doorkeeper-sequel 1.2.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (197) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +10 -0
  3. data/.gitmodules +3 -0
  4. data/.rspec +1 -0
  5. data/.rubocop.yml +13 -0
  6. data/.travis.yml +24 -0
  7. data/CHANGELOG.md +24 -0
  8. data/Gemfile +23 -0
  9. data/Gemfile.lock +172 -0
  10. data/LICENSE +21 -0
  11. data/README.md +76 -0
  12. data/Rakefile +56 -0
  13. data/config/locales/en.yml +16 -0
  14. data/doorkeeper-sequel.gemspec +32 -0
  15. data/gemfiles/rails-4.2.gemfile +11 -0
  16. data/gemfiles/rails-5.0.gemfile +11 -0
  17. data/lib/doorkeeper/orm/sequel/access_grant.rb +9 -0
  18. data/lib/doorkeeper/orm/sequel/access_token.rb +32 -0
  19. data/lib/doorkeeper/orm/sequel/application.rb +18 -0
  20. data/lib/doorkeeper/orm/sequel/models/access_grant_mixin.rb +50 -0
  21. data/lib/doorkeeper/orm/sequel/models/access_token_mixin.rb +163 -0
  22. data/lib/doorkeeper/orm/sequel/models/application_mixin.rb +70 -0
  23. data/lib/doorkeeper/orm/sequel/models/concerns/ownership.rb +19 -0
  24. data/lib/doorkeeper/orm/sequel/models/concerns/sequel_compat.rb +40 -0
  25. data/lib/doorkeeper/orm/sequel/validators/redirect_uri_validator.rb +49 -0
  26. data/lib/doorkeeper/orm/sequel.rb +18 -0
  27. data/lib/doorkeeper-sequel/gem_version.rb +13 -0
  28. data/lib/doorkeeper-sequel/version.rb +7 -0
  29. data/lib/doorkeeper-sequel.rb +18 -0
  30. data/lib/generators/doorkeeper/sequel/application_owner_generator.rb +23 -0
  31. data/lib/generators/doorkeeper/sequel/migration_generator.rb +23 -0
  32. data/lib/generators/doorkeeper/sequel/previous_refresh_token_generator.rb +23 -0
  33. data/lib/generators/doorkeeper/sequel/templates/add_owner_to_application.rb +9 -0
  34. data/lib/generators/doorkeeper/sequel/templates/add_previous_refresh_token_to_access_tokens.rb +7 -0
  35. data/lib/generators/doorkeeper/sequel/templates/migration.rb +59 -0
  36. data/spec/controllers/application_metal_controller.rb +10 -0
  37. data/spec/controllers/applications_controller_spec.rb +58 -0
  38. data/spec/controllers/authorizations_controller_spec.rb +189 -0
  39. data/spec/controllers/protected_resources_controller_spec.rb +300 -0
  40. data/spec/controllers/token_info_controller_spec.rb +52 -0
  41. data/spec/controllers/tokens_controller_spec.rb +88 -0
  42. data/spec/dummy/Rakefile +7 -0
  43. data/spec/dummy/app/controllers/application_controller.rb +3 -0
  44. data/spec/dummy/app/controllers/custom_authorizations_controller.rb +7 -0
  45. data/spec/dummy/app/controllers/full_protected_resources_controller.rb +12 -0
  46. data/spec/dummy/app/controllers/home_controller.rb +17 -0
  47. data/spec/dummy/app/controllers/metal_controller.rb +11 -0
  48. data/spec/dummy/app/controllers/semi_protected_resources_controller.rb +11 -0
  49. data/spec/dummy/app/helpers/application_helper.rb +5 -0
  50. data/spec/dummy/app/models/user.rb +11 -0
  51. data/spec/dummy/app/views/home/index.html.erb +0 -0
  52. data/spec/dummy/app/views/layouts/application.html.erb +14 -0
  53. data/spec/dummy/config/application.rb +29 -0
  54. data/spec/dummy/config/boot.rb +9 -0
  55. data/spec/dummy/config/database.yml +15 -0
  56. data/spec/dummy/config/environment.rb +5 -0
  57. data/spec/dummy/config/environments/development.rb +29 -0
  58. data/spec/dummy/config/environments/production.rb +62 -0
  59. data/spec/dummy/config/environments/test.rb +44 -0
  60. data/spec/dummy/config/initializers/backtrace_silencers.rb +7 -0
  61. data/spec/dummy/config/initializers/db.rb +74 -0
  62. data/spec/dummy/config/initializers/doorkeeper.rb +96 -0
  63. data/spec/dummy/config/initializers/secret_token.rb +9 -0
  64. data/spec/dummy/config/initializers/session_store.rb +8 -0
  65. data/spec/dummy/config/initializers/wrap_parameters.rb +14 -0
  66. data/spec/dummy/config/locales/doorkeeper.en.yml +5 -0
  67. data/spec/dummy/config/routes.rb +52 -0
  68. data/spec/dummy/config.ru +4 -0
  69. data/spec/dummy/db/migrate/20111122132257_create_users.rb +9 -0
  70. data/spec/dummy/db/migrate/20120312140401_add_password_to_users.rb +5 -0
  71. data/spec/dummy/db/migrate/20151223192035_create_doorkeeper_tables.rb +60 -0
  72. data/spec/dummy/db/migrate/20151223200000_add_owner_to_application.rb +7 -0
  73. data/spec/dummy/db/migrate/20160320211015_add_previous_refresh_token_to_access_tokens.rb +11 -0
  74. data/spec/dummy/db/schema.rb +67 -0
  75. data/spec/dummy/log/test.log +19813 -0
  76. data/spec/dummy/public/404.html +26 -0
  77. data/spec/dummy/public/422.html +26 -0
  78. data/spec/dummy/public/500.html +26 -0
  79. data/spec/dummy/public/favicon.ico +0 -0
  80. data/spec/dummy/script/rails +6 -0
  81. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/-T/-TZF6Ae6YipbyKuHghb9wlTx4_b9itbSHRc_2PmqjiU.cache +1 -0
  82. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/0p/0pa3wNbGHqFC6gxrMvdOJiP6gPwFv9VJ_npjEfRWxAE.cache +1 -0
  83. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/2e/2eYh115US2lIRhM2KTEaJFa6aV_cX8iv6JAdjuq0Uio.cache +1 -0
  84. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/3P/3PoguHEOEeItUjmwC74MWLLP-_Ijow7798bF5U6K2dw.cache +1 -0
  85. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/6b/6b0anrSo7Fvoc05t4Ca0zZmfS_cpERy1DsG3ea6lBOg.cache +0 -0
  86. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/BA/BAC3ZaGoeZ9Od-kKg-UQYelvRgsCa0H72-52nLdcTNw.cache +1 -0
  87. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Bw/Bw6Nimjvy5Yv1AYbZb1t-v0eMNhv-bhwBzR-b5mY7FU.cache +0 -0
  88. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Fq/FqQWjMAz8yjZQlMC_dUsztaOxGruI2IXyGAAUF9SvQ0.cache +1 -0
  89. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/J_/J_D9clwKidN28hnVB1O3zEfKDwg90Usdb5ToKiPq_aw.cache +0 -0
  90. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Ji/JitNKkP1dYdu9ObSdIkkEAsiFxEmRO5oy1UIyhT_hYs.cache +0 -0
  91. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Jq/JqTLVvnY2AgGkHftWPwqt_HkbwhYRsmgHxk37VqKJAY.cache +0 -0
  92. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/QX/QXcp8DweOJ6BfMedGMfeHvVXv2hjDIleln1LSJk7vOE.cache +2 -0
  93. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Qy/Qy1ldbz6vKa_fv4E4ByxWslKFoV1qReQR5DKJ525z88.cache +1 -0
  94. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Rl/RlCJ_X5xFsE3VBDhkYrY7r_R6sMgiAc03cT8nr7Q2vY.cache +0 -0
  95. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Ta/TaYxNn81MhqC3DnMC6_y_Q7xap5Ntn4ggFo94EUaiak.cache +0 -0
  96. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Wq/WqbLVKOcTMZtttygYt_ncr1mGIDrzevSTaPGNmzV1D8.cache +1 -0
  97. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/YF/YF60qiQ28QMoYDrLmrbHWZr7X7bl5MxVPR5QrrVCFak.cache +1 -0
  98. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Yf/YfJJZvm_NONHd4eCasDibCcRapZ_WYIO5MUxSUUbYFk.cache +0 -0
  99. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/Z0/Z0e47cT2a-21U-w-3gkbgqC3o5jWnEzOB8vW06aJH1E.cache +0 -0
  100. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/_u/_uy-z8SVnhffUNelRxbPDL2aAUPb_GbqREXVsfy8uGc.cache +0 -0
  101. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/dL/dL7SLUWUIeVdyA1UuH-rvif0nzesOar3LdEtqzdb4bE.cache +0 -0
  102. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/f8/f8WT8jqR1qNIdQaRDpXbyLN7E5AWkbYFBwdh9Ozk7gk.cache +1 -0
  103. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/hk/hk2YB6skvc72qL4IzzQKU8Emyfe5vARjoD1bvQTw4zE.cache +1 -0
  104. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/iO/iOpDp_7ZvBNO5WIpTmqNewUl9bB2satqXWulyNvAaX8.cache +0 -0
  105. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/ii/iiJRBZIsxKiwyzU_Z7UtQeUTXMRJRPTreTKRvAWO7_8.cache +1 -0
  106. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/mj/mjuMepngMLrtgilLlJ9oTTSqoGO1YUww1rXphQ1pOm4.cache +0 -0
  107. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/qo/qo6SpT75QykYB63Aqq5bgzpXyNU1Y4dGFvCCJgoWQpE.cache +1 -0
  108. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/sp/sprzBMBliJDI__s-0D3q82tn1MpBkFV0N651hTr3XE8.cache +1 -0
  109. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/tM/tM6A7CR8QluP_u4u59vN1GjSZGNqNH3TXkkNzb9EPXA.cache +0 -0
  110. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/vO/vOXN0mER62j4JiPpMTSVS7MMqs0067cZx14vD5B8qiQ.cache +0 -0
  111. data/spec/dummy/tmp/cache/assets/sprockets/v3.0/zz/zzlQ_kom0liFOvGYDcjtVw6yAHOyA-bbzP8f0e_Tq1A.cache +1 -0
  112. data/spec/factories.rb +28 -0
  113. data/spec/generators/application_owner_generator_spec.rb +20 -0
  114. data/spec/generators/migration_generator_spec.rb +20 -0
  115. data/spec/generators/previous_refresh_token_generator_spec.rb +20 -0
  116. data/spec/generators/templates/routes.rb +3 -0
  117. data/spec/generators/tmp/dummy/db/migrate/20161012132809_create_doorkeeper_tables.rb +59 -0
  118. data/spec/helpers/doorkeeper/dashboard_helper_spec.rb +24 -0
  119. data/spec/lib/config_spec.rb +334 -0
  120. data/spec/lib/doorkeeper_spec.rb +28 -0
  121. data/spec/lib/models/expirable_spec.rb +51 -0
  122. data/spec/lib/models/revocable_spec.rb +59 -0
  123. data/spec/lib/models/scopes_spec.rb +43 -0
  124. data/spec/lib/oauth/authorization/uri_builder_spec.rb +42 -0
  125. data/spec/lib/oauth/authorization_code_request_spec.rb +80 -0
  126. data/spec/lib/oauth/client/credentials_spec.rb +47 -0
  127. data/spec/lib/oauth/client/methods_spec.rb +54 -0
  128. data/spec/lib/oauth/client_credentials/creator_spec.rb +44 -0
  129. data/spec/lib/oauth/client_credentials/issuer_spec.rb +86 -0
  130. data/spec/lib/oauth/client_credentials/validation_spec.rb +54 -0
  131. data/spec/lib/oauth/client_credentials_integration_spec.rb +27 -0
  132. data/spec/lib/oauth/client_credentials_request_spec.rb +104 -0
  133. data/spec/lib/oauth/client_spec.rb +39 -0
  134. data/spec/lib/oauth/code_request_spec.rb +45 -0
  135. data/spec/lib/oauth/code_response_spec.rb +34 -0
  136. data/spec/lib/oauth/error_response_spec.rb +61 -0
  137. data/spec/lib/oauth/error_spec.rb +23 -0
  138. data/spec/lib/oauth/forbidden_token_response_spec.rb +23 -0
  139. data/spec/lib/oauth/helpers/scope_checker_spec.rb +64 -0
  140. data/spec/lib/oauth/helpers/unique_token_spec.rb +20 -0
  141. data/spec/lib/oauth/helpers/uri_checker_spec.rb +104 -0
  142. data/spec/lib/oauth/invalid_token_response_spec.rb +28 -0
  143. data/spec/lib/oauth/password_access_token_request_spec.rb +90 -0
  144. data/spec/lib/oauth/pre_authorization_spec.rb +155 -0
  145. data/spec/lib/oauth/refresh_token_request_spec.rb +154 -0
  146. data/spec/lib/oauth/scopes_spec.rb +122 -0
  147. data/spec/lib/oauth/token_request_spec.rb +98 -0
  148. data/spec/lib/oauth/token_response_spec.rb +85 -0
  149. data/spec/lib/oauth/token_spec.rb +116 -0
  150. data/spec/lib/request/strategy_spec.rb +53 -0
  151. data/spec/lib/server_spec.rb +52 -0
  152. data/spec/models/doorkeeper/access_grant_spec.rb +36 -0
  153. data/spec/models/doorkeeper/access_token_spec.rb +394 -0
  154. data/spec/models/doorkeeper/application_spec.rb +179 -0
  155. data/spec/requests/applications/applications_request_spec.rb +94 -0
  156. data/spec/requests/applications/authorized_applications_spec.rb +30 -0
  157. data/spec/requests/endpoints/authorization_spec.rb +72 -0
  158. data/spec/requests/endpoints/token_spec.rb +64 -0
  159. data/spec/requests/flows/authorization_code_errors_spec.rb +66 -0
  160. data/spec/requests/flows/authorization_code_spec.rb +156 -0
  161. data/spec/requests/flows/client_credentials_spec.rb +58 -0
  162. data/spec/requests/flows/implicit_grant_errors_spec.rb +32 -0
  163. data/spec/requests/flows/implicit_grant_spec.rb +61 -0
  164. data/spec/requests/flows/password_spec.rb +115 -0
  165. data/spec/requests/flows/refresh_token_spec.rb +174 -0
  166. data/spec/requests/flows/revoke_token_spec.rb +157 -0
  167. data/spec/requests/flows/skip_authorization_spec.rb +59 -0
  168. data/spec/requests/protected_resources/metal_spec.rb +14 -0
  169. data/spec/requests/protected_resources/private_api_spec.rb +81 -0
  170. data/spec/routing/custom_controller_routes_spec.rb +71 -0
  171. data/spec/routing/default_routes_spec.rb +35 -0
  172. data/spec/routing/scoped_routes_spec.rb +31 -0
  173. data/spec/spec_helper.rb +2 -0
  174. data/spec/spec_helper_integration.rb +50 -0
  175. data/spec/stubs/config/application.rb +29 -0
  176. data/spec/stubs/config/initializers/db.rb +74 -0
  177. data/spec/stubs/generators/application_owner_generator_spec.rb +20 -0
  178. data/spec/stubs/generators/migration_generator_spec.rb +20 -0
  179. data/spec/stubs/generators/previous_refresh_token_generator_spec.rb +20 -0
  180. data/spec/stubs/generators/tmp/dummy/db/migrate/20161012132810_add_owner_to_application.rb +9 -0
  181. data/spec/stubs/models/user.rb +11 -0
  182. data/spec/stubs/spec_helper_integration.rb +50 -0
  183. data/spec/stubs/support/sequel.rb +0 -0
  184. data/spec/support/dependencies/factory_girl.rb +2 -0
  185. data/spec/support/helpers/access_token_request_helper.rb +11 -0
  186. data/spec/support/helpers/authorization_request_helper.rb +41 -0
  187. data/spec/support/helpers/config_helper.rb +9 -0
  188. data/spec/support/helpers/model_helper.rb +67 -0
  189. data/spec/support/helpers/request_spec_helper.rb +76 -0
  190. data/spec/support/helpers/url_helper.rb +55 -0
  191. data/spec/support/http_method_shim.rb +24 -0
  192. data/spec/support/orm/active_record.rb +3 -0
  193. data/spec/support/orm/sequel.rb +0 -0
  194. data/spec/support/shared/controllers_shared_context.rb +69 -0
  195. data/spec/support/shared/models_shared_examples.rb +52 -0
  196. data/spec/validators/redirect_uri_validator_spec.rb +78 -0
  197. metadata +570 -0
@@ -0,0 +1,174 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Refresh Token Flow' do
4
+ before do
5
+ Doorkeeper.configure do
6
+ orm DOORKEEPER_ORM
7
+ use_refresh_token
8
+ end
9
+ client_exists
10
+ end
11
+
12
+ context 'issuing a refresh token' do
13
+ before do
14
+ authorization_code_exists application: @client
15
+ end
16
+
17
+ it 'client gets the refresh token and refreshses it' do
18
+ post token_endpoint_url(code: @authorization.token, client: @client)
19
+
20
+ token = Doorkeeper::AccessToken.first
21
+
22
+ should_have_json 'access_token', token.token
23
+ should_have_json 'refresh_token', token.refresh_token
24
+
25
+ expect(@authorization.reload).to be_revoked
26
+
27
+ post refresh_token_endpoint_url(client: @client, refresh_token: token.refresh_token)
28
+
29
+ new_token = Doorkeeper::AccessToken.last
30
+ should_have_json 'access_token', new_token.token
31
+ should_have_json 'refresh_token', new_token.refresh_token
32
+
33
+ expect(token.token).not_to eq(new_token.token)
34
+ expect(token.refresh_token).not_to eq(new_token.refresh_token)
35
+ end
36
+ end
37
+
38
+ context 'refreshing the token' do
39
+ before do
40
+ @token = FactoryGirl.create(
41
+ :access_token,
42
+ application: @client,
43
+ resource_owner_id: 1,
44
+ use_refresh_token: true
45
+ )
46
+ end
47
+
48
+ context "refresh_token revoked on use" do
49
+ it 'client request a token with refresh token' do
50
+ post refresh_token_endpoint_url(
51
+ client: @client, refresh_token: @token.refresh_token
52
+ )
53
+ should_have_json(
54
+ 'refresh_token', Doorkeeper::AccessToken.last.refresh_token
55
+ )
56
+ expect(@token.reload).not_to be_revoked
57
+ end
58
+
59
+ it 'client request a token with expired access token' do
60
+ @token.update_attribute :expires_in, -100
61
+ post refresh_token_endpoint_url(
62
+ client: @client, refresh_token: @token.refresh_token
63
+ )
64
+ should_have_json(
65
+ 'refresh_token', Doorkeeper::AccessToken.last.refresh_token
66
+ )
67
+ expect(@token.reload).not_to be_revoked
68
+ end
69
+ end
70
+
71
+ context "refresh_token revoked on refresh_token request" do
72
+ before do
73
+ allow(Doorkeeper::AccessToken).to receive(:refresh_token_revoked_on_use?).and_return(false)
74
+ end
75
+
76
+ it 'client request a token with refresh token' do
77
+ post refresh_token_endpoint_url(
78
+ client: @client, refresh_token: @token.refresh_token
79
+ )
80
+ should_have_json(
81
+ 'refresh_token', Doorkeeper::AccessToken.last.refresh_token
82
+ )
83
+ expect(@token.reload).to be_revoked
84
+ end
85
+
86
+ it 'client request a token with expired access token' do
87
+ @token.update_attribute :expires_in, -100
88
+ post refresh_token_endpoint_url(
89
+ client: @client, refresh_token: @token.refresh_token
90
+ )
91
+ should_have_json(
92
+ 'refresh_token', Doorkeeper::AccessToken.last.refresh_token
93
+ )
94
+ expect(@token.reload).to be_revoked
95
+ end
96
+ end
97
+
98
+ it 'client gets an error for invalid refresh token' do
99
+ post refresh_token_endpoint_url(client: @client, refresh_token: 'invalid')
100
+ should_not_have_json 'refresh_token'
101
+ should_have_json 'error', 'invalid_grant'
102
+ end
103
+
104
+ it 'client gets an error for revoked acccess token' do
105
+ @token.revoke
106
+ post refresh_token_endpoint_url(client: @client, refresh_token: @token.refresh_token)
107
+ should_not_have_json 'refresh_token'
108
+ should_have_json 'error', 'invalid_grant'
109
+ end
110
+
111
+ it 'second of simultaneous client requests get an error for revoked acccess token' do
112
+ allow_any_instance_of(Doorkeeper::AccessToken).to receive(:revoked?).and_return(false, true)
113
+ post refresh_token_endpoint_url(client: @client, refresh_token: @token.refresh_token)
114
+
115
+ should_not_have_json 'refresh_token'
116
+ should_have_json 'error', 'invalid_request'
117
+ end
118
+ end
119
+
120
+ context 'refreshing the token with multiple sessions (devices)' do
121
+ before do
122
+ # enable password auth to simulate other devices
123
+ config_is_set(:grant_flows, ["password"])
124
+ config_is_set(:resource_owner_from_credentials) do
125
+ User.authenticate! params[:username], params[:password]
126
+ end
127
+ create_resource_owner
128
+ _another_token = post password_token_endpoint_url(
129
+ client: @client, resource_owner: @resource_owner
130
+ )
131
+ last_token.update_attribute :created_at, 5.seconds.ago
132
+
133
+ @token = FactoryGirl.create(
134
+ :access_token,
135
+ application: @client,
136
+ resource_owner_id: @resource_owner.id,
137
+ use_refresh_token: true
138
+ )
139
+ @token.update_attribute :expires_in, -100
140
+ end
141
+
142
+ context "refresh_token revoked on use" do
143
+ it 'client request a token after creating another token with the same user' do
144
+ post refresh_token_endpoint_url(
145
+ client: @client, refresh_token: @token.refresh_token
146
+ )
147
+
148
+ should_have_json 'refresh_token', last_token.refresh_token
149
+ expect(@token.reload).not_to be_revoked
150
+ end
151
+ end
152
+
153
+ context "refresh_token revoked on refresh_token request" do
154
+ before do
155
+ allow(Doorkeeper::AccessToken).to receive(:refresh_token_revoked_on_use?).and_return(false)
156
+ end
157
+
158
+ it 'client request a token after creating another token with the same user' do
159
+ post refresh_token_endpoint_url(
160
+ client: @client, refresh_token: @token.refresh_token
161
+ )
162
+
163
+ should_have_json 'refresh_token', last_token.refresh_token
164
+ expect(@token.reload).to be_revoked
165
+ end
166
+ end
167
+
168
+ def last_token
169
+ Doorkeeper::AccessToken.last_authorized_token_for(
170
+ @client.id, @resource_owner.id
171
+ )
172
+ end
173
+ end
174
+ end
@@ -0,0 +1,157 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Revoke Token Flow' do
4
+ before do
5
+ Doorkeeper.configure { orm DOORKEEPER_ORM }
6
+ end
7
+
8
+ context 'with default parameters' do
9
+ let(:client_application) { FactoryGirl.create :application }
10
+ let(:resource_owner) { User.create!(name: 'John', password: 'sekret') }
11
+ let(:access_token) do
12
+ FactoryGirl.create(:access_token,
13
+ application: client_application,
14
+ resource_owner_id: resource_owner.id,
15
+ use_refresh_token: true)
16
+ end
17
+
18
+ context 'with authenticated, confidential OAuth 2.0 client/application' do
19
+ let(:headers) do
20
+ client_id = client_application.uid
21
+ client_secret = client_application.secret
22
+ credentials = Base64.encode64("#{client_id}:#{client_secret}")
23
+ { 'HTTP_AUTHORIZATION' => "Basic #{credentials}" }
24
+ end
25
+
26
+ it 'should revoke the access token provided' do
27
+ post revocation_token_endpoint_url, { token: access_token.token }, headers
28
+
29
+ access_token.reload
30
+
31
+ expect(response).to be_success
32
+ expect(access_token.revoked?).to be_truthy
33
+ end
34
+
35
+ it 'should revoke the refresh token provided' do
36
+ post revocation_token_endpoint_url, { token: access_token.refresh_token }, headers
37
+
38
+ access_token.reload
39
+
40
+ expect(response).to be_success
41
+ expect(access_token.revoked?).to be_truthy
42
+ end
43
+
44
+ context 'with invalid token to revoke' do
45
+ it 'should not revoke any tokens and respond successfully' do
46
+ num_prev_revoked_tokens = Doorkeeper::AccessToken.where(revoked_at: nil).count
47
+ post revocation_token_endpoint_url, { token: 'I_AM_AN_INVALID_TOKEN' }, headers
48
+
49
+ # The authorization server responds with HTTP status code 200 even if
50
+ # token is invalid
51
+ expect(response).to be_success
52
+ expect(Doorkeeper::AccessToken.where(revoked_at: nil).count).to eq(num_prev_revoked_tokens)
53
+ end
54
+ end
55
+
56
+ context 'with bad credentials and a valid token' do
57
+ let(:headers) do
58
+ client_id = client_application.uid
59
+ credentials = Base64.encode64("#{client_id}:poop")
60
+ { 'HTTP_AUTHORIZATION' => "Basic #{credentials}" }
61
+ end
62
+ it 'should not revoke any tokens and respond successfully' do
63
+ post revocation_token_endpoint_url, { token: access_token.token }, headers
64
+
65
+ access_token.reload
66
+
67
+ expect(response).to be_success
68
+ expect(access_token.revoked?).to be_falsey
69
+ end
70
+ end
71
+
72
+ context 'with no credentials and a valid token' do
73
+ it 'should not revoke any tokens and respond successfully' do
74
+ post revocation_token_endpoint_url, { token: access_token.token }
75
+
76
+ access_token.reload
77
+
78
+ expect(response).to be_success
79
+ expect(access_token.revoked?).to be_falsey
80
+ end
81
+ end
82
+
83
+ context 'with valid token for another client application' do
84
+ let(:other_client_application) { FactoryGirl.create :application }
85
+ let(:headers) do
86
+ client_id = other_client_application.uid
87
+ client_secret = other_client_application.secret
88
+ credentials = Base64.encode64("#{client_id}:#{client_secret}")
89
+ { 'HTTP_AUTHORIZATION' => "Basic #{credentials}" }
90
+ end
91
+
92
+ it 'should not revoke the token as its unauthorized' do
93
+ post revocation_token_endpoint_url, { token: access_token.token }, headers
94
+
95
+ access_token.reload
96
+
97
+ expect(response).to be_success
98
+ expect(access_token.revoked?).to be_falsey
99
+ end
100
+ end
101
+ end
102
+
103
+ context 'with public OAuth 2.0 client/application' do
104
+ let(:access_token) do
105
+ FactoryGirl.create(:access_token,
106
+ application: nil,
107
+ resource_owner_id: resource_owner.id,
108
+ use_refresh_token: true)
109
+ end
110
+
111
+ it 'should revoke the access token provided' do
112
+ post revocation_token_endpoint_url, { token: access_token.token }
113
+
114
+ access_token.reload
115
+
116
+ expect(response).to be_success
117
+ expect(access_token.revoked?).to be_truthy
118
+ end
119
+
120
+ it 'should revoke the refresh token provided' do
121
+ post revocation_token_endpoint_url, { token: access_token.refresh_token }
122
+
123
+ access_token.reload
124
+
125
+ expect(response).to be_success
126
+ expect(access_token.revoked?).to be_truthy
127
+ end
128
+
129
+ context 'with a valid token issued for a confidential client' do
130
+ let(:access_token) do
131
+ FactoryGirl.create(:access_token,
132
+ application: client_application,
133
+ resource_owner_id: resource_owner.id,
134
+ use_refresh_token: true)
135
+ end
136
+
137
+ it 'should not revoke the access token provided' do
138
+ post revocation_token_endpoint_url, { token: access_token.token }
139
+
140
+ access_token.reload
141
+
142
+ expect(response).to be_success
143
+ expect(access_token.revoked?).to be_falsey
144
+ end
145
+
146
+ it 'should not revoke the refresh token provided' do
147
+ post revocation_token_endpoint_url, { token: access_token.token }
148
+
149
+ access_token.reload
150
+
151
+ expect(response).to be_success
152
+ expect(access_token.revoked?).to be_falsey
153
+ end
154
+ end
155
+ end
156
+ end
157
+ end
@@ -0,0 +1,59 @@
1
+ require 'spec_helper_integration'
2
+
3
+ feature 'Skip authorization form' do
4
+ background do
5
+ config_is_set(:authenticate_resource_owner) { User.first || redirect_to('/sign_in') }
6
+ client_exists
7
+ default_scopes_exist :public
8
+ optional_scopes_exist :write
9
+ end
10
+
11
+ context 'for previously authorized clients' do
12
+ background do
13
+ create_resource_owner
14
+ sign_in
15
+ end
16
+
17
+ scenario 'skips the authorization and return a new grant code' do
18
+ client_is_authorized(@client, @resource_owner, scopes: 'public')
19
+ visit authorization_endpoint_url(client: @client)
20
+
21
+ i_should_not_see 'Authorize'
22
+ client_should_be_authorized @client
23
+ i_should_be_on_client_callback @client
24
+ url_should_have_param 'code', Doorkeeper::AccessGrant.first.token
25
+ end
26
+
27
+ scenario 'does not skip authorization when scopes differ (new request has fewer scopes)' do
28
+ client_is_authorized(@client, @resource_owner, scopes: 'public write')
29
+ visit authorization_endpoint_url(client: @client, scope: 'public')
30
+ i_should_see 'Authorize'
31
+ end
32
+
33
+ scenario 'does not skip authorization when scopes differ (new request has more scopes)' do
34
+ client_is_authorized(@client, @resource_owner, scopes: 'public write')
35
+ visit authorization_endpoint_url(client: @client, scopes: 'public write email')
36
+ i_should_see 'Authorize'
37
+ end
38
+
39
+ scenario 'creates grant with new scope when scopes differ' do
40
+ client_is_authorized(@client, @resource_owner, scopes: 'public write')
41
+ visit authorization_endpoint_url(client: @client, scope: 'public')
42
+ click_on 'Authorize'
43
+ access_grant_should_have_scopes :public
44
+ end
45
+
46
+ scenario 'doesn not skip authorization when scopes are greater' do
47
+ client_is_authorized(@client, @resource_owner, scopes: 'public')
48
+ visit authorization_endpoint_url(client: @client, scope: 'public write')
49
+ i_should_see 'Authorize'
50
+ end
51
+
52
+ scenario 'creates grant with new scope when scopes are greater' do
53
+ client_is_authorized(@client, @resource_owner, scopes: 'public')
54
+ visit authorization_endpoint_url(client: @client, scope: 'public write')
55
+ click_on 'Authorize'
56
+ access_grant_should_have_scopes :public, :write
57
+ end
58
+ end
59
+ end
@@ -0,0 +1,14 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'ActionController::Metal API' do
4
+ before do
5
+ @client = FactoryGirl.create(:application)
6
+ @resource = User.create!(name: 'Joe', password: 'sekret')
7
+ @token = client_is_authorized(@client, @resource)
8
+ end
9
+
10
+ it 'client requests protected resource with valid token' do
11
+ get "/metal.json?access_token=#{@token.token}"
12
+ should_have_json 'ok', true
13
+ end
14
+ end
@@ -0,0 +1,81 @@
1
+ require 'spec_helper_integration'
2
+
3
+ feature 'Private API' do
4
+ background do
5
+ @client = FactoryGirl.create(:application)
6
+ @resource = User.create!(name: 'Joe', password: 'sekret')
7
+ @token = client_is_authorized(@client, @resource)
8
+ end
9
+
10
+ scenario 'client requests protected resource with valid token' do
11
+ with_access_token_header @token.token
12
+ visit '/full_protected_resources'
13
+ expect(page.body).to have_content('index')
14
+ end
15
+
16
+ scenario 'client requests protected resource with disabled header authentication' do
17
+ config_is_set :access_token_methods, [:from_access_token_param]
18
+ with_access_token_header @token.token
19
+ visit '/full_protected_resources'
20
+ response_status_should_be 401
21
+ end
22
+
23
+ scenario 'client attempts to request protected resource with invalid token' do
24
+ with_access_token_header 'invalid'
25
+ visit '/full_protected_resources'
26
+ response_status_should_be 401
27
+ end
28
+
29
+ scenario 'client attempts to request protected resource with expired token' do
30
+ @token.update_attribute :expires_in, -100 # expires token
31
+ with_access_token_header @token.token
32
+ visit '/full_protected_resources'
33
+ response_status_should_be 401
34
+ end
35
+
36
+ scenario 'client requests protected resource with permanent token' do
37
+ @token.update_attribute :expires_in, nil # never expires
38
+ with_access_token_header @token.token
39
+ visit '/full_protected_resources'
40
+ expect(page.body).to have_content('index')
41
+ end
42
+
43
+ scenario 'access token with no default scopes' do
44
+ Doorkeeper.configuration.instance_eval {
45
+ @default_scopes = Doorkeeper::OAuth::Scopes.from_array([:public])
46
+ @scopes = default_scopes + optional_scopes
47
+ }
48
+ @token.update_attribute :scopes, 'dummy'
49
+ with_access_token_header @token.token
50
+ visit '/full_protected_resources'
51
+ response_status_should_be 403
52
+ end
53
+
54
+ scenario 'access token with no allowed scopes' do
55
+ @token.update_attribute :scopes, nil
56
+ with_access_token_header @token.token
57
+ visit '/full_protected_resources/1.json'
58
+ response_status_should_be 403
59
+ end
60
+
61
+ scenario 'access token with one of allowed scopes' do
62
+ @token.update_attribute :scopes, 'admin'
63
+ with_access_token_header @token.token
64
+ visit '/full_protected_resources/1.json'
65
+ expect(page.body).to have_content('show')
66
+ end
67
+
68
+ scenario 'access token with another of allowed scopes' do
69
+ @token.update_attribute :scopes, 'write'
70
+ with_access_token_header @token.token
71
+ visit '/full_protected_resources/1.json'
72
+ expect(page.body).to have_content('show')
73
+ end
74
+
75
+ scenario 'access token with both allowed scopes' do
76
+ @token.update_attribute :scopes, 'write admin'
77
+ with_access_token_header @token.token
78
+ visit '/full_protected_resources/1.json'
79
+ expect(page.body).to have_content('show')
80
+ end
81
+ end
@@ -0,0 +1,71 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Custom controller for routes' do
4
+ it 'GET /space/scope/authorize routes to custom authorizations controller' do
5
+ expect(get('/inner_space/scope/authorize')).to route_to('custom_authorizations#new')
6
+ end
7
+
8
+ it 'POST /space/scope/authorize routes to custom authorizations controller' do
9
+ expect(post('/inner_space/scope/authorize')).to route_to('custom_authorizations#create')
10
+ end
11
+
12
+ it 'DELETE /space/scope/authorize routes to custom authorizations controller' do
13
+ expect(delete('/inner_space/scope/authorize')).to route_to('custom_authorizations#destroy')
14
+ end
15
+
16
+ it 'POST /space/scope/token routes to tokens controller' do
17
+ expect(post('/inner_space/scope/token')).to route_to('custom_authorizations#create')
18
+ end
19
+
20
+ it 'GET /space/scope/applications routes to applications controller' do
21
+ expect(get('/inner_space/scope/applications')).to route_to('custom_authorizations#index')
22
+ end
23
+
24
+ it 'GET /space/scope/token/info routes to the token_info controller' do
25
+ expect(get('/inner_space/scope/token/info')).to route_to('custom_authorizations#show')
26
+ end
27
+
28
+ it 'GET /space/oauth/authorize routes to custom authorizations controller' do
29
+ expect(get('/space/oauth/authorize')).to route_to('custom_authorizations#new')
30
+ end
31
+
32
+ it 'POST /space/oauth/authorize routes to custom authorizations controller' do
33
+ expect(post('/space/oauth/authorize')).to route_to('custom_authorizations#create')
34
+ end
35
+
36
+ it 'DELETE /space/oauth/authorize routes to custom authorizations controller' do
37
+ expect(delete('/space/oauth/authorize')).to route_to('custom_authorizations#destroy')
38
+ end
39
+
40
+ it 'POST /space/oauth/token routes to tokens controller' do
41
+ expect(post('/space/oauth/token')).to route_to('custom_authorizations#create')
42
+ end
43
+
44
+ it 'POST /space/oauth/revoke routes to tokens controller' do
45
+ expect(post('/space/oauth/revoke')).to route_to('custom_authorizations#revoke')
46
+ end
47
+
48
+ it 'GET /space/oauth/applications routes to applications controller' do
49
+ expect(get('/space/oauth/applications')).to route_to('custom_authorizations#index')
50
+ end
51
+
52
+ it 'GET /space/oauth/token/info routes to the token_info controller' do
53
+ expect(get('/space/oauth/token/info')).to route_to('custom_authorizations#show')
54
+ end
55
+
56
+ it 'POST /outer_space/oauth/token is not be routable' do
57
+ expect(post('/outer_space/oauth/token')).not_to be_routable
58
+ end
59
+
60
+ it 'GET /outer_space/oauth/authorize routes to custom authorizations controller' do
61
+ expect(get('/outer_space/oauth/authorize')).to be_routable
62
+ end
63
+
64
+ it 'GET /outer_space/oauth/applications is not routable' do
65
+ expect(get('/outer_space/oauth/applications')).not_to be_routable
66
+ end
67
+
68
+ it 'GET /outer_space/oauth/token_info is not routable' do
69
+ expect(get('/outer_space/oauth/token/info')).not_to be_routable
70
+ end
71
+ end
@@ -0,0 +1,35 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Default routes' do
4
+ it 'GET /oauth/authorize routes to authorizations controller' do
5
+ expect(get('/oauth/authorize')).to route_to('doorkeeper/authorizations#new')
6
+ end
7
+
8
+ it 'POST /oauth/authorize routes to authorizations controller' do
9
+ expect(post('/oauth/authorize')).to route_to('doorkeeper/authorizations#create')
10
+ end
11
+
12
+ it 'DELETE /oauth/authorize routes to authorizations controller' do
13
+ expect(delete('/oauth/authorize')).to route_to('doorkeeper/authorizations#destroy')
14
+ end
15
+
16
+ it 'POST /oauth/token routes to tokens controller' do
17
+ expect(post('/oauth/token')).to route_to('doorkeeper/tokens#create')
18
+ end
19
+
20
+ it 'POST /oauth/revoke routes to tokens controller' do
21
+ expect(post('/oauth/revoke')).to route_to('doorkeeper/tokens#revoke')
22
+ end
23
+
24
+ it 'GET /oauth/applications routes to applications controller' do
25
+ expect(get('/oauth/applications')).to route_to('doorkeeper/applications#index')
26
+ end
27
+
28
+ it 'GET /oauth/authorized_applications routes to authorized applications controller' do
29
+ expect(get('/oauth/authorized_applications')).to route_to('doorkeeper/authorized_applications#index')
30
+ end
31
+
32
+ it 'GET /oauth/token/info route to authorzed tokeninfo controller' do
33
+ expect(get('/oauth/token/info')).to route_to('doorkeeper/token_info#show')
34
+ end
35
+ end
@@ -0,0 +1,31 @@
1
+ require 'spec_helper_integration'
2
+
3
+ describe 'Scoped routes' do
4
+ it 'GET /scope/authorize routes to authorizations controller' do
5
+ expect(get('/scope/authorize')).to route_to('doorkeeper/authorizations#new')
6
+ end
7
+
8
+ it 'POST /scope/authorize routes to authorizations controller' do
9
+ expect(post('/scope/authorize')).to route_to('doorkeeper/authorizations#create')
10
+ end
11
+
12
+ it 'DELETE /scope/authorize routes to authorizations controller' do
13
+ expect(delete('/scope/authorize')).to route_to('doorkeeper/authorizations#destroy')
14
+ end
15
+
16
+ it 'POST /scope/token routes to tokens controller' do
17
+ expect(post('/scope/token')).to route_to('doorkeeper/tokens#create')
18
+ end
19
+
20
+ it 'GET /scope/applications routes to applications controller' do
21
+ expect(get('/scope/applications')).to route_to('doorkeeper/applications#index')
22
+ end
23
+
24
+ it 'GET /scope/authorized_applications routes to authorized applications controller' do
25
+ expect(get('/scope/authorized_applications')).to route_to('doorkeeper/authorized_applications#index')
26
+ end
27
+
28
+ it 'GET /scope/token/info route to authorzed tokeninfo controller' do
29
+ expect(get('/scope/token/info')).to route_to('doorkeeper/token_info#show')
30
+ end
31
+ end
@@ -0,0 +1,2 @@
1
+ $LOAD_PATH.unshift File.expand_path(File.join(File.dirname(__FILE__), '../lib'))
2
+ $LOAD_PATH.unshift File.expand_path(File.join(File.dirname(__FILE__), '../app'))
@@ -0,0 +1,50 @@
1
+ ENV['RAILS_ENV'] ||= 'test'
2
+
3
+ DOORKEEPER_ORM = :sequel
4
+
5
+ $LOAD_PATH.unshift File.dirname(__FILE__)
6
+
7
+ require 'capybara/rspec'
8
+ require 'dummy/config/environment'
9
+ require 'rspec/rails'
10
+ require 'generator_spec/test_case'
11
+ require 'timecop'
12
+
13
+ # Load JRuby SQLite3 if in that platform
14
+ begin
15
+ require 'jdbc/sqlite3'
16
+ Jdbc::SQLite3.load_driver
17
+ rescue LoadError
18
+ end
19
+
20
+ Rails.logger.info "====> Doorkeeper.orm = #{Doorkeeper.configuration.orm.inspect}"
21
+ Rails.logger.info "====> Rails version: #{Rails.version}"
22
+ Rails.logger.info "====> Ruby version: #{RUBY_VERSION}"
23
+
24
+ require "support/orm/#{DOORKEEPER_ORM}"
25
+
26
+ ENGINE_RAILS_ROOT = File.join(File.dirname(__FILE__), '../')
27
+
28
+ Dir["#{File.dirname(__FILE__)}/support/{dependencies,helpers,shared}/*.rb"].each { |f| require f }
29
+
30
+ # Remove after dropping support of Rails 4.2
31
+ require "#{File.dirname(__FILE__)}/support/http_method_shim.rb"
32
+
33
+ RSpec.configure do |config|
34
+ config.infer_spec_type_from_file_location!
35
+ config.mock_with :rspec
36
+
37
+ config.infer_base_class_for_anonymous_controllers = false
38
+
39
+ config.include RSpec::Rails::RequestExampleGroup, type: :request
40
+
41
+ config.before do
42
+ Doorkeeper.configure { orm DOORKEEPER_ORM }
43
+ end
44
+
45
+ config.around(:each) do |example|
46
+ DB.transaction(rollback: :always, auto_savepoint: true) { example.run }
47
+ end
48
+
49
+ config.order = 'random'
50
+ end