2019-04-30 08:27:42 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2022-07-28 10:27:38 +08:00
|
|
|
RSpec.describe Auth::GoogleOAuth2Authenticator do
|
2016-11-07 09:48:00 +08:00
|
|
|
it 'does not look up user unless email is verified' do
|
|
|
|
# note, emails that come back from google via omniauth are always valid
|
|
|
|
# this protects against future regressions
|
|
|
|
|
|
|
|
authenticator = Auth::GoogleOAuth2Authenticator.new
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
hash = {
|
2019-03-07 19:31:04 +08:00
|
|
|
provider: "google_oauth2",
|
2016-11-07 09:48:00 +08:00
|
|
|
uid: "123456789",
|
|
|
|
info: {
|
|
|
|
name: "John Doe",
|
|
|
|
email: user.email
|
|
|
|
},
|
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: user.email,
|
|
|
|
email_verified: false,
|
|
|
|
name: "John Doe"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
|
|
|
expect(result.user).to eq(nil)
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
describe 'after_authenticate' do
|
2014-05-22 06:19:40 +08:00
|
|
|
it 'can authenticate and create a user record for already existing users' do
|
2016-11-07 09:48:00 +08:00
|
|
|
authenticator = Auth::GoogleOAuth2Authenticator.new
|
2014-05-22 06:19:40 +08:00
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
hash = {
|
2019-03-07 19:31:04 +08:00
|
|
|
provider: "google_oauth2",
|
2014-05-22 06:19:40 +08:00
|
|
|
uid: "123456789",
|
|
|
|
info: {
|
|
|
|
name: "John Doe",
|
|
|
|
email: user.email
|
|
|
|
},
|
|
|
|
extra: {
|
|
|
|
raw_info: {
|
2016-11-07 09:48:00 +08:00
|
|
|
email: user.email,
|
2014-05-22 06:19:40 +08:00
|
|
|
email_verified: true,
|
|
|
|
name: "John Doe"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(result.user.id).to eq(user.id)
|
2014-05-22 06:19:40 +08:00
|
|
|
end
|
|
|
|
|
2018-07-25 23:03:14 +08:00
|
|
|
it 'can connect to a different existing user account' do
|
|
|
|
authenticator = Auth::GoogleOAuth2Authenticator.new
|
|
|
|
user1 = Fabricate(:user)
|
|
|
|
user2 = Fabricate(:user)
|
|
|
|
|
2019-03-07 19:31:04 +08:00
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", user_id: user1.id, provider_uid: 100)
|
2018-07-25 23:03:14 +08:00
|
|
|
|
|
|
|
hash = {
|
2019-03-07 19:31:04 +08:00
|
|
|
provider: "google_oauth2",
|
2018-07-25 23:03:14 +08:00
|
|
|
uid: "100",
|
|
|
|
info: {
|
|
|
|
name: "John Doe",
|
|
|
|
email: user1.email
|
|
|
|
},
|
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: user1.email,
|
|
|
|
email_verified: true,
|
|
|
|
name: "John Doe"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash, existing_account: user2)
|
|
|
|
|
|
|
|
expect(result.user.id).to eq(user2.id)
|
2019-03-07 19:31:04 +08:00
|
|
|
expect(UserAssociatedAccount.exists?(user_id: user1.id)).to eq(false)
|
|
|
|
expect(UserAssociatedAccount.exists?(user_id: user2.id)).to eq(true)
|
2018-07-25 23:03:14 +08:00
|
|
|
end
|
|
|
|
|
2014-05-22 06:19:40 +08:00
|
|
|
it 'can create a proper result for non existing users' do
|
|
|
|
hash = {
|
2019-03-07 19:31:04 +08:00
|
|
|
provider: "google_oauth2",
|
2014-05-22 06:19:40 +08:00
|
|
|
uid: "123456789",
|
|
|
|
info: {
|
2019-03-07 19:31:04 +08:00
|
|
|
first_name: "Jane",
|
|
|
|
last_name: "Doe",
|
2014-05-22 06:19:40 +08:00
|
|
|
name: "Jane Doe",
|
|
|
|
email: "jane.doe@the.google.com"
|
|
|
|
},
|
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: "jane.doe@the.google.com",
|
|
|
|
email_verified: true,
|
|
|
|
name: "Jane Doe"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
authenticator = described_class.new
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(result.user).to eq(nil)
|
2019-03-07 19:31:04 +08:00
|
|
|
expect(result.name).to eq("Jane Doe")
|
2014-05-22 06:19:40 +08:00
|
|
|
end
|
2021-12-09 20:30:27 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
describe "provides groups" do
|
2021-12-09 20:30:27 +08:00
|
|
|
before do
|
|
|
|
SiteSetting.google_oauth2_hd = "domain.com"
|
|
|
|
group1 = OmniAuth::AuthHash.new(id: "12345", name: "group1")
|
|
|
|
group2 = OmniAuth::AuthHash.new(id: "67890", name: "group2")
|
|
|
|
@groups = [group1, group2]
|
|
|
|
@groups_hash = OmniAuth::AuthHash.new(
|
|
|
|
provider: "google_oauth2",
|
|
|
|
uid: "123456789",
|
|
|
|
info: {
|
|
|
|
first_name: "Jane",
|
|
|
|
last_name: "Doe",
|
|
|
|
name: "Jane Doe",
|
|
|
|
email: "jane.doe@the.google.com"
|
|
|
|
},
|
|
|
|
extra: {
|
|
|
|
raw_info: {
|
|
|
|
email: "jane.doe@the.google.com",
|
|
|
|
email_verified: true,
|
|
|
|
name: "Jane Doe"
|
|
|
|
},
|
|
|
|
raw_groups: @groups
|
|
|
|
}
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when enabled" do
|
2021-12-09 20:30:27 +08:00
|
|
|
before do
|
|
|
|
SiteSetting.google_oauth2_hd_groups = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it "adds associated groups" do
|
|
|
|
result = described_class.new.after_authenticate(@groups_hash)
|
|
|
|
expect(result.associated_groups).to eq(@groups)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "handles a blank groups array" do
|
|
|
|
@groups_hash[:extra][:raw_groups] = []
|
|
|
|
result = described_class.new.after_authenticate(@groups_hash)
|
|
|
|
expect(result.associated_groups).to eq([])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
context "when disabled" do
|
2021-12-09 20:30:27 +08:00
|
|
|
before do
|
|
|
|
SiteSetting.google_oauth2_hd_groups = false
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesnt add associated groups" do
|
|
|
|
result = described_class.new.after_authenticate(@groups_hash)
|
|
|
|
expect(result.associated_groups).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2014-05-22 06:19:40 +08:00
|
|
|
end
|
2018-07-25 23:03:14 +08:00
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
describe 'revoke' do
|
2019-05-07 11:12:20 +08:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
2018-07-25 23:03:14 +08:00
|
|
|
let(:authenticator) { Auth::GoogleOAuth2Authenticator.new }
|
|
|
|
|
|
|
|
it 'raises exception if no entry for user' do
|
|
|
|
expect { authenticator.revoke(user) }.to raise_error(Discourse::NotFound)
|
|
|
|
end
|
|
|
|
|
2022-07-28 00:14:14 +08:00
|
|
|
it 'revokes correctly' do
|
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", user_id: user.id, provider_uid: 12345)
|
|
|
|
expect(authenticator.can_revoke?).to eq(true)
|
|
|
|
expect(authenticator.revoke(user)).to eq(true)
|
|
|
|
expect(authenticator.description_for_user(user)).to eq("")
|
|
|
|
end
|
2018-07-25 23:03:14 +08:00
|
|
|
end
|
2014-05-22 06:19:40 +08:00
|
|
|
end
|