doorkeeper 5.2.6 → 5.3.3
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of doorkeeper might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/Appraisals +2 -2
- data/CHANGELOG.md +24 -5
- data/Gemfile +2 -2
- data/app/controllers/doorkeeper/application_controller.rb +2 -2
- data/app/controllers/doorkeeper/application_metal_controller.rb +2 -2
- data/app/controllers/doorkeeper/authorizations_controller.rb +2 -2
- data/app/controllers/doorkeeper/authorized_applications_controller.rb +2 -2
- data/gemfiles/rails_5_0.gemfile +2 -2
- data/gemfiles/rails_5_1.gemfile +2 -2
- data/gemfiles/rails_5_2.gemfile +2 -2
- data/gemfiles/rails_6_0.gemfile +2 -2
- data/gemfiles/rails_master.gemfile +2 -2
- data/lib/doorkeeper/config.rb +71 -38
- data/lib/doorkeeper/grape/helpers.rb +1 -1
- data/lib/doorkeeper/helpers/controller.rb +10 -8
- data/lib/doorkeeper/models/access_grant_mixin.rb +7 -6
- data/lib/doorkeeper/models/access_token_mixin.rb +54 -16
- data/lib/doorkeeper/models/application_mixin.rb +3 -3
- data/lib/doorkeeper/models/concerns/ownership.rb +1 -1
- data/lib/doorkeeper/models/concerns/reusable.rb +1 -1
- data/lib/doorkeeper/models/concerns/revocable.rb +0 -27
- data/lib/doorkeeper/oauth/authorization/code.rb +4 -4
- data/lib/doorkeeper/oauth/authorization/token.rb +9 -6
- data/lib/doorkeeper/oauth/authorization_code_request.rb +13 -6
- data/lib/doorkeeper/oauth/base_request.rb +8 -4
- data/lib/doorkeeper/oauth/client.rb +7 -8
- data/lib/doorkeeper/oauth/client_credentials/creator.rb +16 -9
- data/lib/doorkeeper/oauth/client_credentials/issuer.rb +7 -7
- data/lib/doorkeeper/oauth/client_credentials/{validation.rb → validator.rb} +4 -4
- data/lib/doorkeeper/oauth/client_credentials_request.rb +1 -1
- data/lib/doorkeeper/oauth/code_response.rb +2 -2
- data/lib/doorkeeper/oauth/error.rb +1 -1
- data/lib/doorkeeper/oauth/error_response.rb +5 -5
- data/lib/doorkeeper/oauth/helpers/scope_checker.rb +7 -5
- data/lib/doorkeeper/oauth/helpers/unique_token.rb +8 -5
- data/lib/doorkeeper/oauth/helpers/uri_checker.rb +1 -1
- data/lib/doorkeeper/oauth/invalid_request_response.rb +3 -3
- data/lib/doorkeeper/oauth/invalid_token_response.rb +5 -2
- data/lib/doorkeeper/oauth/password_access_token_request.rb +3 -3
- data/lib/doorkeeper/oauth/pre_authorization.rb +7 -5
- data/lib/doorkeeper/oauth/refresh_token_request.rb +5 -5
- data/lib/doorkeeper/oauth/token.rb +2 -2
- data/lib/doorkeeper/oauth/token_introspection.rb +6 -6
- data/lib/doorkeeper/orm/active_record/access_grant.rb +4 -43
- data/lib/doorkeeper/orm/active_record/access_token.rb +4 -35
- data/lib/doorkeeper/orm/active_record/application.rb +3 -155
- data/lib/doorkeeper/orm/active_record/mixins/access_grant.rb +53 -0
- data/lib/doorkeeper/orm/active_record/mixins/access_token.rb +47 -0
- data/lib/doorkeeper/orm/active_record/mixins/application.rb +187 -0
- data/lib/doorkeeper/orm/active_record/redirect_uri_validator.rb +3 -3
- data/lib/doorkeeper/orm/active_record.rb +3 -3
- data/lib/doorkeeper/rails/helpers.rb +4 -4
- data/lib/doorkeeper/rails/routes.rb +5 -7
- data/lib/doorkeeper/rake/db.rake +3 -3
- data/lib/doorkeeper/request/authorization_code.rb +3 -3
- data/lib/doorkeeper/request/client_credentials.rb +2 -2
- data/lib/doorkeeper/request/password.rb +2 -2
- data/lib/doorkeeper/request/refresh_token.rb +3 -3
- data/lib/doorkeeper/request.rb +1 -1
- data/lib/doorkeeper/server.rb +1 -1
- data/lib/doorkeeper/stale_records_cleaner.rb +1 -1
- data/lib/doorkeeper/version.rb +2 -2
- data/lib/doorkeeper.rb +2 -3
- data/lib/generators/doorkeeper/application_owner_generator.rb +1 -1
- data/lib/generators/doorkeeper/confidential_applications_generator.rb +1 -1
- data/lib/generators/doorkeeper/migration_generator.rb +1 -1
- data/lib/generators/doorkeeper/pkce_generator.rb +1 -1
- data/lib/generators/doorkeeper/previous_refresh_token_generator.rb +2 -2
- data/lib/generators/doorkeeper/templates/initializer.rb +39 -0
- data/spec/controllers/application_metal_controller_spec.rb +1 -1
- data/spec/controllers/applications_controller_spec.rb +3 -2
- data/spec/controllers/authorizations_controller_spec.rb +18 -18
- data/spec/controllers/protected_resources_controller_spec.rb +25 -17
- data/spec/controllers/token_info_controller_spec.rb +1 -1
- data/spec/controllers/tokens_controller_spec.rb +1 -1
- data/spec/dummy/db/migrate/20151223192035_create_doorkeeper_tables.rb +3 -3
- data/spec/dummy/db/migrate/20160320211015_add_previous_refresh_token_to_access_tokens.rb +1 -1
- data/spec/dummy/db/migrate/20180210183654_add_confidential_to_applications.rb +1 -1
- data/spec/generators/install_generator_spec.rb +1 -1
- data/spec/generators/previous_refresh_token_generator_spec.rb +2 -2
- data/spec/helpers/doorkeeper/dashboard_helper_spec.rb +1 -1
- data/spec/lib/config_spec.rb +62 -7
- data/spec/lib/doorkeeper_spec.rb +1 -1
- data/spec/lib/models/revocable_spec.rb +3 -3
- data/spec/lib/oauth/authorization_code_request_spec.rb +127 -125
- data/spec/lib/oauth/base_request_spec.rb +160 -158
- data/spec/lib/oauth/base_response_spec.rb +27 -29
- data/spec/lib/oauth/client/credentials_spec.rb +1 -1
- data/spec/lib/oauth/client_credentials/creator_spec.rb +42 -5
- data/spec/lib/oauth/client_credentials/issuer_spec.rb +12 -12
- data/spec/lib/oauth/client_credentials/validation_spec.rb +4 -4
- data/spec/lib/oauth/client_credentials_integration_spec.rb +16 -18
- data/spec/lib/oauth/client_credentials_request_spec.rb +78 -80
- data/spec/lib/oauth/client_spec.rb +26 -26
- data/spec/lib/oauth/code_request_spec.rb +34 -34
- data/spec/lib/oauth/code_response_spec.rb +21 -25
- data/spec/lib/oauth/error_response_spec.rb +42 -44
- data/spec/lib/oauth/error_spec.rb +12 -14
- data/spec/lib/oauth/forbidden_token_response_spec.rb +11 -13
- data/spec/lib/oauth/helpers/scope_checker_spec.rb +30 -18
- data/spec/lib/oauth/invalid_request_response_spec.rb +48 -50
- data/spec/lib/oauth/invalid_token_response_spec.rb +32 -34
- data/spec/lib/oauth/password_access_token_request_spec.rb +145 -147
- data/spec/lib/oauth/pre_authorization_spec.rb +159 -161
- data/spec/lib/oauth/refresh_token_request_spec.rb +138 -139
- data/spec/lib/oauth/scopes_spec.rb +104 -106
- data/spec/lib/oauth/token_request_spec.rb +115 -111
- data/spec/lib/oauth/token_response_spec.rb +71 -73
- data/spec/lib/oauth/token_spec.rb +121 -123
- data/spec/models/doorkeeper/access_grant_spec.rb +3 -5
- data/spec/models/doorkeeper/access_token_spec.rb +7 -7
- data/spec/models/doorkeeper/application_spec.rb +2 -2
- data/spec/requests/applications/applications_request_spec.rb +1 -1
- data/spec/requests/endpoints/authorization_spec.rb +5 -3
- data/spec/requests/flows/authorization_code_spec.rb +34 -22
- data/spec/requests/flows/client_credentials_spec.rb +1 -1
- data/spec/requests/flows/password_spec.rb +32 -12
- data/spec/requests/flows/refresh_token_spec.rb +19 -19
- data/spec/requests/flows/revoke_token_spec.rb +18 -12
- data/spec/spec_helper.rb +1 -4
- data/spec/support/shared/controllers_shared_context.rb +33 -23
- data/spec/validators/redirect_uri_validator_spec.rb +1 -1
- metadata +6 -5
- data/spec/support/http_method_shim.rb +0 -29
@@ -2,28 +2,26 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
|
7
|
-
let(:server) { Doorkeeper.configuration }
|
5
|
+
describe Doorkeeper::OAuth::ClientCredentialsRequest do
|
6
|
+
let(:server) { Doorkeeper.configuration }
|
8
7
|
|
9
|
-
|
10
|
-
|
8
|
+
context "with a valid request" do
|
9
|
+
let(:client) { FactoryBot.create :application }
|
11
10
|
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
end
|
11
|
+
it "issues an access token" do
|
12
|
+
request = Doorkeeper::OAuth::ClientCredentialsRequest.new(server, client, {})
|
13
|
+
expect do
|
14
|
+
request.authorize
|
15
|
+
end.to change { Doorkeeper::AccessToken.count }.by(1)
|
18
16
|
end
|
17
|
+
end
|
19
18
|
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
end
|
19
|
+
describe "with an invalid request" do
|
20
|
+
it "does not issue an access token" do
|
21
|
+
request = Doorkeeper::OAuth::ClientCredentialsRequest.new(server, nil, {})
|
22
|
+
expect do
|
23
|
+
request.authorize
|
24
|
+
end.to_not(change { Doorkeeper::AccessToken.count })
|
27
25
|
end
|
28
26
|
end
|
29
27
|
end
|
@@ -2,108 +2,106 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
end
|
5
|
+
describe Doorkeeper::OAuth::ClientCredentialsRequest do
|
6
|
+
let(:server) do
|
7
|
+
double(
|
8
|
+
default_scopes: nil,
|
9
|
+
access_token_expires_in: 2.hours,
|
10
|
+
custom_access_token_expires_in: ->(_context) { nil },
|
11
|
+
)
|
12
|
+
end
|
14
13
|
|
15
|
-
|
16
|
-
|
17
|
-
|
14
|
+
let(:application) { FactoryBot.create(:application, scopes: "") }
|
15
|
+
let(:client) { double :client, application: application }
|
16
|
+
let(:token_creator) { double :issuer, create: true, token: double }
|
18
17
|
|
19
|
-
|
20
|
-
|
21
|
-
|
18
|
+
before do
|
19
|
+
allow(server).to receive(:option_defined?).with(:custom_access_token_expires_in).and_return(true)
|
20
|
+
end
|
21
|
+
|
22
|
+
subject { Doorkeeper::OAuth::ClientCredentialsRequest.new(server, client) }
|
23
|
+
|
24
|
+
before do
|
25
|
+
subject.issuer = token_creator
|
26
|
+
end
|
27
|
+
|
28
|
+
it "issues an access token for the current client" do
|
29
|
+
expect(token_creator).to receive(:create).with(client, nil)
|
30
|
+
subject.authorize
|
31
|
+
end
|
22
32
|
|
23
|
-
|
33
|
+
it "has successful response when issue was created" do
|
34
|
+
subject.authorize
|
35
|
+
expect(subject.response).to be_a(Doorkeeper::OAuth::TokenResponse)
|
36
|
+
end
|
24
37
|
|
38
|
+
context "if issue was not created" do
|
25
39
|
before do
|
26
|
-
subject.issuer =
|
40
|
+
subject.issuer = double create: false, error: :invalid
|
27
41
|
end
|
28
42
|
|
29
|
-
it "
|
30
|
-
expect(token_creator).to receive(:create).with(client, nil)
|
43
|
+
it "has an error response" do
|
31
44
|
subject.authorize
|
45
|
+
expect(subject.response).to be_a(Doorkeeper::OAuth::ErrorResponse)
|
32
46
|
end
|
33
47
|
|
34
|
-
it "
|
48
|
+
it "delegates the error to issuer" do
|
35
49
|
subject.authorize
|
36
|
-
expect(subject.
|
50
|
+
expect(subject.error).to eq(:invalid)
|
37
51
|
end
|
52
|
+
end
|
38
53
|
|
39
|
-
|
40
|
-
|
41
|
-
subject.issuer = double create: false, error: :invalid
|
42
|
-
end
|
54
|
+
context "with scopes" do
|
55
|
+
let(:default_scopes) { Doorkeeper::OAuth::Scopes.from_string("public email") }
|
43
56
|
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
end
|
57
|
+
before do
|
58
|
+
allow(server).to receive(:default_scopes).and_return(default_scopes)
|
59
|
+
end
|
48
60
|
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
end
|
61
|
+
it "issues an access token with default scopes if none was requested" do
|
62
|
+
expect(token_creator).to receive(:create).with(client, default_scopes)
|
63
|
+
subject.authorize
|
53
64
|
end
|
54
65
|
|
55
|
-
|
56
|
-
|
66
|
+
it "issues an access token with requested scopes" do
|
67
|
+
subject = Doorkeeper::OAuth::ClientCredentialsRequest.new(server, client, scope: "email")
|
68
|
+
subject.issuer = token_creator
|
69
|
+
expect(token_creator).to receive(:create).with(client, Doorkeeper::OAuth::Scopes.from_string("email"))
|
70
|
+
subject.authorize
|
71
|
+
end
|
72
|
+
end
|
57
73
|
|
58
|
-
|
59
|
-
|
60
|
-
|
74
|
+
context "with restricted client" do
|
75
|
+
let(:default_scopes) do
|
76
|
+
Doorkeeper::OAuth::Scopes.from_string("public email")
|
77
|
+
end
|
78
|
+
let(:server_scopes) do
|
79
|
+
Doorkeeper::OAuth::Scopes.from_string("public email phone")
|
80
|
+
end
|
81
|
+
let(:client_scopes) do
|
82
|
+
Doorkeeper::OAuth::Scopes.from_string("public phone")
|
83
|
+
end
|
61
84
|
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
85
|
+
before do
|
86
|
+
allow(server).to receive(:default_scopes).and_return(default_scopes)
|
87
|
+
allow(server).to receive(:scopes).and_return(server_scopes)
|
88
|
+
allow(server).to receive(:access_token_expires_in).and_return(100)
|
89
|
+
allow(application).to receive(:scopes).and_return(client_scopes)
|
90
|
+
allow(client).to receive(:id).and_return(nil)
|
91
|
+
end
|
66
92
|
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
end
|
93
|
+
it "delegates the error to issuer if no scope was requested" do
|
94
|
+
subject = Doorkeeper::OAuth::ClientCredentialsRequest.new(server, client)
|
95
|
+
subject.authorize
|
96
|
+
expect(subject.response).to be_a(Doorkeeper::OAuth::ErrorResponse)
|
97
|
+
expect(subject.error).to eq(:invalid_scope)
|
73
98
|
end
|
74
99
|
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
Doorkeeper::OAuth::Scopes.from_string("public email phone")
|
81
|
-
end
|
82
|
-
let(:client_scopes) do
|
83
|
-
Doorkeeper::OAuth::Scopes.from_string("public phone")
|
84
|
-
end
|
85
|
-
|
86
|
-
before do
|
87
|
-
allow(server).to receive(:default_scopes).and_return(default_scopes)
|
88
|
-
allow(server).to receive(:scopes).and_return(server_scopes)
|
89
|
-
allow(server).to receive(:access_token_expires_in).and_return(100)
|
90
|
-
allow(application).to receive(:scopes).and_return(client_scopes)
|
91
|
-
allow(client).to receive(:id).and_return(nil)
|
92
|
-
end
|
93
|
-
|
94
|
-
it "delegates the error to issuer if no scope was requested" do
|
95
|
-
subject = ClientCredentialsRequest.new(server, client)
|
96
|
-
subject.authorize
|
97
|
-
expect(subject.response).to be_a(Doorkeeper::OAuth::ErrorResponse)
|
98
|
-
expect(subject.error).to eq(:invalid_scope)
|
99
|
-
end
|
100
|
-
|
101
|
-
it "issues an access token with requested scopes" do
|
102
|
-
subject = ClientCredentialsRequest.new(server, client, scope: "phone")
|
103
|
-
subject.authorize
|
104
|
-
expect(subject.response).to be_a(Doorkeeper::OAuth::TokenResponse)
|
105
|
-
expect(subject.response.token.scopes_string).to eq("phone")
|
106
|
-
end
|
100
|
+
it "issues an access token with requested scopes" do
|
101
|
+
subject = Doorkeeper::OAuth::ClientCredentialsRequest.new(server, client, scope: "phone")
|
102
|
+
subject.authorize
|
103
|
+
expect(subject.response).to be_a(Doorkeeper::OAuth::TokenResponse)
|
104
|
+
expect(subject.response.token.scopes_string).to eq("phone")
|
107
105
|
end
|
108
106
|
end
|
109
107
|
end
|
@@ -2,37 +2,37 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
describe
|
7
|
-
|
8
|
-
let(:method) { double }
|
5
|
+
describe Doorkeeper::OAuth::Client do
|
6
|
+
describe :find do
|
7
|
+
let(:method) { double }
|
9
8
|
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
9
|
+
it "finds the client via uid" do
|
10
|
+
client = double
|
11
|
+
expect(method).to receive(:call).with("uid").and_return(client)
|
12
|
+
expect(Doorkeeper::OAuth::Client.find("uid", method))
|
13
|
+
.to be_a(Doorkeeper::OAuth::Client)
|
14
|
+
end
|
15
15
|
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
end
|
16
|
+
it "returns nil if client was not found" do
|
17
|
+
expect(method).to receive(:call).with("uid").and_return(nil)
|
18
|
+
expect(Doorkeeper::OAuth::Client.find("uid", method)).to be_nil
|
20
19
|
end
|
20
|
+
end
|
21
21
|
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
22
|
+
describe ".authenticate" do
|
23
|
+
it "returns the authenticated client via credentials" do
|
24
|
+
credentials = Doorkeeper::OAuth::Client::Credentials.new("some-uid", "some-secret")
|
25
|
+
authenticator = double
|
26
|
+
expect(authenticator).to receive(:call).with("some-uid", "some-secret").and_return(double)
|
27
|
+
expect(Doorkeeper::OAuth::Client.authenticate(credentials, authenticator))
|
28
|
+
.to be_a(Doorkeeper::OAuth::Client)
|
29
|
+
end
|
29
30
|
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
end
|
31
|
+
it "returns nil if client was not authenticated" do
|
32
|
+
credentials = Doorkeeper::OAuth::Client::Credentials.new("some-uid", "some-secret")
|
33
|
+
authenticator = double
|
34
|
+
expect(authenticator).to receive(:call).with("some-uid", "some-secret").and_return(nil)
|
35
|
+
expect(Doorkeeper::OAuth::Client.authenticate(credentials, authenticator)).to be_nil
|
36
36
|
end
|
37
37
|
end
|
38
38
|
end
|
@@ -2,45 +2,45 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
5
|
+
describe Doorkeeper::OAuth::CodeRequest do
|
6
|
+
let(:pre_auth) do
|
7
|
+
server = Doorkeeper.configuration
|
8
|
+
allow(server)
|
9
|
+
.to receive(:default_scopes).and_return(Doorkeeper::OAuth::Scopes.from_string("public"))
|
10
|
+
allow(server)
|
11
|
+
.to receive(:grant_flows).and_return(Doorkeeper::OAuth::Scopes.from_string("authorization_code"))
|
12
|
+
|
13
|
+
application = FactoryBot.create(:application, scopes: "public")
|
14
|
+
client = Doorkeeper::OAuth::Client.new(application)
|
15
|
+
|
16
|
+
attributes = {
|
17
|
+
client_id: client.uid,
|
18
|
+
response_type: "code",
|
19
|
+
redirect_uri: "https://app.com/callback",
|
20
|
+
}
|
21
|
+
|
22
|
+
pre_auth = Doorkeeper::OAuth::PreAuthorization.new(server, attributes)
|
23
|
+
pre_auth.authorizable?
|
24
|
+
pre_auth
|
25
|
+
end
|
25
26
|
|
26
|
-
|
27
|
+
let(:owner) { double :owner, id: 8900 }
|
27
28
|
|
28
|
-
|
29
|
-
|
30
|
-
|
29
|
+
subject do
|
30
|
+
described_class.new(pre_auth, owner)
|
31
|
+
end
|
31
32
|
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
end
|
33
|
+
context "when pre_auth is authorized" do
|
34
|
+
it "creates an access grant and returns a code response" do
|
35
|
+
expect { subject.authorize }.to change { Doorkeeper::AccessGrant.count }.by(1)
|
36
|
+
expect(subject.authorize).to be_a(Doorkeeper::OAuth::CodeResponse)
|
37
37
|
end
|
38
|
+
end
|
38
39
|
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
end
|
40
|
+
context "when pre_auth is denied" do
|
41
|
+
it "does not create access grant and returns a error response" do
|
42
|
+
expect { subject.deny }.not_to(change { Doorkeeper::AccessGrant.count })
|
43
|
+
expect(subject.deny).to be_a(Doorkeeper::OAuth::ErrorResponse)
|
44
44
|
end
|
45
45
|
end
|
46
46
|
end
|
@@ -2,34 +2,30 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
)
|
18
|
-
end
|
5
|
+
describe Doorkeeper::OAuth::CodeResponse do
|
6
|
+
describe "#redirect_uri" do
|
7
|
+
context "when generating the redirect URI for an implicit grant" do
|
8
|
+
let :pre_auth do
|
9
|
+
double(
|
10
|
+
:pre_auth,
|
11
|
+
client: double(:application, id: 1),
|
12
|
+
redirect_uri: "http://tst.com/cb",
|
13
|
+
state: nil,
|
14
|
+
scopes: Doorkeeper::OAuth::Scopes.from_string("public"),
|
15
|
+
)
|
16
|
+
end
|
19
17
|
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
18
|
+
let :auth do
|
19
|
+
Doorkeeper::OAuth::Authorization::Token.new(pre_auth, double(id: 1)).tap do |c|
|
20
|
+
c.issue_token
|
21
|
+
allow(c.token).to receive(:expires_in_seconds).and_return(3600)
|
22
|
+
end
|
23
|
+
end
|
26
24
|
|
27
|
-
|
25
|
+
subject { described_class.new(pre_auth, auth, response_on_fragment: true).redirect_uri }
|
28
26
|
|
29
|
-
|
30
|
-
|
31
|
-
end
|
32
|
-
end
|
27
|
+
it "includes the remaining TTL of the token relative to the time the token was generated" do
|
28
|
+
expect(subject).to include("expires_in=3600")
|
33
29
|
end
|
34
30
|
end
|
35
31
|
end
|
@@ -2,65 +2,63 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
describe
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
end
|
5
|
+
describe Doorkeeper::OAuth::ErrorResponse do
|
6
|
+
describe "#status" do
|
7
|
+
it "should have a status of bad_request" do
|
8
|
+
expect(subject.status).to eq(:bad_request)
|
9
|
+
end
|
11
10
|
|
12
|
-
|
13
|
-
|
11
|
+
it "should have a status of unauthorized for an invalid_client error" do
|
12
|
+
subject = described_class.new(name: :invalid_client)
|
14
13
|
|
15
|
-
|
16
|
-
end
|
14
|
+
expect(subject.status).to eq(:unauthorized)
|
17
15
|
end
|
16
|
+
end
|
18
17
|
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
it "ignores state if request does not respond to state" do
|
26
|
-
error = ErrorResponse.from_request double(error: :some_error)
|
27
|
-
expect(error.state).to be_nil
|
28
|
-
end
|
18
|
+
describe ".from_request" do
|
19
|
+
it "has the error from request" do
|
20
|
+
error = described_class.from_request double(error: :some_error)
|
21
|
+
expect(error.name).to eq(:some_error)
|
22
|
+
end
|
29
23
|
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
end
|
24
|
+
it "ignores state if request does not respond to state" do
|
25
|
+
error = described_class.from_request double(error: :some_error)
|
26
|
+
expect(error.state).to be_nil
|
34
27
|
end
|
35
28
|
|
36
|
-
it "
|
37
|
-
|
38
|
-
expect(
|
29
|
+
it "has state if request responds to state" do
|
30
|
+
error = described_class.from_request double(error: :some_error, state: :hello)
|
31
|
+
expect(error.state).to eq(:hello)
|
39
32
|
end
|
33
|
+
end
|
34
|
+
|
35
|
+
it "ignores empty error values" do
|
36
|
+
subject = described_class.new(error: :some_error, state: nil)
|
37
|
+
expect(subject.body).not_to have_key(:state)
|
38
|
+
end
|
40
39
|
|
41
|
-
|
42
|
-
|
40
|
+
describe ".body" do
|
41
|
+
subject { described_class.new(name: :some_error, state: :some_state).body }
|
43
42
|
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
end
|
43
|
+
describe "#body" do
|
44
|
+
it { expect(subject).to have_key(:error) }
|
45
|
+
it { expect(subject).to have_key(:error_description) }
|
46
|
+
it { expect(subject).to have_key(:state) }
|
49
47
|
end
|
48
|
+
end
|
50
49
|
|
51
|
-
|
52
|
-
|
53
|
-
|
50
|
+
describe ".headers" do
|
51
|
+
let(:error_response) { described_class.new(name: :some_error, state: :some_state) }
|
52
|
+
subject { error_response.headers }
|
54
53
|
|
55
|
-
|
54
|
+
it { expect(subject).to include "WWW-Authenticate" }
|
56
55
|
|
57
|
-
|
58
|
-
|
56
|
+
describe "WWW-Authenticate header" do
|
57
|
+
subject { error_response.headers["WWW-Authenticate"] }
|
59
58
|
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
end
|
59
|
+
it { expect(subject).to include("realm=\"#{error_response.realm}\"") }
|
60
|
+
it { expect(subject).to include("error=\"#{error_response.name}\"") }
|
61
|
+
it { expect(subject).to include("error_description=\"#{error_response.description}\"") }
|
64
62
|
end
|
65
63
|
end
|
66
64
|
end
|
@@ -2,22 +2,20 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
|
7
|
-
subject(:error) { Error.new(:some_error, :some_state) }
|
5
|
+
describe Doorkeeper::OAuth::Error do
|
6
|
+
subject(:error) { described_class.new(:some_error, :some_state) }
|
8
7
|
|
9
|
-
|
10
|
-
|
8
|
+
it { expect(subject).to respond_to(:name) }
|
9
|
+
it { expect(subject).to respond_to(:state) }
|
11
10
|
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
end
|
11
|
+
describe "#description" do
|
12
|
+
it "is translated from translation messages" do
|
13
|
+
expect(I18n).to receive(:translate).with(
|
14
|
+
:some_error,
|
15
|
+
scope: %i[doorkeeper errors messages],
|
16
|
+
default: :server_error,
|
17
|
+
)
|
18
|
+
error.description
|
21
19
|
end
|
22
20
|
end
|
23
21
|
end
|
@@ -2,21 +2,19 @@
|
|
2
2
|
|
3
3
|
require "spec_helper"
|
4
4
|
|
5
|
-
|
6
|
-
describe
|
7
|
-
|
8
|
-
|
9
|
-
end
|
5
|
+
describe Doorkeeper::OAuth::ForbiddenTokenResponse do
|
6
|
+
describe "#name" do
|
7
|
+
it { expect(subject.name).to eq(:invalid_scope) }
|
8
|
+
end
|
10
9
|
|
11
|
-
|
12
|
-
|
13
|
-
|
10
|
+
describe "#status" do
|
11
|
+
it { expect(subject.status).to eq(:forbidden) }
|
12
|
+
end
|
14
13
|
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
end
|
14
|
+
describe ".from_scopes" do
|
15
|
+
it "should have a list of acceptable scopes" do
|
16
|
+
response = described_class.from_scopes(["public"])
|
17
|
+
expect(response.description).to include("public")
|
20
18
|
end
|
21
19
|
end
|
22
20
|
end
|