OpenProject is the leading open source project management software.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
openproject/spec/requests/openid_connect_spec.rb

167 lines
5.3 KiB

#-- copyright
# OpenProject is a project management system.
# Copyright (C) 2012-2014 the OpenProject Foundation (OPF)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2013 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
# See doc/COPYRIGHT.rdoc for more details.
#++
require 'spec_helper'
require 'rspec-steps'
describe "OpenID Connect" do
let(:provider) { OmniAuth::OpenIDConnect::Heroku.new }
let(:user_info) do
{
:sub => "87117114115116",
:name => "Hans Wurst",
:email => "h.wurst@finn.de",
:given_name => "Hans",
:family_name => "Wurst"
}
end
before do
# The redirect will include an authorisation code.
# Since we don't actually get a valid code in the test we will stub the resulting AccessToken.
OpenIDConnect::Client.any_instance.stub(:access_token!) do
OpenIDConnect::AccessToken.new :client => self, :access_token => "foo bar baz"
end
# Using the granted AccessToken the client then performs another request to the OpenID Connect
# provider to retrieve user information such as name and email address.
# Since the test is not supposed to make an actual call it is be stubbed too.
OpenIDConnect::AccessToken.any_instance.stub(:userinfo!).and_return(
OpenIDConnect::ResponseObject::UserInfo.new(user_info))
end
def redirect_from_provider
# Emulate the provider's redirect with a nonsense code.
get "/auth/#{provider.class.provider_name}/callback",
:code => "foobar",
:redirect_uri => "http://localhost:3000/auth/#{provider.class.provider_name}/callack"
end
def click_on_signin(pro_name = provider.class.provider_name)
# Emulate click on sign-in for that particular provider
get "/auth/#{pro_name}"
end
steps "sign-up and login" do
before do
Setting.stub(:plugin_openproject_openid_connect).and_return(
{
"providers" => {
"heroku" => {
"identifier" => "does not",
"secret" => "matter"
}
}
}
)
end
after(:all) do
User.delete_all
end
after do
User.current = nil
end
it "should redirect to the provider's openid connect authentication endpoint" do
click_on_signin
expect(response.status).to be 302
expect(response.location).to match /https:\/\/#{provider.host}.*$/
params = Rack::Utils.parse_nested_query(response.location.gsub(/^.*\?/, ""))
expect(params).to include "client_id"
expect(params["redirect_uri"]).to match /^.*\/auth\/#{provider.class.provider_name}\/callback$/
expect(params["scope"]).to include "openid"
end
it "should redirect back from the provider to the login page" do
redirect_from_provider
expect(response.status).to be 302
expect(response.location).to match /\/login$/
end
it "should have created an account waiting to be activated" do
expect(flash[:notice]).to match /account.*created/
user = User.find_by_mail(user_info[:email])
expect(user).not_to be nil
expect(user.active?).to be false
end
it "should redirect to the provider again upon clicking on sign-in when the user has been activated" do
user = User.find_by_mail(user_info[:email])
user.activate
user.save!
click_on_signin
expect(response.status).to be 302
expect(response.location).to match /https:\/\/#{provider.host}.*$/
end
it "should then login the user upon the redirect back from the provider" do
redirect_from_provider
expect(response.status).to be 302
expect(response.location).to match /my\/first_login$/
end
end
context "provider configuration through the settings" do
it "should make providers that are not configured unavailable" do
get "/login"
expect(response.body).not_to include "Google"
expect{click_on_signin("google")}.to raise_error(ArgumentError)
end
it "should make providers that have been configured through settings available without requiring a restart" do
Setting.stub(:plugin_openproject_openid_connect).and_return(
{
"providers" => {
"google" => {
"identifier" => "does not",
"secret" => "matter"
}
}
}
)
get "/login"
expect(response.body).to include "Google"
expect{click_on_signin("google")}.not_to raise_error
expect(response.status).to be 302
end
end
end