CartoDB-SQL-API/test/unit/oauth-test.js
Daniel García Aubert e242d94d30 Fix eslint errors
2019-12-26 14:38:53 +01:00

180 lines
6.5 KiB
JavaScript

'use strict';
require('../helper');
var _ = require('underscore');
var OAuthAuth = require('../../lib/auth/oauth');
var MetadataDB = require('cartodb-redis');
var oAuth = require('../../lib/auth/oauth').backend;
var assert = require('assert');
var oauthData1 = {
oauth_consumer_key: 'dpf43f3p2l4k3l03',
oauth_token: 'nnch734d00sl2jdk',
oauth_signature_method: 'HMAC-SHA1',
oauth_signature: 'tR3%2BTy81lMeYAr%2FFid0kMTYa%2FWM%3D',
oauth_timestamp: '1191242096',
oauth_nonce: 'kllo9940pd9333jh'
};
var oauthData2 = { oauth_version: '1.0' };
var oauthData = _.extend(oauthData1, oauthData2);
var realOauthHeader = 'OAuth ' +
'realm="http://vizzuality.testhost.lan/",' +
'oauth_consumer_key="fZeNGv5iYayvItgDYHUbot1Ukb5rVyX6QAg8GaY2",' +
'oauth_token="l0lPbtP68ao8NfStCiA3V3neqfM03JKhToxhUQTR",' +
'oauth_signature_method="HMAC-SHA1", ' +
'oauth_signature="o4hx4hWP6KtLyFwggnYB4yPK8xI%3D",' +
'oauth_timestamp="1313581372",' +
'oauth_nonce="W0zUmvyC4eVL8cBd4YwlH1nnPTbxW0QBYcWkXTwe4",' +
'oauth_version="1.0"';
var oauthHeaderTokens = 'oauth_consumer_key="dpf43f3p2l4k3l03",' +
'oauth_token="nnch734d00sl2jdk",' +
'oauth_signature_method="HMAC-SHA1", ' +
'oauth_signature="tR3%2BTy81lMeYAr%2FFid0kMTYa%2FWM%3D",' +
'oauth_timestamp="1191242096",' +
'oauth_nonce="kllo9940pd9333jh",' +
'oauth_version="1.0"';
var fullOauthHeader = 'OAuth realm="http://photos.example.net/"' + oauthHeaderTokens;
var metadataBackend = new MetadataDB({
host: global.settings.redis_host,
port: global.settings.redis_port,
max: global.settings.redisPool,
idleTimeoutMillis: global.settings.redisIdleTimeoutMillis,
reapIntervalMillis: global.settings.redisReapIntervalMillis
});
describe('oauth', function () {
it('test database number', function () {
assert.strictEqual(oAuth.oauth_database, 3);
});
it('test oauth database key', function () {
assert.strictEqual(oAuth.oauth_user_key, 'rails:oauth_access_tokens:<%= oauth_access_key %>');
});
it('test parse tokens from full headers does not raise exception', function () {
var req = { query: {}, headers: { authorization: fullOauthHeader } };
assert.doesNotThrow(function () { oAuth.parseTokens(req); }, /incomplete oauth tokens in request/);
});
it('test parse all normal tokens raises no exception', function () {
var req = { query: oauthData, headers: {} };
assert.doesNotThrow(function () { oAuth.parseTokens(req); }, /incomplete oauth tokens in request/);
});
it('test headers take presedence over query parameters', function () {
var req = { query: { oauth_signature_method: 'MY_HASH' }, headers: { authorization: fullOauthHeader } };
var tokens = oAuth.parseTokens(req);
assert.strictEqual(tokens.oauth_signature_method, 'HMAC-SHA1');
});
it('test can access oauth hash for a user based on access token (oauth_token)', function (done) {
var req = { query: {}, headers: { authorization: realOauthHeader } };
var tokens = oAuth.parseTokens(req);
oAuth.getOAuthHash(metadataBackend, tokens.oauth_token, function (err, data) {
assert.ifError(err);
assert.strictEqual(tokens.oauth_consumer_key, data.consumer_key);
done();
});
});
it('test non existant oauth hash for a user based on oauth_token returns empty hash', function (done) {
var req = { query: {}, params: { user: 'vizzuality' }, headers: { authorization: fullOauthHeader } };
var tokens = oAuth.parseTokens(req);
oAuth.getOAuthHash(metadataBackend, tokens.oauth_token, function (err, data) {
assert.ifError(err);
assert.deepStrictEqual(data, {});
done();
});
});
it('can return user for verified signature', function (done) {
var req = {
query: {},
headers: { authorization: realOauthHeader, host: 'vizzuality.testhost.lan' },
params: { user: 'vizzuality' },
protocol: 'http',
method: 'GET',
path: '/api/v1/tables'
};
oAuth.verifyRequest(req, metadataBackend, function (err, data) {
assert.ifError(err);
assert.strictEqual(data, 'master');
done();
});
});
it('can return user for verified signature (for other allowed domains)', function (done) {
var oAuthGetAllowedHostsFn = oAuth.getAllowedHosts;
oAuth.getAllowedHosts = function () {
return ['testhost.lan', 'testhostdb.lan'];
};
var req = {
query: {},
headers: { authorization: realOauthHeader, host: 'vizzuality.testhostdb.lan' },
params: { user: 'vizzuality' },
protocol: 'http',
method: 'GET',
path: '/api/v1/tables'
};
oAuth.verifyRequest(req, metadataBackend, function (err, data) {
oAuth.getAllowedHosts = oAuthGetAllowedHostsFn;
assert.ifError(err);
assert.strictEqual(data, 'master');
done();
});
});
it('returns null user for unverified signatures', function (done) {
var req = {
query: {},
headers: { authorization: realOauthHeader, host: 'vizzuality.testyhost.lan' },
params: { user: 'vizzuality' },
protocol: 'http',
method: 'GET',
path: '/api/v1/tables'
};
oAuth.verifyRequest(req, metadataBackend, function (err, data) {
assert.ifError(err);
assert.strictEqual(data, null);
done();
});
});
it('returns null user for no oauth', function (done) {
var req = {
query: {},
headers: {},
params: { user: 'vizzuality' },
protocol: 'http',
method: 'GET',
path: '/api/v1/tables'
};
oAuth.verifyRequest(req, metadataBackend, function (err, data) {
assert.ifError(err);
assert.strictEqual(data, null);
done();
});
});
it('OAuthAuth reports it has credentials', function (done) {
var req = { query: {}, headers: { authorization: realOauthHeader } };
var oAuthAuth = new OAuthAuth(req);
assert.ok(oAuthAuth.hasCredentials());
done();
});
it('OAuthAuth reports it has no credentials', function (done) {
var req = { query: {}, headers: {} };
var oAuthAuth = new OAuthAuth(req);
assert.strictEqual(oAuthAuth.hasCredentials(), false);
done();
});
});