* Add PKCE support. * Fix tests * Update oauth2.md * Rename usePkce * Fix the BrokenComponent error * Update oauth2.md * Remove isCode variable. Remove uuid4 dependency. * Remove utils functions * Import crypto * Fix tests * Fix the tests * Cleanup * Fix code_challenge generation * Move code challenge and verifier to utils for mocks. Update tests. * Mock the PKCE methods in the utils file properly. * Add missing expect * use target-method spies * Add comments to explain test values. * Get rid of jsrsasign.
176 lines
4.4 KiB
JavaScript
176 lines
4.4 KiB
JavaScript
/* eslint-env mocha */
|
|
import expect, { createSpy } from "expect"
|
|
import {
|
|
authorizeRequest,
|
|
authorizeAccessCodeWithFormParams,
|
|
} from "corePlugins/auth/actions"
|
|
|
|
describe("auth plugin - actions", () => {
|
|
|
|
describe("authorizeRequest", () => {
|
|
|
|
[
|
|
[
|
|
{
|
|
oas3: true,
|
|
server: "https://host/resource",
|
|
scheme: "http",
|
|
host: null,
|
|
url: "http://specs/file",
|
|
},
|
|
"https://host/authorize"
|
|
],
|
|
[
|
|
{
|
|
oas3: false,
|
|
server: null,
|
|
scheme: "https",
|
|
host: undefined,
|
|
url: "https://specs/file",
|
|
},
|
|
"https://specs/authorize"
|
|
],
|
|
[
|
|
{
|
|
oas3: false,
|
|
server: null,
|
|
scheme: "https",
|
|
host: "host",
|
|
url: "http://specs/file",
|
|
},
|
|
"http://specs/authorize"
|
|
],
|
|
].forEach(([{oas3, server, scheme, host, url}, expectedFetchUrl]) => {
|
|
it("should resolve authorization endpoint against the server URL", () => {
|
|
|
|
// Given
|
|
const data = {
|
|
url: "/authorize"
|
|
}
|
|
const system = {
|
|
fn: {
|
|
fetch: createSpy().andReturn(Promise.resolve())
|
|
},
|
|
getConfigs: () => ({}),
|
|
authSelectors: {
|
|
getConfigs: () => ({})
|
|
},
|
|
oas3Selectors: {
|
|
selectedServer: () => server
|
|
},
|
|
specSelectors: {
|
|
isOAS3: () => oas3,
|
|
operationScheme: () => scheme,
|
|
host: () => host,
|
|
url: () => url
|
|
}
|
|
}
|
|
|
|
// When
|
|
authorizeRequest(data)(system)
|
|
|
|
// Then
|
|
expect(system.fn.fetch.calls.length).toEqual(1)
|
|
expect(system.fn.fetch.calls[0].arguments[0]).toInclude({url: expectedFetchUrl})
|
|
})
|
|
})
|
|
|
|
it("should add additionalQueryStringParams to Swagger 2.0 authorization and token URLs", () => {
|
|
|
|
// Given
|
|
const data = {
|
|
url: "/authorize?q=1"
|
|
}
|
|
const system = {
|
|
fn: {
|
|
fetch: createSpy().andReturn(Promise.resolve())
|
|
},
|
|
getConfigs: () => ({}),
|
|
authSelectors: {
|
|
getConfigs: () => ({
|
|
additionalQueryStringParams: {
|
|
myCustomParam: "abc123"
|
|
}
|
|
})
|
|
},
|
|
specSelectors: {
|
|
isOAS3: () => false,
|
|
operationScheme: () => "https",
|
|
host: () => "http://google.com",
|
|
url: () => "http://google.com/swagger.json"
|
|
}
|
|
}
|
|
|
|
// When
|
|
authorizeRequest(data)(system)
|
|
|
|
// Then
|
|
expect(system.fn.fetch.calls.length).toEqual(1)
|
|
|
|
expect(system.fn.fetch.calls[0].arguments[0].url)
|
|
.toEqual("http://google.com/authorize?q=1&myCustomParam=abc123")
|
|
})
|
|
|
|
it("should add additionalQueryStringParams to OpenAPI 3.0 authorization and token URLs", () => {
|
|
|
|
// Given
|
|
const data = {
|
|
url: "/authorize?q=1"
|
|
}
|
|
const system = {
|
|
fn: {
|
|
fetch: createSpy().andReturn(Promise.resolve())
|
|
},
|
|
getConfigs: () => ({}),
|
|
authSelectors: {
|
|
getConfigs: () => ({
|
|
additionalQueryStringParams: {
|
|
myCustomParam: "abc123"
|
|
}
|
|
})
|
|
},
|
|
oas3Selectors: {
|
|
selectedServer: () => "http://google.com"
|
|
},
|
|
specSelectors: {
|
|
isOAS3: () => true,
|
|
}
|
|
}
|
|
|
|
// When
|
|
authorizeRequest(data)(system)
|
|
|
|
// Then
|
|
expect(system.fn.fetch.calls.length).toEqual(1)
|
|
|
|
expect(system.fn.fetch.calls[0].arguments[0].url)
|
|
.toEqual("http://google.com/authorize?q=1&myCustomParam=abc123")
|
|
})
|
|
})
|
|
|
|
describe("tokenRequest", function() {
|
|
it("should send the code verifier when set", () => {
|
|
const data = {
|
|
auth: {
|
|
schema: {
|
|
get: () => "http://tokenUrl"
|
|
},
|
|
codeVerifier: "mock_code_verifier"
|
|
},
|
|
redirectUrl: "http://google.com"
|
|
}
|
|
|
|
const authActions = {
|
|
authorizeRequest: createSpy()
|
|
}
|
|
|
|
authorizeAccessCodeWithFormParams(data)({ authActions })
|
|
|
|
expect(authActions.authorizeRequest.calls.length).toEqual(1)
|
|
const actualArgument = authActions.authorizeRequest.calls[0].arguments[0]
|
|
expect(actualArgument.body).toContain("code_verifier=" + data.auth.codeVerifier)
|
|
expect(actualArgument.body).toContain("grant_type=authorization_code")
|
|
})
|
|
})
|
|
})
|