code: authorization_code, client: @client)
94
+
95
+ access_token_should_exist_for(@client, @resource_owner)
96
+ access_token_should_have_scopes :public, :write
97
+ end
98
+
99
+ scenario 'returns new token if scopes have changed' do
100
+ skip 'TODO: need to add request helpers to this feature spec'
101
+
102
+ client_is_authorized(@client, @resource_owner, scopes: 'public write')
103
+ visit authorization_endpoint_url(client: @client, scope: 'public')
104
+ click_on 'Authorize'
105
+
106
+ authorization_code = Doorkeeper::AccessGrant.first.token
107
+ post token_endpoint_url(code: authorization_code, client: @client)
108
+
109
+ expect(Doorkeeper::AccessToken.count).to be(2)
110
+
111
+ should_have_json 'access_token', Doorkeeper::AccessToken.last.token
112
+ end
113
+
114
+ scenario 'resource owner authorizes the client with extra scopes' do
115
+ skip 'TODO: need to add request helpers to this feature spec'
116
+
117
+ client_is_authorized(@client, @resource_owner, scopes: 'public')
118
+ visit authorization_endpoint_url(client: @client, scope: 'public write')
119
+ click_on 'Authorize'
120
+
121
+ authorization_code = Doorkeeper::AccessGrant.first.token
122
+ post token_endpoint_url(code: authorization_code, client: @client)
123
+
124
+ expect(Doorkeeper::AccessToken.count).to be(2)
125
+
126
+ should_have_json 'access_token', Doorkeeper::AccessToken.last.token
127
+ access_token_should_have_scopes :public, :write
128
+ end
129
+ end
130
+ end
131
+
132
+ describe 'Authorization Code Flow' do
133
+ before do
134
+ Doorkeeper.configure do
135
+ orm DOORKEEPER_ORM
136
+ use_refresh_token
137
+ end
138
+ client_exists
139
+ end
140
+
141
+ context 'issuing a refresh token' do
142
+ before do
143
+ authorization_code_exists application: @client
144
+ end
145
+
146
+ it 'second of simultaneous client requests get an error for revoked acccess token' do
147
+ authorization_code = Doorkeeper::AccessGrant.first.token
148
+ allow_any_instance_of(Doorkeeper::AccessGrant).to receive(:revoked?).and_return(false, true)
149
+
150
+ post token_endpoint_url(code: authorization_code, client: @client)
151
+
152
+ should_not_have_json 'access_token'
153
+ should_have_json 'error', 'invalid_grant'
154
+ end
155
+ end
156
+ end
@@ -0,0 +1,58 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Client Credentials Request' do
4
+ let(:client) { FactoryGirl.create :application }
5
+
6
+ context 'a valid request' do
7
+ it 'authorizes the client and returns the token response' do
8
+ headers = authorization client.uid, client.secret
9
+ params = { grant_type: 'client_credentials' }
10
+
11
+ post '/oauth/token', params, headers
12
+
13
+ should_have_json 'access_token', Doorkeeper::AccessToken.first.token
14
+ should_have_json_within 'expires_in', Doorkeeper.configuration.access_token_expires_in, 1
15
+ should_not_have_json 'scope'
16
+ should_not_have_json 'refresh_token'
17
+
18
+ should_not_have_json 'error'
19
+ should_not_have_json 'error_description'
20
+ end
21
+
22
+ context 'with scopes' do
23
+ before do
24
+ optional_scopes_exist :write
25
+ end
26
+
27
+ it 'adds the scope to the token an returns in the response' do
28
+ headers = authorization client.uid, client.secret
29
+ params = { grant_type: 'client_credentials', scope: 'write' }
30
+
31
+ post '/oauth/token', params, headers
32
+
33
+ should_have_json 'access_token', Doorkeeper::AccessToken.first.token
34
+ should_have_json 'scope', 'write'
35
+ end
36
+ end
37
+ end
38
+
39
+ context 'an invalid request' do
40
+ it 'does not authorize the client and returns the error' do
41
+ headers = {}
42
+ params = { grant_type: 'client_credentials' }
43
+
44
+ post '/oauth/token', params, headers
45
+
46
+ should_have_json 'error', 'invalid_client'
47
+ should_have_json 'error_description', translated_error_message(:invalid_client)
48
+ should_not_have_json 'access_token'
49
+
50
+ expect(response.status).to eq(401)
51
+ end
52
+ end
53
+
54
+ def authorization(username, password)
55
+ credentials = ActionController::HttpAuthentication::Basic.encode_credentials username, password
56
+ { 'HTTP_AUTHORIZATION' => credentials }
57
+ end
58
+ end
@@ -0,0 +1,32 @@
1
+ require 'spec_helper_integration'
2
+
3
+ feature 'Implicit Grant Flow Errors' do
4
+ background do
5
+ config_is_set(:authenticate_resource_owner) { User.first || redirect_to('/sign_in') }
6
+ config_is_set(:grant_flows, ["implicit"])
7
+ client_exists
8
+ create_resource_owner
9
+ sign_in
10
+ end
11
+
12
+ after do
13
+ access_token_should_not_exist
14
+ end
15
+
16
+ [
17
+ [:client_id, :invalid_client],
18
+ [:redirect_uri, :invalid_redirect_uri]
19
+ ].each do |error|
20
+ scenario "displays #{error.last.inspect} error for invalid #{error.first.inspect}" do
21
+ visit authorization_endpoint_url(client: @client, error.first => 'invalid', response_type: 'token')
22
+ i_should_not_see 'Authorize'
23
+ i_should_see_translated_error_message error.last
24
+ end
25
+
26
+ scenario "displays #{error.last.inspect} error when #{error.first.inspect} is missing" do
27
+ visit authorization_endpoint_url(client: @client, error.first => '', response_type: 'token')
28
+ i_should_not_see 'Authorize'
29
+ i_should_see_translated_error_message error.last
30
+ end
31
+ end
32
+ end
@@ -0,0 +1,61 @@
1
+ require 'spec_helper_integration'
2
+
3
+ feature 'Implicit Grant Flow (feature spec)' do
4
+ background do
5
+ config_is_set(:authenticate_resource_owner) { User.first || redirect_to('/sign_in') }
6
+ config_is_set(:grant_flows, ["implicit"])
7
+ client_exists
8
+ create_resource_owner
9
+ sign_in
10
+ end
11
+
12
+ scenario 'resource owner authorizes the client' do
13
+ visit authorization_endpoint_url(client: @client, response_type: 'token')
14
+ click_on 'Authorize'
15
+
16
+ access_token_should_exist_for @client, @resource_owner
17
+
18
+ i_should_be_on_client_callback @client
19
+ end
20
+ end
21
+
22
+ describe 'Implicit Grant Flow (request spec)' do
23
+ before do
24
+ config_is_set(:authenticate_resource_owner) { User.first || redirect_to('/sign_in') }
25
+ config_is_set(:grant_flows, ["implicit"])
26
+ client_exists
27
+ create_resource_owner
28
+ end
29
+
30
+ context 'token reuse' do
31
+ it 'should return a new token each request' do
32
+ allow(Doorkeeper.configuration).to receive(:reuse_access_token).and_return(false)
33
+
34
+ token = client_is_authorized(@client, @resource_owner)
35
+
36
+ post "/oauth/authorize",
37
+ client_id: @client.uid,
38
+ state: '',
39
+ redirect_uri: @client.redirect_uri,
40
+ response_type: 'token',
41
+ commit: 'Authorize'
42
+
43
+ expect(response.location).not_to include(token.token)
44
+ end
45
+
46
+ it 'should return the same token if it is still accessible' do
47
+ allow(Doorkeeper.configuration).to receive(:reuse_access_token).and_return(true)
48
+
49
+ token = client_is_authorized(@client, @resource_owner)
50
+
51
+ post "/oauth/authorize",
52
+ client_id: @client.uid,
53
+ state: '',
54
+ redirect_uri: @client.redirect_uri,
55
+ response_type: 'token',
56
+ commit: 'Authorize'
57
+
58
+ expect(response.location).to include(token.token)
59
+ end
60
+ end
61
+ end
@@ -0,0 +1,115 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Resource Owner Password Credentials Flow not set up' do
4
+ before do
5
+ client_exists
6
+ create_resource_owner
7
+ end
8
+
9
+ context 'with valid user credentials' do
10
+ it 'doesn\'t issue new token' do
11
+ expect do
12
+ post password_token_endpoint_url(client: @client, resource_owner: @resource_owner)
13
+ end.to_not change { Doorkeeper::AccessToken.count }
14
+ end
15
+ end
16
+ end
17
+
18
+ describe 'Resource Owner Password Credentials Flow' do
19
+ before do
20
+ config_is_set(:grant_flows, ["password"])
21
+ config_is_set(:resource_owner_from_credentials) { User.authenticate! params[:username], params[:password] }
22
+ client_exists
23
+ create_resource_owner
24
+ end
25
+
26
+ context 'with valid user credentials' do
27
+ it 'should issue new token with confidential client' do
28
+ expect do
29
+ post password_token_endpoint_url(client: @client, resource_owner: @resource_owner)
30
+ end.to change { Doorkeeper::AccessToken.count }.by(1)
31
+
32
+ token = Doorkeeper::AccessToken.first
33
+
34
+ expect(token.application_id).to eq @client.id
35
+ should_have_json 'access_token', token.token
36
+ end
37
+
38
+ it 'should issue new token with public client (only client_id present)' do
39
+ expect do
40
+ post password_token_endpoint_url(client_id: @client.uid, resource_owner: @resource_owner)
41
+ end.to change { Doorkeeper::AccessToken.count }.by(1)
42
+
43
+ token = Doorkeeper::AccessToken.first
44
+
45
+ expect(token.application_id).to eq @client.id
46
+ should_have_json 'access_token', token.token
47
+ end
48
+
49
+ it 'should issue new token without client credentials' do
50
+ expect do
51
+ post password_token_endpoint_url(resource_owner: @resource_owner)
52
+ end.to change { Doorkeeper::AccessToken.count }.by(1)
53
+
54
+ token = Doorkeeper::AccessToken.first
55
+
56
+ expect(token.application_id).to be_nil
57
+ should_have_json 'access_token', token.token
58
+ end
59
+
60
+ it 'should issue a refresh token if enabled' do
61
+ config_is_set(:refresh_token_enabled, true)
62
+
63
+ post password_token_endpoint_url(client: @client, resource_owner: @resource_owner)
64
+
65
+ token = Doorkeeper::AccessToken.first
66
+
67
+ should_have_json 'refresh_token', token.refresh_token
68
+ end
69
+
70
+ it 'should return the same token if it is still accessible' do
71
+ allow(Doorkeeper.configuration).to receive(:reuse_access_token).and_return(true)
72
+
73
+ client_is_authorized(@client, @resource_owner)
74
+
75
+ post password_token_endpoint_url(client: @client, resource_owner: @resource_owner)
76
+
77
+ expect(Doorkeeper::AccessToken.count).to be(1)
78
+ should_have_json 'access_token', Doorkeeper::AccessToken.first.token
79
+ end
80
+ end
81
+
82
+ context 'with invalid user credentials' do
83
+ it 'should not issue new token with bad password' do
84
+ expect do
85
+ post password_token_endpoint_url(client: @client,
86
+ resource_owner_username: @resource_owner.name,
87
+ resource_owner_password: 'wrongpassword')
88
+ end.to_not change { Doorkeeper::AccessToken.count }
89
+ end
90
+
91
+ it 'should not issue new token without credentials' do
92
+ expect do
93
+ post password_token_endpoint_url(client: @client)
94
+ end.to_not change { Doorkeeper::AccessToken.count }
95
+ end
96
+ end
97
+
98
+ context 'with invalid confidential client credentials' do
99
+ it 'should not issue new token with bad client credentials' do
100
+ expect do
101
+ post password_token_endpoint_url(client_id: @client.uid,
102
+ client_secret: 'bad_secret',
103
+ resource_owner: @resource_owner)
104
+ end.to_not change { Doorkeeper::AccessToken.count }
105
+ end
106
+ end
107
+
108
+ context 'with invalid public client id' do
109
+ it 'should not issue new token with bad client id' do
110
+ expect do
111
+ post password_token_endpoint_url(client_id: 'bad_id', resource_owner: @resource_owner)
112
+ end.to_not change { Doorkeeper::AccessToken.count }
113
+ end
114
+ end
115
+ end