summaryrefslogtreecommitdiff
path: root/test/web/auth/oauth_test_controller_test.exs
diff options
context:
space:
mode:
authorIvan Tashkinov <ivantashkinov@gmail.com>2020-04-21 08:20:50 +0300
committerIvan Tashkinov <ivantashkinov@gmail.com>2020-04-21 08:20:50 +0300
commitbb5d0eafa437c9d32cdd8ccdb92b2eabb8ccccf1 (patch)
tree307120b8958a5be8dad4a16e6e2ff779336a30e3 /test/web/auth/oauth_test_controller_test.exs
parentf7e623c11c4b6f4f323a4317e9489092be73f9cd (diff)
parente57c1b60e4a0f882d5217bf1be8b1a7240aa322d (diff)
downloadpleroma-bb5d0eafa437c9d32cdd8ccdb92b2eabb8ccccf1.tar.gz
pleroma-bb5d0eafa437c9d32cdd8ccdb92b2eabb8ccccf1.zip
Merge remote-tracking branch 'remotes/origin/develop' into 1364-no-pushes-from-blocked-domains-users
# Conflicts: # CHANGELOG.md
Diffstat (limited to 'test/web/auth/oauth_test_controller_test.exs')
-rw-r--r--test/web/auth/oauth_test_controller_test.exs49
1 files changed, 49 insertions, 0 deletions
diff --git a/test/web/auth/oauth_test_controller_test.exs b/test/web/auth/oauth_test_controller_test.exs
new file mode 100644
index 000000000..a2f6009ac
--- /dev/null
+++ b/test/web/auth/oauth_test_controller_test.exs
@@ -0,0 +1,49 @@
+# Pleroma: A lightweight social networking server
+# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
+# SPDX-License-Identifier: AGPL-3.0-only
+
+defmodule Pleroma.Tests.OAuthTestControllerTest do
+ use Pleroma.Web.ConnCase
+
+ import Pleroma.Factory
+
+ setup %{conn: conn} do
+ user = insert(:user)
+ conn = assign(conn, :user, user)
+ %{conn: conn, user: user}
+ end
+
+ test "missed_oauth", %{conn: conn} do
+ res =
+ conn
+ |> get("/test/authenticated_api/missed_oauth")
+ |> json_response(403)
+
+ assert res ==
+ %{
+ "error" =>
+ "Security violation: OAuth scopes check was neither handled nor explicitly skipped."
+ }
+ end
+
+ test "skipped_oauth", %{conn: conn} do
+ conn
+ |> assign(:token, nil)
+ |> get("/test/authenticated_api/skipped_oauth")
+ |> json_response(200)
+ end
+
+ test "performed_oauth", %{user: user} do
+ %{conn: good_token_conn} = oauth_access(["read"], user: user)
+
+ good_token_conn
+ |> get("/test/authenticated_api/performed_oauth")
+ |> json_response(200)
+
+ %{conn: bad_token_conn} = oauth_access(["follow"], user: user)
+
+ bad_token_conn
+ |> get("/test/authenticated_api/performed_oauth")
+ |> json_response(403)
+ end
+end