2019-12-26 22:10:19 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe 'OAuth tokens' do
|
2020-06-23 00:09:42 +05:30
|
|
|
include HttpBasicAuthHelpers
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
context 'Resource Owner Password Credentials' do
|
2020-06-23 00:09:42 +05:30
|
|
|
def request_oauth_token(user, headers = {})
|
|
|
|
post '/oauth/token',
|
|
|
|
params: { username: user.username, password: user.password, grant_type: 'password' },
|
|
|
|
headers: headers
|
2016-09-13 17:45:13 +05:30
|
|
|
end
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
let_it_be(:client) { create(:oauth_application) }
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
context 'when user has 2FA enabled' do
|
|
|
|
it 'does not create an access token' do
|
|
|
|
user = create(:user, :two_factor)
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
request_oauth_token(user, client_basic_auth_header(client))
|
2016-09-13 17:45:13 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:unauthorized)
|
2016-09-13 17:45:13 +05:30
|
|
|
expect(json_response['error']).to eq('invalid_grant')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user does not have 2FA enabled' do
|
2020-06-23 00:09:42 +05:30
|
|
|
# NOTE: using ROPS grant flow without client credentials will be deprecated
|
|
|
|
# and removed in the next version of Doorkeeper.
|
|
|
|
# See https://gitlab.com/gitlab-org/gitlab/-/issues/219137
|
|
|
|
context 'when no client credentials provided' do
|
|
|
|
it 'creates an access token' do
|
|
|
|
user = create(:user)
|
|
|
|
|
|
|
|
request_oauth_token(user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response['access_token']).not_to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when client credentials provided' do
|
|
|
|
context 'with valid credentials' do
|
|
|
|
it 'creates an access token' do
|
|
|
|
user = create(:user)
|
|
|
|
|
|
|
|
request_oauth_token(user, client_basic_auth_header(client))
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response['access_token']).not_to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with invalid credentials' do
|
|
|
|
it 'does not create an access token' do
|
|
|
|
# NOTE: remove this after update to Doorkeeper 5.5 or newer, see
|
|
|
|
# https://gitlab.com/gitlab-org/gitlab/-/issues/219137
|
|
|
|
pending 'Enable this example after upgrading Doorkeeper to 5.5 or newer'
|
|
|
|
|
|
|
|
user = create(:user)
|
2016-09-13 17:45:13 +05:30
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
request_oauth_token(user, basic_auth_header(client.uid, 'invalid secret'))
|
2016-09-13 17:45:13 +05:30
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:unauthorized)
|
|
|
|
expect(json_response['error']).to eq('invalid_client')
|
|
|
|
end
|
|
|
|
end
|
2016-09-13 17:45:13 +05:30
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-02-01 01:16:34 +05:30
|
|
|
shared_examples 'does not create an access token' do
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
it { expect(response).to have_gitlab_http_status(:unauthorized) }
|
2020-02-01 01:16:34 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user is blocked' do
|
|
|
|
before do
|
2017-08-17 22:00:37 +05:30
|
|
|
user.block
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
request_oauth_token(user, client_basic_auth_header(client))
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2020-02-01 01:16:34 +05:30
|
|
|
|
|
|
|
include_examples 'does not create an access token'
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2020-02-01 01:16:34 +05:30
|
|
|
context 'when user is ldap_blocked' do
|
|
|
|
before do
|
2017-08-17 22:00:37 +05:30
|
|
|
user.ldap_block
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
request_oauth_token(user, client_basic_auth_header(client))
|
2020-02-01 01:16:34 +05:30
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-02-01 01:16:34 +05:30
|
|
|
include_examples 'does not create an access token'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user account is not confirmed' do
|
|
|
|
before do
|
|
|
|
user.update!(confirmed_at: nil)
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
request_oauth_token(user, client_basic_auth_header(client))
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2020-02-01 01:16:34 +05:30
|
|
|
|
|
|
|
include_examples 'does not create an access token'
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2016-09-13 17:45:13 +05:30
|
|
|
end
|
|
|
|
end
|