2019-12-04 20:38:33 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe OauthAccessToken do
|
2019-12-04 20:38:33 +05:30
|
|
|
let(:user) { create(:user) }
|
|
|
|
let(:app_one) { create(:oauth_application) }
|
|
|
|
let(:app_two) { create(:oauth_application) }
|
|
|
|
let(:app_three) { create(:oauth_application) }
|
2022-08-13 15:12:31 +05:30
|
|
|
let(:token) { create(:oauth_access_token, application_id: app_one.id) }
|
2019-12-04 20:38:33 +05:30
|
|
|
|
2022-08-13 15:12:31 +05:30
|
|
|
describe 'scopes' do
|
|
|
|
describe '.latest_per_application' do
|
|
|
|
let!(:app_two_token1) { create(:oauth_access_token, application: app_two) }
|
|
|
|
let!(:app_two_token2) { create(:oauth_access_token, application: app_two) }
|
|
|
|
let!(:app_three_token1) { create(:oauth_access_token, application: app_three) }
|
|
|
|
let!(:app_three_token2) { create(:oauth_access_token, application: app_three) }
|
2019-12-04 20:38:33 +05:30
|
|
|
|
2022-08-13 15:12:31 +05:30
|
|
|
it 'returns only the latest token for each application' do
|
|
|
|
expect(described_class.latest_per_application.map(&:id))
|
|
|
|
.to match_array([app_two_token2.id, app_three_token2.id])
|
|
|
|
end
|
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|
2022-08-27 11:52:29 +05:30
|
|
|
|
|
|
|
describe 'Doorkeeper secret storing' do
|
|
|
|
it 'stores the token in hashed format' do
|
|
|
|
expect(token.token).not_to eq(token.plaintext_token)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not allow falling back to plaintext token comparison' do
|
|
|
|
expect(described_class.by_token(token.token)).to be_nil
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'finds a token by plaintext token' do
|
|
|
|
expect(described_class.by_token(token.plaintext_token)).to be_a(OauthAccessToken)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the token is stored in plaintext' do
|
|
|
|
let(:plaintext_token) { Devise.friendly_token(20) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
token.update_column(:token, plaintext_token)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'falls back to plaintext token comparison' do
|
|
|
|
expect(described_class.by_token(plaintext_token)).to be_a(OauthAccessToken)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when hash_oauth_secrets is disabled' do
|
|
|
|
let(:hashed_token) { create(:oauth_access_token, application_id: app_one.id) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
hashed_token
|
|
|
|
stub_feature_flags(hash_oauth_tokens: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'stores the token in plaintext' do
|
|
|
|
expect(token.token).to eq(token.plaintext_token)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'finds a token by plaintext token' do
|
|
|
|
expect(described_class.by_token(token.plaintext_token)).to be_a(OauthAccessToken)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not find a token that was previously stored as hashed' do
|
|
|
|
expect(described_class.by_token(hashed_token.plaintext_token)).to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-12-04 20:38:33 +05:30
|
|
|
end
|