Improved some tests, got to 95% coverage
This commit is contained in:
parent
ca1819776e
commit
bf16d0eb55
@ -150,7 +150,7 @@ class FilesystemJsonStorage implements TokenStorageInterface, LoggerAwareInterfa
|
||||
if (!is_array($data)) { return null; }
|
||||
|
||||
// Check that this is a redeemed access token.
|
||||
if ($data['_redeemed'] ?? false === false) { return null; }
|
||||
if (($data['exchanged_at'] ?? false) === false) { return null; }
|
||||
|
||||
// Check that the access token is still valid. valid_until=null means it should live until
|
||||
// explicitly revoked.
|
||||
|
@ -801,6 +801,16 @@ EOT
|
||||
$this->assertEquals($authCodeData['me'], $resJson['me']);
|
||||
$this->assertEquals($authCodeData['profile'], $resJson['profile']);
|
||||
$this->assertTrue(scopeEquals($authCodeData['scope'], $resJson['scope']));
|
||||
|
||||
// Make sure we can fetch the token from the token storage.
|
||||
$accessToken = $s->getTokenStorage()->getAccessToken($resJson['access_token']);
|
||||
$this->assertNotNull($accessToken);
|
||||
$this->assertEquals($accessToken['me'], $authCodeData['me']);
|
||||
$this->assertEquals($accessToken['scope'], $authCodeData['scope']);
|
||||
|
||||
// Make sure we can revoke the token and no longer fetch it.
|
||||
$this->assertTrue($s->getTokenStorage()->revokeAccessToken($resJson['access_token']));
|
||||
$this->assertNull($s->getTokenStorage()->getAccessToken($resJson['access_token']));
|
||||
}
|
||||
|
||||
/**
|
||||
|
71
tests/SingleUserPasswordAuthenticationCallbackTest.php
Normal file
71
tests/SingleUserPasswordAuthenticationCallbackTest.php
Normal file
@ -0,0 +1,71 @@
|
||||
<?php declare(strict_types=1);
|
||||
|
||||
namespace Taproot\IndieAuth\Test;
|
||||
|
||||
use BadMethodCallException;
|
||||
use Exception;
|
||||
use Nyholm\Psr7;
|
||||
use Nyholm\Psr7\ServerRequest;
|
||||
use PHPUnit\Framework\TestCase;
|
||||
use Taproot\IndieAuth\Callback\SingleUserPasswordAuthenticationCallback;
|
||||
use Taproot\IndieAuth\Server;
|
||||
|
||||
class SingleUserPasswordAuthenticationCallbackTest extends TestCase {
|
||||
public function testThrowsExceptionIfUserDataHasNoMeKey() {
|
||||
try {
|
||||
$c = new SingleUserPasswordAuthenticationCallback([
|
||||
'not_me' => 'blah'
|
||||
], password_hash('password', PASSWORD_DEFAULT));
|
||||
$this->fail();
|
||||
} catch (BadMethodCallException $e) {
|
||||
$this->assertEquals('The $user array MUST contain a “me” key, the value which must be the user’s canonical URL as a string.', $e->getMessage());
|
||||
}
|
||||
}
|
||||
|
||||
public function testThrowsExceptionIfHashedPasswordIsInvalid() {
|
||||
try {
|
||||
$c = new SingleUserPasswordAuthenticationCallback([
|
||||
'me' => 'https://me.example.com/'
|
||||
], 'definitely not a hashed password');
|
||||
$this->fail();
|
||||
} catch (BadMethodCallException $e) {
|
||||
$this->assertTrue(true);
|
||||
}
|
||||
}
|
||||
|
||||
public function testShowsAuthenticationFormOnUnauthenticatedRequest() {
|
||||
$callback = new SingleUserPasswordAuthenticationCallback([
|
||||
'me' => 'https://me.example.com/'
|
||||
], password_hash('password', PASSWORD_DEFAULT));
|
||||
|
||||
$formAction = 'https://example.com/formaction';
|
||||
|
||||
$req = (new ServerRequest('GET', 'https://example.com/login'))->withAttribute(Server::DEFAULT_CSRF_KEY, 'csrf token');
|
||||
$res = $callback($req, $formAction);
|
||||
|
||||
$this->assertEquals(200, $res->getStatusCode());
|
||||
// For the moment, just do a very naieve test.
|
||||
$this->assertStringContainsString($formAction, (string) $res->getBody());
|
||||
}
|
||||
|
||||
public function testReturnsUserDataOnAuthenticatedRequest() {
|
||||
$userData = [
|
||||
'me' => 'https://me.example.com',
|
||||
'profile' => ['name' => 'Me']
|
||||
];
|
||||
|
||||
$password = 'my very secure password';
|
||||
|
||||
$callback = new SingleUserPasswordAuthenticationCallback($userData, password_hash($password, PASSWORD_DEFAULT));
|
||||
|
||||
$req = (new ServerRequest('POST', 'https://example.com/login'))
|
||||
->withAttribute(Server::DEFAULT_CSRF_KEY, 'csrf token')
|
||||
->withParsedBody([
|
||||
SingleUserPasswordAuthenticationCallback::PASSWORD_FORM_PARAMETER => $password
|
||||
]);
|
||||
|
||||
$res = $callback($req, 'form_action');
|
||||
|
||||
$this->assertEquals($userData, $res);
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user