2016-09-23 02:31:10 +08:00
|
|
|
require 'rails_helper'
|
|
|
|
|
2017-08-22 07:14:26 +08:00
|
|
|
def auth_token_for(user)
|
|
|
|
{
|
|
|
|
extra: {
|
|
|
|
all_emails: [{
|
|
|
|
email: user.email,
|
|
|
|
primary: true,
|
|
|
|
verified: true,
|
|
|
|
}]
|
|
|
|
},
|
|
|
|
info: {
|
|
|
|
email: user.email,
|
|
|
|
nickname: user.username,
|
|
|
|
name: user.name,
|
|
|
|
image: "https://avatars3.githubusercontent.com/u/#{user.username}",
|
|
|
|
},
|
|
|
|
uid: '100'
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
2016-09-23 02:31:10 +08:00
|
|
|
describe Auth::GithubAuthenticator do
|
2017-08-22 07:14:26 +08:00
|
|
|
let(:authenticator) { described_class.new }
|
|
|
|
let(:user) { Fabricate(:user) }
|
2016-09-23 02:31:10 +08:00
|
|
|
|
|
|
|
context 'after_authenticate' do
|
2018-05-30 11:54:12 +08:00
|
|
|
let(:data) do
|
|
|
|
{
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
all_emails: [{
|
|
|
|
email: user.email,
|
|
|
|
primary: true,
|
|
|
|
verified: true,
|
2016-09-23 02:31:10 +08:00
|
|
|
}]
|
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
info: {
|
|
|
|
email: user.email,
|
|
|
|
nickname: user.username,
|
|
|
|
name: user.name,
|
2016-09-23 02:31:10 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "100"
|
2016-09-23 02:31:10 +08:00
|
|
|
}
|
2018-05-30 11:54:12 +08:00
|
|
|
end
|
2016-09-23 02:31:10 +08:00
|
|
|
|
2018-05-30 11:54:12 +08:00
|
|
|
it 'can authenticate and create a user record for already existing users' do
|
|
|
|
result = authenticator.after_authenticate(data)
|
2016-09-23 02:31:10 +08:00
|
|
|
|
|
|
|
expect(result.user.id).to eq(user.id)
|
|
|
|
expect(result.username).to eq(user.username)
|
|
|
|
expect(result.name).to eq(user.name)
|
|
|
|
expect(result.email).to eq(user.email)
|
|
|
|
expect(result.email_valid).to eq(true)
|
2018-05-30 11:54:12 +08:00
|
|
|
|
|
|
|
# Authenticates again when user has Github user info
|
|
|
|
result = authenticator.after_authenticate(data)
|
|
|
|
|
|
|
|
expect(result.email).to eq(user.email)
|
|
|
|
expect(result.email_valid).to eq(true)
|
2016-09-23 02:31:10 +08:00
|
|
|
end
|
|
|
|
|
2018-03-19 19:40:35 +08:00
|
|
|
it 'should use primary email for new user creation over other available emails' do
|
|
|
|
hash = {
|
|
|
|
extra: {
|
|
|
|
all_emails: [{
|
|
|
|
email: "bob@example.com",
|
|
|
|
primary: false,
|
|
|
|
verified: true,
|
|
|
|
}, {
|
|
|
|
email: "john@example.com",
|
|
|
|
primary: true,
|
|
|
|
verified: true,
|
|
|
|
}]
|
|
|
|
},
|
|
|
|
info: {
|
|
|
|
email: "john@example.com",
|
|
|
|
nickname: "john",
|
|
|
|
name: "John Bob",
|
|
|
|
},
|
|
|
|
uid: "100"
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
|
|
|
expect(result.email).to eq("john@example.com")
|
|
|
|
end
|
|
|
|
|
2016-09-23 02:31:10 +08:00
|
|
|
it 'will not authenticate for already existing users with an unverified email' do
|
|
|
|
hash = {
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
all_emails: [{
|
|
|
|
email: user.email,
|
|
|
|
primary: true,
|
|
|
|
verified: false,
|
2016-09-23 02:31:10 +08:00
|
|
|
}]
|
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
info: {
|
|
|
|
email: user.email,
|
|
|
|
nickname: user.username,
|
|
|
|
name: user.name,
|
2016-09-23 02:31:10 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "100"
|
2016-09-23 02:31:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
|
|
|
expect(result.user).to eq(nil)
|
|
|
|
expect(result.username).to eq(user.username)
|
|
|
|
expect(result.name).to eq(user.name)
|
|
|
|
expect(result.email).to eq(user.email)
|
|
|
|
expect(result.email_valid).to eq(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can create a proper result for non existing users' do
|
|
|
|
hash = {
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
all_emails: [{
|
|
|
|
email: "person@example.com",
|
|
|
|
primary: true,
|
|
|
|
verified: true,
|
2016-09-23 02:31:10 +08:00
|
|
|
}]
|
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
info: {
|
|
|
|
email: "person@example.com",
|
|
|
|
nickname: "person",
|
|
|
|
name: "Person Lastname",
|
2016-09-23 02:31:10 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "100"
|
2016-09-23 02:31:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
|
|
|
expect(result.user).to eq(nil)
|
|
|
|
expect(result.username).to eq(hash[:info][:nickname])
|
|
|
|
expect(result.name).to eq(hash[:info][:name])
|
|
|
|
expect(result.email).to eq(hash[:info][:email])
|
2018-01-12 12:17:29 +08:00
|
|
|
expect(result.email_valid).to eq(hash[:info][:email].present?)
|
2016-09-23 02:31:10 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'will skip blacklisted domains for non existing users' do
|
|
|
|
hash = {
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
all_emails: [{
|
|
|
|
email: "not_allowed@blacklist.com",
|
|
|
|
primary: true,
|
|
|
|
verified: true,
|
|
|
|
}, {
|
|
|
|
email: "allowed@whitelist.com",
|
|
|
|
primary: false,
|
|
|
|
verified: true,
|
2016-09-23 02:31:10 +08:00
|
|
|
}]
|
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
info: {
|
|
|
|
email: "not_allowed@blacklist.com",
|
|
|
|
nickname: "person",
|
|
|
|
name: "Person Lastname",
|
2016-09-23 02:31:10 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "100"
|
2016-09-23 02:31:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
SiteSetting.email_domains_blacklist = "blacklist.com"
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
|
|
|
expect(result.user).to eq(nil)
|
|
|
|
expect(result.username).to eq(hash[:info][:nickname])
|
|
|
|
expect(result.name).to eq(hash[:info][:name])
|
|
|
|
expect(result.email).to eq("allowed@whitelist.com")
|
|
|
|
expect(result.email_valid).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'will find whitelisted domains for non existing users' do
|
|
|
|
hash = {
|
2017-07-28 09:20:09 +08:00
|
|
|
extra: {
|
|
|
|
all_emails: [{
|
|
|
|
email: "person@example.com",
|
|
|
|
primary: true,
|
|
|
|
verified: true,
|
|
|
|
}, {
|
|
|
|
email: "not_allowed@blacklist.com",
|
2018-01-12 12:17:29 +08:00
|
|
|
primary: false,
|
2017-07-28 09:20:09 +08:00
|
|
|
verified: true,
|
|
|
|
}, {
|
|
|
|
email: "allowed@whitelist.com",
|
|
|
|
primary: false,
|
|
|
|
verified: true,
|
2016-09-23 02:31:10 +08:00
|
|
|
}]
|
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
info: {
|
|
|
|
email: "person@example.com",
|
|
|
|
nickname: "person",
|
|
|
|
name: "Person Lastname",
|
2016-09-23 02:31:10 +08:00
|
|
|
},
|
2017-07-28 09:20:09 +08:00
|
|
|
uid: "100"
|
2016-09-23 02:31:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
SiteSetting.email_domains_whitelist = "whitelist.com"
|
|
|
|
result = authenticator.after_authenticate(hash)
|
|
|
|
|
|
|
|
expect(result.user).to eq(nil)
|
|
|
|
expect(result.username).to eq(hash[:info][:nickname])
|
|
|
|
expect(result.name).to eq(hash[:info][:name])
|
|
|
|
expect(result.email).to eq("allowed@whitelist.com")
|
|
|
|
expect(result.email_valid).to eq(true)
|
|
|
|
end
|
|
|
|
|
2018-07-28 00:18:53 +08:00
|
|
|
it 'can connect to a different existing user account' do
|
|
|
|
user1 = Fabricate(:user)
|
|
|
|
user2 = Fabricate(:user)
|
|
|
|
|
|
|
|
GithubUserInfo.create!(user_id: user1.id, github_user_id: 100, screen_name: "boris")
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(data, existing_account: user2)
|
|
|
|
|
|
|
|
expect(result.user.id).to eq(user2.id)
|
|
|
|
expect(GithubUserInfo.exists?(user_id: user1.id)).to eq(false)
|
|
|
|
expect(GithubUserInfo.exists?(user_id: user2.id)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'revoke' do
|
|
|
|
let(:user) { Fabricate(:user) }
|
|
|
|
let(:authenticator) { Auth::GithubAuthenticator.new }
|
|
|
|
|
|
|
|
it 'raises exception if no entry for user' do
|
|
|
|
expect { authenticator.revoke(user) }.to raise_error(Discourse::NotFound)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'revokes correctly' do
|
|
|
|
GithubUserInfo.create!(user_id: user.id, github_user_id: 100, screen_name: "boris")
|
|
|
|
expect(authenticator.can_revoke?).to eq(true)
|
|
|
|
expect(authenticator.revoke(user)).to eq(true)
|
|
|
|
expect(authenticator.description_for_user(user)).to eq("")
|
|
|
|
end
|
|
|
|
|
2016-09-23 02:31:10 +08:00
|
|
|
end
|
2017-08-22 07:14:26 +08:00
|
|
|
|
|
|
|
describe 'avatar retrieval' do
|
2017-08-23 11:46:50 +08:00
|
|
|
let(:job_klass) { Jobs::DownloadAvatarFromUrl }
|
|
|
|
|
2017-08-22 07:14:26 +08:00
|
|
|
context 'when user has a custom avatar' do
|
|
|
|
let(:user_avatar) { Fabricate(:user_avatar, custom_upload: Fabricate(:upload)) }
|
|
|
|
let(:user_with_custom_avatar) { Fabricate(:user, user_avatar: user_avatar) }
|
|
|
|
|
|
|
|
it 'does not enqueue a download_avatar_from_url job' do
|
2017-08-23 11:46:50 +08:00
|
|
|
expect {
|
|
|
|
authenticator.after_authenticate(auth_token_for(user_with_custom_avatar))
|
|
|
|
}.to_not change(job_klass.jobs, :size)
|
2017-08-22 07:14:26 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user does not have a custom avatar' do
|
|
|
|
it 'enqueues a download_avatar_from_url job' do
|
2017-08-23 11:46:50 +08:00
|
|
|
expect {
|
|
|
|
authenticator.after_authenticate(auth_token_for(user))
|
|
|
|
}.to change(job_klass.jobs, :size).by(1)
|
|
|
|
|
|
|
|
job_args = job_klass.jobs.last['args'].first
|
|
|
|
|
|
|
|
expect(job_args['url']).to eq("https://avatars3.githubusercontent.com/u/#{user.username}")
|
|
|
|
expect(job_args['user_id']).to eq(user.id)
|
|
|
|
expect(job_args['override_gravatar']).to eq(false)
|
2017-08-22 07:14:26 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-09-23 02:31:10 +08:00
|
|
|
end
|