2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-10-11 05:41:23 -04:00
|
|
|
require 'rails_helper'
|
2013-10-28 01:29:07 -04:00
|
|
|
|
|
|
|
describe Auth::OpenIdAuthenticator do
|
|
|
|
|
|
|
|
it "can lookup pre-existing user if trusted" do
|
2018-07-23 11:51:57 -04:00
|
|
|
auth = Auth::OpenIdAuthenticator.new("test", "id", "enable_yahoo_logins", trusted: true)
|
2013-10-28 01:29:07 -04:00
|
|
|
|
|
|
|
user = Fabricate(:user)
|
2014-03-25 23:52:50 -04:00
|
|
|
response = OpenStruct.new(identity_url: 'abc')
|
2017-07-27 21:20:09 -04:00
|
|
|
result = auth.after_authenticate(info: { email: user.email }, extra: { response: response })
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(result.user).to eq(user)
|
2013-10-28 01:29:07 -04:00
|
|
|
end
|
2014-08-07 13:28:50 -04:00
|
|
|
|
|
|
|
it "raises an exception when email is missing" do
|
2018-07-23 11:51:57 -04:00
|
|
|
auth = Auth::OpenIdAuthenticator.new("test", "id", "enable_yahoo_logins", trusted: true)
|
2014-08-07 13:28:50 -04:00
|
|
|
response = OpenStruct.new(identity_url: 'abc')
|
2015-01-09 11:34:37 -05:00
|
|
|
expect { auth.after_authenticate(info: {}, extra: { response: response }) }.to raise_error(Discourse::InvalidParameters)
|
2014-08-07 13:28:50 -04:00
|
|
|
end
|
2018-07-27 11:20:47 -04:00
|
|
|
|
|
|
|
it 'can connect to a different existing user account' do
|
|
|
|
authenticator = Auth::OpenIdAuthenticator.new("test", "id", "enable_yahoo_logins", trusted: true)
|
|
|
|
user1 = Fabricate(:user)
|
|
|
|
user2 = Fabricate(:user)
|
|
|
|
|
|
|
|
UserOpenId.create!(url: "id/123" , user_id: user1.id, email: "bob@example.com", active: true)
|
|
|
|
|
|
|
|
hash = {
|
|
|
|
info: { email: user1.email }, extra: { response: OpenStruct.new(identity_url: 'id/123') }
|
|
|
|
}
|
|
|
|
|
|
|
|
result = authenticator.after_authenticate(hash, existing_account: user2)
|
|
|
|
|
|
|
|
expect(result.user.id).to eq(user2.id)
|
|
|
|
expect(UserOpenId.exists?(user_id: user1.id)).to eq(false)
|
|
|
|
expect(UserOpenId.exists?(user_id: user2.id)).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'revoke' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
2018-07-27 11:20:47 -04:00
|
|
|
let(:authenticator) { Auth::OpenIdAuthenticator.new("test", "id", "enable_yahoo_logins", trusted: true) }
|
|
|
|
|
|
|
|
it 'raises exception if no entry for user' do
|
|
|
|
expect { authenticator.revoke(user) }.to raise_error(Discourse::NotFound)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'revokes correctly' do
|
|
|
|
UserOpenId.create!(url: "id/123" , user_id: user.id, email: "bob@example.com", active: true)
|
|
|
|
expect(authenticator.can_revoke?).to eq(true)
|
|
|
|
expect(authenticator.revoke(user)).to eq(true)
|
|
|
|
expect(authenticator.description_for_user(user)).to eq("")
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
2013-10-28 01:29:07 -04:00
|
|
|
end
|