diff options
author | lain <lain@soykaf.club> | 2020-04-17 15:51:24 +0200 |
---|---|---|
committer | lain <lain@soykaf.club> | 2020-04-17 15:51:24 +0200 |
commit | 8c2c325598dcd85f76752a17b39ce27689a65250 (patch) | |
tree | 5283acd447e60c401631aab4b01768d3f79d142e /test/web/auth/oauth_test_controller_test.exs | |
parent | 372614cfd3119b589c9c47619445714e8ae6c07e (diff) | |
parent | 6936854878860d1f6d04db1cd14a00208c6a5728 (diff) | |
download | pleroma-8c2c325598dcd85f76752a17b39ce27689a65250.tar.gz pleroma-8c2c325598dcd85f76752a17b39ce27689a65250.zip |
Merge branch 'develop' of git.pleroma.social:pleroma/pleroma into remake-remodel-dms
Diffstat (limited to 'test/web/auth/oauth_test_controller_test.exs')
-rw-r--r-- | test/web/auth/oauth_test_controller_test.exs | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/test/web/auth/oauth_test_controller_test.exs b/test/web/auth/oauth_test_controller_test.exs new file mode 100644 index 000000000..a2f6009ac --- /dev/null +++ b/test/web/auth/oauth_test_controller_test.exs @@ -0,0 +1,49 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Tests.OAuthTestControllerTest do + use Pleroma.Web.ConnCase + + import Pleroma.Factory + + setup %{conn: conn} do + user = insert(:user) + conn = assign(conn, :user, user) + %{conn: conn, user: user} + end + + test "missed_oauth", %{conn: conn} do + res = + conn + |> get("/test/authenticated_api/missed_oauth") + |> json_response(403) + + assert res == + %{ + "error" => + "Security violation: OAuth scopes check was neither handled nor explicitly skipped." + } + end + + test "skipped_oauth", %{conn: conn} do + conn + |> assign(:token, nil) + |> get("/test/authenticated_api/skipped_oauth") + |> json_response(200) + end + + test "performed_oauth", %{user: user} do + %{conn: good_token_conn} = oauth_access(["read"], user: user) + + good_token_conn + |> get("/test/authenticated_api/performed_oauth") + |> json_response(200) + + %{conn: bad_token_conn} = oauth_access(["follow"], user: user) + + bad_token_conn + |> get("/test/authenticated_api/performed_oauth") + |> json_response(403) + end +end |