2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-02-28 22:58:24 -05:00
|
|
|
require 'rails_helper'
|
2019-05-13 02:45:24 -04:00
|
|
|
require 'single_sign_on'
|
2017-02-28 22:58:24 -05:00
|
|
|
|
2017-08-23 23:01:11 -04:00
|
|
|
RSpec.describe Users::OmniauthCallbacksController do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:user) { Fabricate(:user) }
|
2017-02-28 22:58:24 -05:00
|
|
|
|
|
|
|
before do
|
|
|
|
OmniAuth.config.test_mode = true
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
2017-05-08 23:26:24 -04:00
|
|
|
Rails.application.env_config["omniauth.auth"] = OmniAuth.config.mock_auth[:google_oauth2] = nil
|
2021-03-02 02:13:04 -05:00
|
|
|
Rails.application.env_config["omniauth.origin"] = nil
|
2017-02-28 22:58:24 -05:00
|
|
|
OmniAuth.config.test_mode = false
|
|
|
|
end
|
|
|
|
|
2018-03-01 02:33:00 -05:00
|
|
|
describe ".find_authenticator" do
|
|
|
|
it "fails if a provider is disabled" do
|
|
|
|
SiteSetting.enable_twitter_logins = false
|
|
|
|
|
|
|
|
expect do
|
|
|
|
Users::OmniauthCallbacksController.find_authenticator("twitter")
|
|
|
|
end.to raise_error(Discourse::InvalidAccess)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "fails for unknown" do
|
|
|
|
expect do
|
|
|
|
Users::OmniauthCallbacksController.find_authenticator("twitter1")
|
|
|
|
end.to raise_error(Discourse::InvalidAccess)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "finds an authenticator when enabled" do
|
|
|
|
SiteSetting.enable_twitter_logins = true
|
|
|
|
|
|
|
|
expect(Users::OmniauthCallbacksController.find_authenticator("twitter"))
|
|
|
|
.not_to eq(nil)
|
|
|
|
end
|
2018-07-09 00:25:58 -04:00
|
|
|
|
|
|
|
context "with a plugin-contributed auth provider" do
|
|
|
|
|
|
|
|
let :provider do
|
2018-07-31 11:18:50 -04:00
|
|
|
provider = Auth::AuthProvider.new
|
2018-07-23 11:51:57 -04:00
|
|
|
provider.authenticator = Class.new(Auth::Authenticator) do
|
|
|
|
def name
|
|
|
|
'ubuntu'
|
|
|
|
end
|
|
|
|
|
|
|
|
def enabled?
|
|
|
|
SiteSetting.ubuntu_login_enabled
|
|
|
|
end
|
|
|
|
end.new
|
|
|
|
|
2018-07-09 00:25:58 -04:00
|
|
|
provider.enabled_setting = "ubuntu_login_enabled"
|
|
|
|
provider
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
2018-07-23 11:51:57 -04:00
|
|
|
DiscoursePluginRegistry.register_auth_provider(provider)
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
DiscoursePluginRegistry.reset!
|
2018-07-09 00:25:58 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "finds an authenticator when enabled" do
|
|
|
|
SiteSetting.stubs(:ubuntu_login_enabled).returns(true)
|
|
|
|
|
|
|
|
expect(Users::OmniauthCallbacksController.find_authenticator("ubuntu"))
|
|
|
|
.to be(provider.authenticator)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "fails if an authenticator is disabled" do
|
|
|
|
SiteSetting.stubs(:ubuntu_login_enabled).returns(false)
|
|
|
|
|
|
|
|
expect { Users::OmniauthCallbacksController.find_authenticator("ubuntu") }
|
|
|
|
.to raise_error(Discourse::InvalidAccess)
|
|
|
|
end
|
|
|
|
end
|
2018-03-01 02:33:00 -05:00
|
|
|
end
|
|
|
|
|
2017-02-28 22:58:24 -05:00
|
|
|
context 'Google Oauth2' do
|
|
|
|
before do
|
|
|
|
SiteSetting.enable_google_oauth2_logins = true
|
|
|
|
end
|
|
|
|
|
2019-08-08 10:49:09 -04:00
|
|
|
it "should display the failure message if needed" do
|
|
|
|
get "/auth/failure"
|
|
|
|
expect(response.status).to eq(200)
|
2019-08-12 05:55:02 -04:00
|
|
|
expect(response.body).to include(I18n.t("login.omniauth_error.generic"))
|
2019-08-08 10:49:09 -04:00
|
|
|
end
|
|
|
|
|
2019-08-08 06:57:28 -04:00
|
|
|
describe "request" do
|
|
|
|
it "should error for non existant authenticators" do
|
|
|
|
post "/auth/fake_auth"
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
get "/auth/fake_auth"
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
2019-08-12 05:55:02 -04:00
|
|
|
it "should error for disabled authenticators" do
|
|
|
|
SiteSetting.enable_google_oauth2_logins = false
|
|
|
|
post "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
get "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(403)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "should handle common errors" do
|
|
|
|
OmniAuth::Strategies::GoogleOauth2.any_instance.stubs(:mock_request_call).raises(
|
|
|
|
OAuth::Unauthorized.new(mock().tap { |m| m.stubs(:code).returns(403); m.stubs(:message).returns("Message") })
|
|
|
|
)
|
|
|
|
post "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(response.location).to include("/auth/failure?message=request_error")
|
|
|
|
|
|
|
|
OmniAuth::Strategies::GoogleOauth2.any_instance.stubs(:mock_request_call).raises(JWT::InvalidIatError.new)
|
|
|
|
post "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(response.location).to include("/auth/failure?message=invalid_iat")
|
|
|
|
end
|
|
|
|
|
2019-08-08 06:57:28 -04:00
|
|
|
it "should only start auth with a POST request" do
|
|
|
|
post "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
get "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
|
|
|
context "with CSRF protection enabled" do
|
|
|
|
before { ActionController::Base.allow_forgery_protection = true }
|
|
|
|
after { ActionController::Base.allow_forgery_protection = false }
|
|
|
|
|
|
|
|
it "should be CSRF protected" do
|
|
|
|
post "/auth/google_oauth2"
|
2019-08-12 05:55:02 -04:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(response.location).to include("/auth/failure?message=csrf_detected")
|
2019-08-08 06:57:28 -04:00
|
|
|
|
|
|
|
post "/auth/google_oauth2", params: { authenticity_token: "faketoken" }
|
2019-08-12 05:55:02 -04:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(response.location).to include("/auth/failure?message=csrf_detected")
|
2019-08-08 06:57:28 -04:00
|
|
|
|
|
|
|
get "/session/csrf.json"
|
2020-05-07 11:04:12 -04:00
|
|
|
token = response.parsed_body["csrf"]
|
2019-08-08 06:57:28 -04:00
|
|
|
|
|
|
|
post "/auth/google_oauth2", params: { authenticity_token: token }
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
end
|
2019-08-09 09:44:03 -04:00
|
|
|
|
|
|
|
it "should not be CSRF protected if it is the only auth method" do
|
|
|
|
get "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
SiteSetting.enable_local_logins = false
|
|
|
|
get "/auth/google_oauth2"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
end
|
2019-08-08 06:57:28 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-05-04 15:35:03 -04:00
|
|
|
context "without an `omniauth.auth` env" do
|
|
|
|
it "should return a 404" do
|
|
|
|
get "/auth/eviltrout/callback"
|
2017-05-08 16:33:43 -04:00
|
|
|
expect(response.code).to eq("404")
|
2017-05-04 15:35:03 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-04 17:54:50 -04:00
|
|
|
describe 'when user not found' do
|
|
|
|
let(:email) { "somename@gmail.com" }
|
|
|
|
before do
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2] = OmniAuth::AuthHash.new(
|
|
|
|
provider: 'google_oauth2',
|
|
|
|
uid: '123545',
|
|
|
|
info: OmniAuth::AuthHash::InfoHash.new(
|
|
|
|
email: email,
|
2019-05-13 02:45:24 -04:00
|
|
|
name: 'Some Name',
|
2019-03-07 06:31:04 -05:00
|
|
|
first_name: "Some",
|
2019-05-13 02:45:24 -04:00
|
|
|
last_name: "Name"
|
2018-09-04 17:54:50 -04:00
|
|
|
),
|
|
|
|
extra: {
|
|
|
|
raw_info: OmniAuth::AuthHash.new(
|
|
|
|
email_verified: true,
|
|
|
|
email: email,
|
|
|
|
family_name: 'Huh',
|
2019-05-13 02:45:24 -04:00
|
|
|
given_name: "Some Name",
|
2018-09-04 17:54:50 -04:00
|
|
|
gender: 'male',
|
|
|
|
name: "Some name Huh",
|
|
|
|
)
|
2019-03-07 06:31:04 -05:00
|
|
|
}
|
2018-09-04 17:54:50 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
Rails.application.env_config["omniauth.auth"] = OmniAuth.config.mock_auth[:google_oauth2]
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response' do
|
2019-05-15 04:55:31 -04:00
|
|
|
destination_url = '/somepath'
|
2018-09-04 17:54:50 -04:00
|
|
|
Rails.application.env_config["omniauth.origin"] = destination_url
|
|
|
|
|
2019-11-25 07:31:57 -05:00
|
|
|
events = DiscourseEvent.track_events { get "/auth/google_oauth2/callback.json" }
|
2020-11-13 09:41:54 -05:00
|
|
|
expect(events.any? { |e| e[:event_name] == :before_auth }).to eq(true)
|
2019-11-25 07:31:57 -05:00
|
|
|
expect(events.any? { |e| e[:event_name] === :after_auth && Auth::GoogleOAuth2Authenticator === e[:params][0] && !e[:params][1].failed? }).to eq(true)
|
2018-09-04 17:54:50 -04:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2018-09-04 17:54:50 -04:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
2018-09-04 17:54:50 -04:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(data["email"]).to eq(email)
|
|
|
|
expect(data["username"]).to eq("Some_Name")
|
|
|
|
expect(data["auth_provider"]).to eq("google_oauth2")
|
|
|
|
expect(data["email_valid"]).to eq(true)
|
2020-06-18 06:01:02 -04:00
|
|
|
expect(data["can_edit_username"]).to eq(true)
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(data["name"]).to eq("Some Name")
|
|
|
|
expect(data["destination_url"]).to eq(destination_url)
|
2018-09-04 17:54:50 -04:00
|
|
|
end
|
|
|
|
|
2021-07-12 19:15:06 -04:00
|
|
|
it 'should return the right response for staged users' do
|
|
|
|
Fabricate(:user, username: "Staged_User", email: email, staged: true)
|
|
|
|
|
|
|
|
destination_url = '/somepath'
|
|
|
|
Rails.application.env_config["omniauth.origin"] = destination_url
|
|
|
|
|
|
|
|
events = DiscourseEvent.track_events { get "/auth/google_oauth2/callback.json" }
|
|
|
|
expect(events.any? { |e| e[:event_name] == :before_auth }).to eq(true)
|
|
|
|
expect(events.any? { |e| e[:event_name] === :after_auth && Auth::GoogleOAuth2Authenticator === e[:params][0] && !e[:params][1].failed? }).to eq(true)
|
|
|
|
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
|
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
|
|
|
|
|
|
|
expect(data["email"]).to eq(email)
|
|
|
|
expect(data["username"]).to eq("Staged_User")
|
|
|
|
expect(data["auth_provider"]).to eq("google_oauth2")
|
|
|
|
expect(data["email_valid"]).to eq(true)
|
|
|
|
expect(data["can_edit_username"]).to eq(true)
|
|
|
|
expect(data["name"]).to eq("Some Name")
|
|
|
|
expect(data["destination_url"]).to eq(destination_url)
|
|
|
|
end
|
|
|
|
|
2018-09-04 17:54:50 -04:00
|
|
|
it 'should include destination url in response' do
|
2019-05-15 04:55:31 -04:00
|
|
|
destination_url = '/cookiepath'
|
2018-09-04 17:54:50 -04:00
|
|
|
cookies[:destination_url] = destination_url
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
|
|
|
expect(data["destination_url"]).to eq(destination_url)
|
2018-09-04 17:54:50 -04:00
|
|
|
end
|
2021-03-02 02:13:04 -05:00
|
|
|
|
|
|
|
describe 'when site is invite_only' do
|
|
|
|
before do
|
|
|
|
SiteSetting.invite_only = true
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response without any origin' do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
|
|
|
|
data = JSON.parse(response.cookies["authentication_data"])
|
|
|
|
|
|
|
|
expect(data["requires_invite"]).to eq(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns the right response for an invalid origin' do
|
|
|
|
Rails.application.env_config["omniauth.origin"] = "/invitesinvites"
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response when origin is invites page' do
|
|
|
|
origin = Rails.application.routes.url_helpers.invite_url(
|
|
|
|
Fabricate(:invite).invite_key,
|
|
|
|
host: Discourse.base_url
|
|
|
|
)
|
|
|
|
|
|
|
|
Rails.application.env_config["omniauth.origin"] = origin
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(response).to redirect_to(origin)
|
|
|
|
|
|
|
|
data = JSON.parse(response.cookies["authentication_data"])
|
|
|
|
|
|
|
|
expect(data["requires_invite"]).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
2018-09-04 17:54:50 -04:00
|
|
|
end
|
|
|
|
|
2017-02-28 22:58:24 -05:00
|
|
|
describe 'when user has been verified' do
|
|
|
|
before do
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2] = OmniAuth::AuthHash.new(
|
|
|
|
provider: 'google_oauth2',
|
|
|
|
uid: '123545',
|
|
|
|
info: OmniAuth::AuthHash::InfoHash.new(
|
|
|
|
email: user.email,
|
2020-06-18 06:01:02 -04:00
|
|
|
name: 'Some name',
|
|
|
|
nickname: 'Somenickname'
|
2017-02-28 22:58:24 -05:00
|
|
|
),
|
|
|
|
extra: {
|
|
|
|
raw_info: OmniAuth::AuthHash.new(
|
|
|
|
email_verified: true,
|
|
|
|
email: user.email,
|
|
|
|
family_name: 'Huh',
|
|
|
|
given_name: user.name,
|
|
|
|
gender: 'male',
|
|
|
|
name: "#{user.name} Huh",
|
|
|
|
)
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
Rails.application.env_config["omniauth.auth"] = OmniAuth.config.mock_auth[:google_oauth2]
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response' do
|
2017-06-07 19:05:33 -04:00
|
|
|
expect(user.email_confirmed?).to eq(false)
|
|
|
|
|
2017-06-01 04:19:42 -04:00
|
|
|
events = DiscourseEvent.track_events do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
end
|
|
|
|
|
2017-06-07 19:05:33 -04:00
|
|
|
expect(events.map { |event| event[:event_name] }).to include(:user_logged_in, :user_first_logged_in)
|
2017-02-28 22:58:24 -05:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2017-02-28 22:58:24 -05:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
2017-02-28 22:58:24 -05:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(data["authenticated"]).to eq(true)
|
|
|
|
expect(data["awaiting_activation"]).to eq(false)
|
|
|
|
expect(data["awaiting_approval"]).to eq(false)
|
|
|
|
expect(data["not_allowed_from_ip_address"]).to eq(false)
|
|
|
|
expect(data["admin_not_allowed_from_ip_address"]).to eq(false)
|
2017-06-07 19:05:33 -04:00
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email_confirmed?).to eq(true)
|
|
|
|
end
|
|
|
|
|
2020-03-21 16:24:49 -04:00
|
|
|
it 'should return the authenticated response with the correct path for subfolders' do
|
|
|
|
set_subfolder "/forum"
|
|
|
|
events = DiscourseEvent.track_events do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(response.headers["Set-Cookie"].match(/^authentication_data=.*; path=\/forum/)).not_to eq(nil)
|
|
|
|
|
|
|
|
expect(events.map { |event| event[:event_name] }).to include(:user_logged_in, :user_first_logged_in)
|
|
|
|
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
|
|
|
|
data = JSON.parse(response.cookies["authentication_data"])
|
|
|
|
|
|
|
|
expect(data["authenticated"]).to eq(true)
|
|
|
|
expect(data["awaiting_activation"]).to eq(false)
|
|
|
|
expect(data["awaiting_approval"]).to eq(false)
|
|
|
|
expect(data["not_allowed_from_ip_address"]).to eq(false)
|
|
|
|
expect(data["admin_not_allowed_from_ip_address"]).to eq(false)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email_confirmed?).to eq(true)
|
|
|
|
end
|
|
|
|
|
2017-06-07 19:05:33 -04:00
|
|
|
it "should confirm email even when the tokens are expired" do
|
|
|
|
user.email_tokens.update_all(confirmed: false, expired: true)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email_confirmed?).to eq(false)
|
|
|
|
|
|
|
|
events = DiscourseEvent.track_events do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(events.map { |event| event[:event_name] }).to include(:user_logged_in, :user_first_logged_in)
|
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2017-06-07 19:05:33 -04:00
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email_confirmed?).to eq(true)
|
2017-02-28 22:58:24 -05:00
|
|
|
end
|
|
|
|
|
2021-03-31 08:40:58 -04:00
|
|
|
it "should treat a staged user the same as an unregistered user" do
|
2017-12-12 07:08:57 -05:00
|
|
|
user.update!(staged: true, registration_ip_address: nil)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.staged).to eq(true)
|
|
|
|
expect(user.registration_ip_address).to eq(nil)
|
|
|
|
|
|
|
|
events = DiscourseEvent.track_events do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
end
|
|
|
|
|
2021-03-31 08:40:58 -04:00
|
|
|
expect(events.map { |event| event[:event_name] }).to include(:before_auth, :after_auth)
|
2017-12-12 07:08:57 -05:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2017-12-12 07:08:57 -05:00
|
|
|
|
2021-03-31 08:40:58 -04:00
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
|
|
|
expect(data["username"]).to eq("Somenickname")
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.staged).to eq(true)
|
|
|
|
expect(user.registration_ip_address).to eq(nil)
|
|
|
|
|
|
|
|
# Now register
|
|
|
|
UsersController.any_instance.stubs(:honeypot_value).returns(nil)
|
|
|
|
UsersController.any_instance.stubs(:challenge_value).returns(nil)
|
|
|
|
post "/u.json", params: {
|
|
|
|
name: "My new name",
|
|
|
|
username: "mynewusername",
|
|
|
|
email: user.email
|
|
|
|
}
|
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
|
2017-12-12 07:08:57 -05:00
|
|
|
user.reload
|
|
|
|
expect(user.staged).to eq(false)
|
|
|
|
expect(user.registration_ip_address).to be_present
|
2021-03-31 08:40:58 -04:00
|
|
|
expect(user.name).to eq("My new name")
|
2017-12-12 07:08:57 -05:00
|
|
|
end
|
|
|
|
|
2019-08-28 07:49:11 -04:00
|
|
|
it "should activate user with matching email" do
|
|
|
|
user.update!(password: "securepassword", active: false, registration_ip_address: "1.1.1.1")
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.active).to eq(false)
|
|
|
|
expect(user.confirm_password?("securepassword")).to eq(true)
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.active).to eq(true)
|
|
|
|
|
|
|
|
# Delete the password, it may have been set by someone else
|
|
|
|
expect(user.confirm_password?("securepassword")).to eq(false)
|
|
|
|
end
|
|
|
|
|
2020-06-18 06:01:02 -04:00
|
|
|
it "should update name/username/email when sso_overrides is enabled" do
|
|
|
|
SiteSetting.email_editable = false
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.auth_overrides_email = true
|
|
|
|
SiteSetting.auth_overrides_name = true
|
|
|
|
SiteSetting.auth_overrides_username = true
|
2020-06-18 06:01:02 -04:00
|
|
|
|
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", user_id: user.id, provider_uid: '123545')
|
|
|
|
|
|
|
|
old_email = user.email
|
|
|
|
user.update!(name: 'somename', username: 'somusername', email: 'email@example.com')
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email).to eq(old_email)
|
|
|
|
expect(user.username).to eq('Somenickname')
|
|
|
|
expect(user.name).to eq('Some name')
|
|
|
|
end
|
|
|
|
|
|
|
|
it "will not update email if not verified" do
|
|
|
|
SiteSetting.email_editable = false
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.auth_overrides_email = true
|
2020-06-18 06:01:02 -04:00
|
|
|
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2][:extra][:raw_info][:email_verified] = false
|
|
|
|
|
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", user_id: user.id, provider_uid: '123545')
|
|
|
|
|
|
|
|
old_email = user.email
|
|
|
|
user.update!(email: 'email@example.com')
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email).to eq('email@example.com')
|
|
|
|
end
|
|
|
|
|
2021-02-08 05:04:33 -05:00
|
|
|
it "shows error when auth_overrides_email causes a validation error" do
|
2020-11-23 06:06:08 -05:00
|
|
|
SiteSetting.email_editable = false
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.auth_overrides_email = true
|
2020-11-23 06:06:08 -05:00
|
|
|
|
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", user_id: user.id, provider_uid: '123545')
|
|
|
|
|
|
|
|
google_email = user.email
|
|
|
|
user.update!(email: 'anotheremail@example.com')
|
|
|
|
Fabricate(:user, email: google_email) # Another user has the google account email
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback"
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
expect(response.body).to include(I18n.t("errors.messages.taken"))
|
|
|
|
expect(session[:current_user_id]).to eq(nil)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email).to eq('anotheremail@example.com')
|
|
|
|
end
|
|
|
|
|
2020-01-15 05:27:12 -05:00
|
|
|
context 'when user has TOTP enabled' do
|
2018-03-01 02:47:07 -05:00
|
|
|
before do
|
|
|
|
user.create_totp(enabled: true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response' do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2018-03-01 02:47:07 -05:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
2018-03-01 02:47:07 -05:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(data["email"]).to eq(user.email)
|
|
|
|
expect(data["omniauth_disallow_totp"]).to eq(true)
|
2018-05-30 00:14:04 -04:00
|
|
|
|
|
|
|
user.update!(email: 'different@user.email')
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(JSON.parse(cookies[:authentication_data])["email"]).to eq(user.email)
|
2018-03-01 02:47:07 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-01-15 05:27:12 -05:00
|
|
|
context 'when user has security key enabled' do
|
|
|
|
before do
|
|
|
|
Fabricate(:user_security_key_with_random_credential, user: user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response' do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
|
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
|
|
|
|
|
|
|
expect(data["email"]).to eq(user.email)
|
|
|
|
expect(data["omniauth_disallow_totp"]).to eq(true)
|
|
|
|
|
|
|
|
user.update!(email: 'different@user.email')
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(JSON.parse(cookies[:authentication_data])["email"]).to eq(user.email)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-10-04 14:31:08 -04:00
|
|
|
context 'when sso_payload cookie exist' do
|
|
|
|
before do
|
2021-02-08 05:04:33 -05:00
|
|
|
SiteSetting.enable_discourse_connect_provider = true
|
|
|
|
SiteSetting.discourse_connect_secret = "topsecret"
|
2018-10-04 14:31:08 -04:00
|
|
|
|
|
|
|
@sso = SingleSignOn.new
|
|
|
|
@sso.nonce = "mynonce"
|
2021-02-08 05:04:33 -05:00
|
|
|
@sso.sso_secret = SiteSetting.discourse_connect_secret
|
2018-10-04 14:31:08 -04:00
|
|
|
@sso.return_sso_url = "http://somewhere.over.rainbow/sso"
|
|
|
|
cookies[:sso_payload] = @sso.payload
|
|
|
|
|
2019-03-07 06:31:04 -05:00
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", provider_uid: '12345', user: user)
|
2018-10-04 14:31:08 -04:00
|
|
|
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2] = OmniAuth::AuthHash.new(
|
|
|
|
provider: 'google_oauth2',
|
|
|
|
uid: '12345',
|
|
|
|
info: OmniAuth::AuthHash::InfoHash.new(
|
|
|
|
email: 'someother_email@test.com',
|
|
|
|
name: 'Some name'
|
|
|
|
),
|
|
|
|
extra: {
|
|
|
|
raw_info: OmniAuth::AuthHash.new(
|
|
|
|
email_verified: true,
|
|
|
|
email: 'someother_email@test.com',
|
|
|
|
family_name: 'Huh',
|
|
|
|
given_name: user.name,
|
|
|
|
gender: 'male',
|
|
|
|
name: "#{user.name} Huh",
|
|
|
|
)
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
Rails.application.env_config["omniauth.auth"] = OmniAuth.config.mock_auth[:google_oauth2]
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response' do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2018-10-04 14:31:08 -04:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
2018-10-04 14:31:08 -04:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(data["destination_url"]).to match(/\/session\/sso_provider\?sso\=.*\&sig\=.*/)
|
2018-10-04 14:31:08 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-02-28 22:58:24 -05:00
|
|
|
context 'when user has not verified his email' do
|
|
|
|
before do
|
2019-03-07 06:31:04 -05:00
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", provider_uid: '12345', user: user)
|
2017-02-28 22:58:24 -05:00
|
|
|
user.update!(active: false)
|
|
|
|
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2] = OmniAuth::AuthHash.new(
|
|
|
|
provider: 'google_oauth2',
|
|
|
|
uid: '12345',
|
|
|
|
info: OmniAuth::AuthHash::InfoHash.new(
|
|
|
|
email: 'someother_email@test.com',
|
|
|
|
name: 'Some name'
|
|
|
|
),
|
|
|
|
extra: {
|
|
|
|
raw_info: OmniAuth::AuthHash.new(
|
|
|
|
email_verified: true,
|
|
|
|
email: 'someother_email@test.com',
|
|
|
|
family_name: 'Huh',
|
|
|
|
given_name: user.name,
|
|
|
|
gender: 'male',
|
|
|
|
name: "#{user.name} Huh",
|
|
|
|
)
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
Rails.application.env_config["omniauth.auth"] = OmniAuth.config.mock_auth[:google_oauth2]
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should return the right response' do
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2017-02-28 22:58:24 -05:00
|
|
|
|
2019-10-08 07:10:43 -04:00
|
|
|
data = JSON.parse(cookies[:authentication_data])
|
2017-02-28 22:58:24 -05:00
|
|
|
|
|
|
|
expect(user.reload.active).to eq(false)
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(data["authenticated"]).to eq(false)
|
|
|
|
expect(data["awaiting_activation"]).to eq(true)
|
2017-02-28 22:58:24 -05:00
|
|
|
end
|
|
|
|
end
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "doesn't attempt redirect to external origin" do
|
|
|
|
post "/auth/google_oauth2?origin=https://example.com/external"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2019-05-15 04:55:31 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(response.status).to eq 302
|
|
|
|
expect(response.location).to eq "http://test.localhost/"
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
cookie_data = JSON.parse(response.cookies['authentication_data'])
|
|
|
|
expect(cookie_data["destination_url"]).to eq('/')
|
|
|
|
end
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "redirects to internal origin" do
|
|
|
|
post "/auth/google_oauth2?origin=http://test.localhost/t/123"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2019-05-15 04:55:31 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(response.status).to eq 302
|
|
|
|
expect(response.location).to eq "http://test.localhost/t/123"
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
cookie_data = JSON.parse(response.cookies['authentication_data'])
|
|
|
|
expect(cookie_data["destination_url"]).to eq('/t/123')
|
|
|
|
end
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "redirects to internal origin on subfolder" do
|
|
|
|
set_subfolder "/subpath"
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
post "/auth/google_oauth2?origin=http://test.localhost/subpath/t/123"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(response.status).to eq 302
|
|
|
|
expect(response.location).to eq "http://test.localhost/subpath/t/123"
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
cookie_data = JSON.parse(response.cookies['authentication_data'])
|
|
|
|
expect(cookie_data["destination_url"]).to eq('/subpath/t/123')
|
|
|
|
end
|
2020-01-08 12:06:03 -05:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "never redirects to /auth/ origin" do
|
|
|
|
post "/auth/google_oauth2?origin=http://test.localhost/auth/google_oauth2"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2020-01-08 12:06:03 -05:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(response.status).to eq 302
|
|
|
|
expect(response.location).to eq "http://test.localhost/"
|
2020-01-08 12:06:03 -05:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
cookie_data = JSON.parse(response.cookies['authentication_data'])
|
|
|
|
expect(cookie_data["destination_url"]).to eq('/')
|
|
|
|
end
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "never redirects to /auth/ origin on subfolder" do
|
|
|
|
set_subfolder "/subpath"
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
post "/auth/google_oauth2?origin=http://test.localhost/subpath/auth/google_oauth2"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(response.status).to eq 302
|
|
|
|
expect(response.location).to eq "http://test.localhost/subpath"
|
2020-08-26 10:52:21 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
cookie_data = JSON.parse(response.cookies['authentication_data'])
|
|
|
|
expect(cookie_data["destination_url"]).to eq('/subpath')
|
|
|
|
end
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "redirects to relative origin" do
|
|
|
|
post "/auth/google_oauth2?origin=/t/123"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2019-05-15 04:55:31 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(response.status).to eq 302
|
|
|
|
expect(response.location).to eq "http://test.localhost/t/123"
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
cookie_data = JSON.parse(response.cookies['authentication_data'])
|
|
|
|
expect(cookie_data["destination_url"]).to eq('/t/123')
|
|
|
|
end
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "redirects with query" do
|
|
|
|
post "/auth/google_oauth2?origin=/t/123?foo=bar"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2019-05-15 04:55:31 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(response.status).to eq 302
|
|
|
|
expect(response.location).to eq "http://test.localhost/t/123?foo=bar"
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
cookie_data = JSON.parse(response.cookies['authentication_data'])
|
|
|
|
expect(cookie_data["destination_url"]).to eq('/t/123?foo=bar')
|
|
|
|
end
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
it "removes authentication_data cookie on logout" do
|
|
|
|
post "/auth/google_oauth2?origin=https://example.com/external"
|
|
|
|
get "/auth/google_oauth2/callback"
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
provider = log_in_user(Fabricate(:user))
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(cookies['authentication_data']).to be
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
log_out_user(provider)
|
2019-03-19 08:39:13 -04:00
|
|
|
|
2021-07-07 05:54:18 -04:00
|
|
|
expect(cookies['authentication_data']).to be_nil
|
2019-03-19 08:39:13 -04:00
|
|
|
end
|
2017-02-28 22:58:24 -05:00
|
|
|
end
|
2017-09-12 11:36:17 -04:00
|
|
|
|
2018-12-11 08:19:00 -05:00
|
|
|
context 'when attempting reconnect' do
|
2019-05-06 23:12:20 -04:00
|
|
|
fab!(:user2) { Fabricate(:user) }
|
2018-12-11 08:19:00 -05:00
|
|
|
before do
|
2019-03-07 06:31:04 -05:00
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", provider_uid: '12345', user: user)
|
|
|
|
UserAssociatedAccount.create!(provider_name: "google_oauth2", provider_uid: '123456', user: user2)
|
2018-12-11 08:19:00 -05:00
|
|
|
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2] = OmniAuth::AuthHash.new(
|
|
|
|
provider: 'google_oauth2',
|
|
|
|
uid: '12345',
|
|
|
|
info: OmniAuth::AuthHash::InfoHash.new(
|
|
|
|
email: 'someother_email@test.com',
|
|
|
|
name: 'Some name'
|
|
|
|
),
|
|
|
|
extra: {
|
|
|
|
raw_info: OmniAuth::AuthHash.new(
|
|
|
|
email_verified: true,
|
|
|
|
email: 'someother_email@test.com',
|
|
|
|
family_name: 'Huh',
|
|
|
|
given_name: user.name,
|
|
|
|
gender: 'male',
|
|
|
|
name: "#{user.name} Huh",
|
|
|
|
)
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
Rails.application.env_config["omniauth.auth"] = OmniAuth.config.mock_auth[:google_oauth2]
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should not reconnect normally' do
|
|
|
|
# Log in normally
|
2019-08-08 06:57:28 -04:00
|
|
|
post "/auth/google_oauth2"
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(session[:auth_reconnect]).to eq(false)
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(session[:current_user_id]).to eq(user.id)
|
|
|
|
|
|
|
|
# Log into another user
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2].uid = "123456"
|
2019-08-08 06:57:28 -04:00
|
|
|
post "/auth/google_oauth2"
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(session[:auth_reconnect]).to eq(false)
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(session[:current_user_id]).to eq(user2.id)
|
2019-03-07 06:31:04 -05:00
|
|
|
expect(UserAssociatedAccount.count).to eq(2)
|
2018-12-11 08:19:00 -05:00
|
|
|
end
|
|
|
|
|
2019-07-17 07:34:02 -04:00
|
|
|
it 'should redirect to associate URL if parameter supplied' do
|
2018-12-11 08:19:00 -05:00
|
|
|
# Log in normally
|
2019-08-08 06:57:28 -04:00
|
|
|
post "/auth/google_oauth2?reconnect=true"
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(session[:auth_reconnect]).to eq(true)
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(session[:current_user_id]).to eq(user.id)
|
|
|
|
|
|
|
|
# Clear cookie after login
|
|
|
|
expect(session[:auth_reconnect]).to eq(nil)
|
|
|
|
|
|
|
|
# Disconnect
|
2019-03-07 06:31:04 -05:00
|
|
|
UserAssociatedAccount.find_by(user_id: user.id).destroy
|
2018-12-11 08:19:00 -05:00
|
|
|
|
|
|
|
# Reconnect flow:
|
2019-08-08 06:57:28 -04:00
|
|
|
post "/auth/google_oauth2?reconnect=true"
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(session[:auth_reconnect]).to eq(true)
|
|
|
|
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2].uid = "123456"
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
2019-07-17 07:34:02 -04:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(response.redirect_url).to start_with("http://test.localhost/associate/")
|
|
|
|
|
2018-12-11 08:19:00 -05:00
|
|
|
expect(session[:current_user_id]).to eq(user.id)
|
2019-07-24 06:45:36 -04:00
|
|
|
expect(UserAssociatedAccount.count).to eq(1) # Reconnect has not yet happened
|
2018-12-11 08:19:00 -05:00
|
|
|
end
|
|
|
|
|
2021-03-31 05:23:12 -04:00
|
|
|
it 'stores and redirects to \'origin\' parameter' do
|
|
|
|
# Log in normally
|
|
|
|
post "/auth/google_oauth2?origin=http://test.localhost/atesturl"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(session[:destination_url]).to eq("http://test.localhost/atesturl")
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(response.redirect_url).to eq("http://test.localhost/atesturl")
|
|
|
|
end
|
2018-12-11 08:19:00 -05:00
|
|
|
end
|
|
|
|
|
2017-09-12 11:36:17 -04:00
|
|
|
context 'after changing email' do
|
|
|
|
def login(identity)
|
|
|
|
OmniAuth.config.mock_auth[:google_oauth2] = OmniAuth::AuthHash.new(
|
|
|
|
provider: 'google_oauth2',
|
|
|
|
uid: "123545#{identity[:username]}",
|
|
|
|
info: OmniAuth::AuthHash::InfoHash.new(
|
|
|
|
email: identity[:email],
|
|
|
|
name: 'Some name'
|
|
|
|
),
|
|
|
|
extra: {
|
|
|
|
raw_info: OmniAuth::AuthHash.new(
|
|
|
|
email_verified: true,
|
|
|
|
email: identity[:email],
|
|
|
|
family_name: 'Huh',
|
|
|
|
given_name: identity[:name],
|
|
|
|
gender: 'male',
|
|
|
|
name: "#{identity[:name]} Huh",
|
|
|
|
)
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
|
|
|
Rails.application.env_config["omniauth.auth"] = OmniAuth.config.mock_auth[:google_oauth2]
|
|
|
|
|
|
|
|
get "/auth/google_oauth2/callback.json"
|
2019-10-08 07:10:43 -04:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
JSON.parse(cookies[:authentication_data])
|
2017-09-12 11:36:17 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'activates the correct email' do
|
|
|
|
old_email = 'old@email.com'
|
|
|
|
old_identity = { name: 'Bob',
|
|
|
|
username: 'bob',
|
|
|
|
email: old_email }
|
|
|
|
user = Fabricate(:user, email: old_email)
|
|
|
|
new_email = 'new@email.com'
|
|
|
|
new_identity = { name: 'Bob',
|
|
|
|
username: 'boguslaw',
|
|
|
|
email: new_email }
|
|
|
|
|
2020-02-19 18:52:21 -05:00
|
|
|
updater = EmailUpdater.new(guardian: user.guardian, user: user)
|
2017-09-12 11:36:17 -04:00
|
|
|
updater.change_to(new_email)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email).to eq(old_email)
|
|
|
|
|
|
|
|
response = login(old_identity)
|
|
|
|
expect(response['authenticated']).to eq(true)
|
|
|
|
|
|
|
|
user.reload
|
|
|
|
expect(user.email).to eq(old_email)
|
|
|
|
|
2018-07-25 11:33:42 -04:00
|
|
|
delete "/session/#{user.username}" # log out
|
|
|
|
|
2017-09-12 11:36:17 -04:00
|
|
|
response = login(new_identity)
|
|
|
|
expect(response['authenticated']).to eq(nil)
|
|
|
|
expect(response['email']).to eq(new_email)
|
|
|
|
end
|
|
|
|
end
|
2017-02-28 22:58:24 -05:00
|
|
|
end
|
|
|
|
end
|