diff options
author | rinpatch <rinpatch@sdf.org> | 2020-04-17 20:47:43 +0000 |
---|---|---|
committer | rinpatch <rinpatch@sdf.org> | 2020-04-17 20:47:43 +0000 |
commit | f1843db41d27c695b4fdb92b13fe6642102a35bc (patch) | |
tree | 6a4cadbfda9f2eea8746ac76c7810766cea4a248 /test/web/auth/basic_auth_test.exs | |
parent | e303d80dcb35b0d63933a1cebc06caa07ec6eed1 (diff) | |
parent | 66f55106bda23e0cfb01cb63f7397f4383518963 (diff) | |
download | pleroma-f1843db41d27c695b4fdb92b13fe6642102a35bc.tar.gz pleroma-f1843db41d27c695b4fdb92b13fe6642102a35bc.zip |
Merge branch '1682-basic-auth-permissions-fix' into 'develop'
[#1682] Fixed Basic Auth permissions issue
Closes #1682
See merge request pleroma/pleroma!2401
Diffstat (limited to 'test/web/auth/basic_auth_test.exs')
-rw-r--r-- | test/web/auth/basic_auth_test.exs | 46 |
1 files changed, 46 insertions, 0 deletions
diff --git a/test/web/auth/basic_auth_test.exs b/test/web/auth/basic_auth_test.exs new file mode 100644 index 000000000..64f8a6863 --- /dev/null +++ b/test/web/auth/basic_auth_test.exs @@ -0,0 +1,46 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.Auth.BasicAuthTest do + use Pleroma.Web.ConnCase + + import Pleroma.Factory + + test "with HTTP Basic Auth used, grants access to OAuth scope-restricted endpoints", %{ + conn: conn + } do + user = insert(:user) + assert Comeonin.Pbkdf2.checkpw("test", user.password_hash) + + basic_auth_contents = + (URI.encode_www_form(user.nickname) <> ":" <> URI.encode_www_form("test")) + |> Base.encode64() + + # Succeeds with HTTP Basic Auth + response = + conn + |> put_req_header("authorization", "Basic " <> basic_auth_contents) + |> get("/api/v1/accounts/verify_credentials") + |> json_response(200) + + user_nickname = user.nickname + assert %{"username" => ^user_nickname} = response + + # Succeeds with a properly scoped OAuth token + valid_token = insert(:oauth_token, scopes: ["read:accounts"]) + + conn + |> put_req_header("authorization", "Bearer #{valid_token.token}") + |> get("/api/v1/accounts/verify_credentials") + |> json_response(200) + + # Fails with a wrong-scoped OAuth token (proof of restriction) + invalid_token = insert(:oauth_token, scopes: ["read:something"]) + + conn + |> put_req_header("authorization", "Bearer #{invalid_token.token}") + |> get("/api/v1/accounts/verify_credentials") + |> json_response(403) + end +end |