2015-10-11 17:41:23 +08:00
|
|
|
require 'rails_helper'
|
2014-05-22 06:19:40 +08:00
|
|
|
|
|
|
|
describe Auth::GoogleOAuth2Authenticator do
|
|
|
|
|
2016-11-07 09:48:00 +08:00
|
|
|
it 'does not look up user unless email is verified' do
|
|
|
|
# note, emails that come back from google via omniauth are always valid
|
|
|
|
# this protects against future regressions
|
|
|
|
|
|
|
|
authenticator = Auth::GoogleOAuth2Authenticator.new
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
hash = {
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "123456789",
|
|
|
|
info: {
|
|
|
|
name: "John Doe",
|
|
|
|
email: user.email
|
2016-11-07 09:48:00 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: user.email,
|
|
|
|
email_verified: false,
|
|
|
|
name: "John Doe"
|
2016-11-07 09:48:00 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
|
|
|
expect(result.user).to eq(nil)
|
|
|
|
end
|
|
|
|
|
2014-05-22 06:19:40 +08:00
|
|
|
context 'after_authenticate' do
|
|
|
|
it 'can authenticate and create a user record for already existing users' do
|
2016-11-07 09:48:00 +08:00
|
|
|
authenticator = Auth::GoogleOAuth2Authenticator.new
|
2014-05-22 06:19:40 +08:00
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
hash = {
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "123456789",
|
|
|
|
info: {
|
|
|
|
name: "John Doe",
|
|
|
|
email: user.email
|
2014-05-22 06:19:40 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: user.email,
|
|
|
|
email_verified: true,
|
|
|
|
name: "John Doe"
|
2014-05-22 06:19:40 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(result.user.id).to eq(user.id)
|
2014-05-22 06:19:40 +08:00
|
|
|
end
|
|
|
|
|
2018-07-25 23:03:14 +08:00
|
|
|
it 'can connect to a different existing user account' do
|
|
|
|
authenticator = Auth::GoogleOAuth2Authenticator.new
|
|
|
|
user1 = Fabricate(:user)
|
|
|
|
user2 = Fabricate(:user)
|
|
|
|
|
|
|
|
GoogleUserInfo.create!(user_id: user1.id, google_user_id: 100)
|
|
|
|
|
|
|
|
hash = {
|
|
|
|
uid: "100",
|
|
|
|
info: {
|
|
|
|
name: "John Doe",
|
|
|
|
email: user1.email
|
|
|
|
},
|
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: user1.email,
|
|
|
|
email_verified: true,
|
|
|
|
name: "John Doe"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash, existing_account: user2)
|
|
|
|
|
|
|
|
expect(result.user.id).to eq(user2.id)
|
|
|
|
expect(GoogleUserInfo.exists?(user_id: user1.id)).to eq(false)
|
|
|
|
expect(GoogleUserInfo.exists?(user_id: user2.id)).to eq(true)
|
|
|
|
end
|
|
|
|
|
2014-05-22 06:19:40 +08:00
|
|
|
it 'can create a proper result for non existing users' do
|
|
|
|
hash = {
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "123456789",
|
|
|
|
info: {
|
|
|
|
name: "Jane Doe",
|
|
|
|
email: "jane.doe@the.google.com"
|
2014-05-22 06:19:40 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: "jane.doe@the.google.com",
|
|
|
|
email_verified: true,
|
|
|
|
name: "Jane Doe"
|
2014-05-22 06:19:40 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
authenticator = described_class.new
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(result.user).to eq(nil)
|
|
|
|
expect(result.extra_data[:name]).to eq("Jane Doe")
|
2014-05-22 06:19:40 +08:00
|
|
|
end
|
|
|
|
end
|
2018-07-25 23:03:14 +08:00
|
|
|
|
|
|
|
context 'revoke' do
|
|
|
|
let(:user) { Fabricate(:user) }
|
|
|
|
let(:authenticator) { Auth::GoogleOAuth2Authenticator.new }
|
|
|
|
|
|
|
|
it 'raises exception if no entry for user' do
|
|
|
|
expect { authenticator.revoke(user) }.to raise_error(Discourse::NotFound)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'revokes correctly' do
|
|
|
|
GoogleUserInfo.create!(user_id: user.id, google_user_id: 12345, email: 'someuser@somedomain.tld')
|
|
|
|
expect(authenticator.can_revoke?).to eq(true)
|
|
|
|
expect(authenticator.revoke(user)).to eq(true)
|
|
|
|
expect(authenticator.description_for_user(user)).to eq("")
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
2014-05-22 06:19:40 +08:00
|
|
|
end
|