github.com/mad-app/mattermost-server@v5.11.1+incompatible/store/storetest/oauth_store.go (about)

     1  // Copyright (c) 2015-present Mattermost, Inc. All Rights Reserved.
     2  // See License.txt for license information.
     3  
     4  package storetest
     5  
     6  import (
     7  	"testing"
     8  
     9  	"github.com/mattermost/mattermost-server/model"
    10  	"github.com/mattermost/mattermost-server/store"
    11  )
    12  
    13  func TestOAuthStore(t *testing.T, ss store.Store) {
    14  	t.Run("SaveApp", func(t *testing.T) { testOAuthStoreSaveApp(t, ss) })
    15  	t.Run("GetApp", func(t *testing.T) { testOAuthStoreGetApp(t, ss) })
    16  	t.Run("UpdateApp", func(t *testing.T) { testOAuthStoreUpdateApp(t, ss) })
    17  	t.Run("SaveAccessData", func(t *testing.T) { testOAuthStoreSaveAccessData(t, ss) })
    18  	t.Run("OAuthUpdateAccessData", func(t *testing.T) { testOAuthUpdateAccessData(t, ss) })
    19  	t.Run("GetAccessData", func(t *testing.T) { testOAuthStoreGetAccessData(t, ss) })
    20  	t.Run("RemoveAccessData", func(t *testing.T) { testOAuthStoreRemoveAccessData(t, ss) })
    21  	t.Run("SaveAuthData", func(t *testing.T) { testOAuthStoreSaveAuthData(t, ss) })
    22  	t.Run("GetAuthData", func(t *testing.T) { testOAuthStoreGetAuthData(t, ss) })
    23  	t.Run("RemoveAuthData", func(t *testing.T) { testOAuthStoreRemoveAuthData(t, ss) })
    24  	t.Run("RemoveAuthDataByUser", func(t *testing.T) { testOAuthStoreRemoveAuthDataByUser(t, ss) })
    25  	t.Run("OAuthGetAuthorizedApps", func(t *testing.T) { testOAuthGetAuthorizedApps(t, ss) })
    26  	t.Run("OAuthGetAccessDataByUserForApp", func(t *testing.T) { testOAuthGetAccessDataByUserForApp(t, ss) })
    27  	t.Run("DeleteApp", func(t *testing.T) { testOAuthStoreDeleteApp(t, ss) })
    28  }
    29  
    30  func testOAuthStoreSaveApp(t *testing.T, ss store.Store) {
    31  	a1 := model.OAuthApp{}
    32  	a1.CreatorId = model.NewId()
    33  	a1.CallbackUrls = []string{"https://nowhere.com"}
    34  	a1.Homepage = "https://nowhere.com"
    35  
    36  	// Try to save an app that already has an Id
    37  	a1.Id = model.NewId()
    38  	if err := (<-ss.OAuth().SaveApp(&a1)).Err; err == nil {
    39  		t.Fatal("Should have failed, cannot add an OAuth app cannot be save with an Id, it has to be updated")
    40  	}
    41  
    42  	// Try to save an Invalid App
    43  	a1.Id = ""
    44  	if err := (<-ss.OAuth().SaveApp(&a1)).Err; err == nil {
    45  		t.Fatal("Should have failed, app should be invalid cause it doesn' have a name set")
    46  	}
    47  
    48  	// Save the app
    49  	a1.Id = ""
    50  	a1.Name = "TestApp" + model.NewId()
    51  	if err := (<-ss.OAuth().SaveApp(&a1)).Err; err != nil {
    52  		t.Fatal(err)
    53  	}
    54  }
    55  
    56  func testOAuthStoreGetApp(t *testing.T, ss store.Store) {
    57  	a1 := model.OAuthApp{}
    58  	a1.CreatorId = model.NewId()
    59  	a1.Name = "TestApp" + model.NewId()
    60  	a1.CallbackUrls = []string{"https://nowhere.com"}
    61  	a1.Homepage = "https://nowhere.com"
    62  	store.Must(ss.OAuth().SaveApp(&a1))
    63  
    64  	// Lets try to get and app that does not exists
    65  	if err := (<-ss.OAuth().GetApp("fake0123456789abcderfgret1")).Err; err == nil {
    66  		t.Fatal("Should have failed. App does not exists")
    67  	}
    68  
    69  	if err := (<-ss.OAuth().GetApp(a1.Id)).Err; err != nil {
    70  		t.Fatal(err)
    71  	}
    72  
    73  	// Lets try and get the app from a user that hasn't created any apps
    74  	if result := (<-ss.OAuth().GetAppByUser("fake0123456789abcderfgret1", 0, 1000)); result.Err == nil {
    75  		if len(result.Data.([]*model.OAuthApp)) > 0 {
    76  			t.Fatal("Should have failed. Fake user hasn't created any apps")
    77  		}
    78  	} else {
    79  		t.Fatal(result.Err)
    80  	}
    81  
    82  	if err := (<-ss.OAuth().GetAppByUser(a1.CreatorId, 0, 1000)).Err; err != nil {
    83  		t.Fatal(err)
    84  	}
    85  
    86  	if err := (<-ss.OAuth().GetApps(0, 1000)).Err; err != nil {
    87  		t.Fatal(err)
    88  	}
    89  }
    90  
    91  func testOAuthStoreUpdateApp(t *testing.T, ss store.Store) {
    92  	a1 := model.OAuthApp{}
    93  	a1.CreatorId = model.NewId()
    94  	a1.Name = "TestApp" + model.NewId()
    95  	a1.CallbackUrls = []string{"https://nowhere.com"}
    96  	a1.Homepage = "https://nowhere.com"
    97  	store.Must(ss.OAuth().SaveApp(&a1))
    98  
    99  	// temporarily save the created app id
   100  	id := a1.Id
   101  
   102  	a1.CreateAt = 1
   103  	a1.ClientSecret = "pwd"
   104  	a1.CreatorId = "12345678901234567890123456"
   105  
   106  	// Lets update the app by removing the name
   107  	a1.Name = ""
   108  	if result := <-ss.OAuth().UpdateApp(&a1); result.Err == nil {
   109  		t.Fatal("Should have failed. App name is not set")
   110  	}
   111  
   112  	// Lets not find the app that we are trying to update
   113  	a1.Id = "fake0123456789abcderfgret1"
   114  	a1.Name = "NewName"
   115  	if result := <-ss.OAuth().UpdateApp(&a1); result.Err == nil {
   116  		t.Fatal("Should have failed. Not able to find the app")
   117  	}
   118  
   119  	a1.Id = id
   120  	if result := <-ss.OAuth().UpdateApp(&a1); result.Err != nil {
   121  		t.Fatal(result.Err)
   122  	} else {
   123  		ua1 := (result.Data.([2]*model.OAuthApp)[0])
   124  		if ua1.Name != "NewName" {
   125  			t.Fatal("name did not update")
   126  		}
   127  		if ua1.CreateAt == 1 {
   128  			t.Fatal("create at should not have updated")
   129  		}
   130  		if ua1.CreatorId == "12345678901234567890123456" {
   131  			t.Fatal("creator id should not have updated")
   132  		}
   133  	}
   134  }
   135  
   136  func testOAuthStoreSaveAccessData(t *testing.T, ss store.Store) {
   137  	a1 := model.AccessData{}
   138  	a1.ClientId = model.NewId()
   139  	a1.UserId = model.NewId()
   140  
   141  	// Lets try and save an incomplete access data
   142  	if err := (<-ss.OAuth().SaveAccessData(&a1)).Err; err == nil {
   143  		t.Fatal("Should have failed. Access data needs the token")
   144  	}
   145  
   146  	a1.Token = model.NewId()
   147  	a1.RefreshToken = model.NewId()
   148  	a1.RedirectUri = "http://example.com"
   149  
   150  	if err := (<-ss.OAuth().SaveAccessData(&a1)).Err; err != nil {
   151  		t.Fatal(err)
   152  	}
   153  }
   154  
   155  func testOAuthUpdateAccessData(t *testing.T, ss store.Store) {
   156  	a1 := model.AccessData{}
   157  	a1.ClientId = model.NewId()
   158  	a1.UserId = model.NewId()
   159  	a1.Token = model.NewId()
   160  	a1.RefreshToken = model.NewId()
   161  	a1.ExpiresAt = model.GetMillis()
   162  	a1.RedirectUri = "http://example.com"
   163  	store.Must(ss.OAuth().SaveAccessData(&a1))
   164  
   165  	//Try to update to invalid Refresh Token
   166  	refreshToken := a1.RefreshToken
   167  	a1.RefreshToken = model.NewId() + "123"
   168  	if err := (<-ss.OAuth().UpdateAccessData(&a1)).Err; err == nil {
   169  		t.Fatal("Should have failed with invalid token")
   170  	}
   171  
   172  	//Try to update to invalid RedirectUri
   173  	a1.RefreshToken = model.NewId()
   174  	a1.RedirectUri = ""
   175  	if err := (<-ss.OAuth().UpdateAccessData(&a1)).Err; err == nil {
   176  		t.Fatal("Should have failed with invalid Redirect URI")
   177  	}
   178  
   179  	// Should update fine
   180  	a1.RedirectUri = "http://example.com"
   181  	if result := <-ss.OAuth().UpdateAccessData(&a1); result.Err != nil {
   182  		t.Fatal(result.Err)
   183  	} else {
   184  		ra1 := result.Data.(*model.AccessData)
   185  		if ra1.RefreshToken == refreshToken {
   186  			t.Fatal("refresh tokens didn't match")
   187  		}
   188  	}
   189  }
   190  
   191  func testOAuthStoreGetAccessData(t *testing.T, ss store.Store) {
   192  	a1 := model.AccessData{}
   193  	a1.ClientId = model.NewId()
   194  	a1.UserId = model.NewId()
   195  	a1.Token = model.NewId()
   196  	a1.RefreshToken = model.NewId()
   197  	a1.ExpiresAt = model.GetMillis()
   198  	a1.RedirectUri = "http://example.com"
   199  	store.Must(ss.OAuth().SaveAccessData(&a1))
   200  
   201  	if err := (<-ss.OAuth().GetAccessData("invalidToken")).Err; err == nil {
   202  		t.Fatal("Should have failed. There is no data with an invalid token")
   203  	}
   204  
   205  	if result := <-ss.OAuth().GetAccessData(a1.Token); result.Err != nil {
   206  		t.Fatal(result.Err)
   207  	} else {
   208  		ra1 := result.Data.(*model.AccessData)
   209  		if a1.Token != ra1.Token {
   210  			t.Fatal("tokens didn't match")
   211  		}
   212  	}
   213  
   214  	if err := (<-ss.OAuth().GetPreviousAccessData(a1.UserId, a1.ClientId)).Err; err != nil {
   215  		t.Fatal(err)
   216  	}
   217  
   218  	if err := (<-ss.OAuth().GetPreviousAccessData("user", "junk")).Err; err != nil {
   219  		t.Fatal(err)
   220  	}
   221  
   222  	// Try to get the Access data using an invalid refresh token
   223  	if err := (<-ss.OAuth().GetAccessDataByRefreshToken(a1.Token)).Err; err == nil {
   224  		t.Fatal("Should have failed. There is no data with an invalid token")
   225  	}
   226  
   227  	// Get the Access Data using the refresh token
   228  	if result := <-ss.OAuth().GetAccessDataByRefreshToken(a1.RefreshToken); result.Err != nil {
   229  		t.Fatal(result.Err)
   230  	} else {
   231  		ra1 := result.Data.(*model.AccessData)
   232  		if a1.RefreshToken != ra1.RefreshToken {
   233  			t.Fatal("tokens didn't match")
   234  		}
   235  	}
   236  }
   237  
   238  func testOAuthStoreRemoveAccessData(t *testing.T, ss store.Store) {
   239  	a1 := model.AccessData{}
   240  	a1.ClientId = model.NewId()
   241  	a1.UserId = model.NewId()
   242  	a1.Token = model.NewId()
   243  	a1.RefreshToken = model.NewId()
   244  	a1.RedirectUri = "http://example.com"
   245  	store.Must(ss.OAuth().SaveAccessData(&a1))
   246  
   247  	if err := (<-ss.OAuth().RemoveAccessData(a1.Token)).Err; err != nil {
   248  		t.Fatal(err)
   249  	}
   250  
   251  	if result := (<-ss.OAuth().GetPreviousAccessData(a1.UserId, a1.ClientId)); result.Err != nil {
   252  	} else {
   253  		if result.Data != nil {
   254  			t.Fatal("did not delete access token")
   255  		}
   256  	}
   257  }
   258  
   259  func testOAuthStoreSaveAuthData(t *testing.T, ss store.Store) {
   260  	a1 := model.AuthData{}
   261  	a1.ClientId = model.NewId()
   262  	a1.UserId = model.NewId()
   263  	a1.Code = model.NewId()
   264  	a1.RedirectUri = "http://example.com"
   265  	if err := (<-ss.OAuth().SaveAuthData(&a1)).Err; err != nil {
   266  		t.Fatal(err)
   267  	}
   268  }
   269  
   270  func testOAuthStoreGetAuthData(t *testing.T, ss store.Store) {
   271  	a1 := model.AuthData{}
   272  	a1.ClientId = model.NewId()
   273  	a1.UserId = model.NewId()
   274  	a1.Code = model.NewId()
   275  	a1.RedirectUri = "http://example.com"
   276  	store.Must(ss.OAuth().SaveAuthData(&a1))
   277  
   278  	if err := (<-ss.OAuth().GetAuthData(a1.Code)).Err; err != nil {
   279  		t.Fatal(err)
   280  	}
   281  }
   282  
   283  func testOAuthStoreRemoveAuthData(t *testing.T, ss store.Store) {
   284  	a1 := model.AuthData{}
   285  	a1.ClientId = model.NewId()
   286  	a1.UserId = model.NewId()
   287  	a1.Code = model.NewId()
   288  	a1.RedirectUri = "http://example.com"
   289  	store.Must(ss.OAuth().SaveAuthData(&a1))
   290  
   291  	if err := (<-ss.OAuth().RemoveAuthData(a1.Code)).Err; err != nil {
   292  		t.Fatal(err)
   293  	}
   294  
   295  	if err := (<-ss.OAuth().GetAuthData(a1.Code)).Err; err == nil {
   296  		t.Fatal("should have errored - auth code removed")
   297  	}
   298  }
   299  
   300  func testOAuthStoreRemoveAuthDataByUser(t *testing.T, ss store.Store) {
   301  	a1 := model.AuthData{}
   302  	a1.ClientId = model.NewId()
   303  	a1.UserId = model.NewId()
   304  	a1.Code = model.NewId()
   305  	a1.RedirectUri = "http://example.com"
   306  	store.Must(ss.OAuth().SaveAuthData(&a1))
   307  
   308  	if err := (<-ss.OAuth().PermanentDeleteAuthDataByUser(a1.UserId)).Err; err != nil {
   309  		t.Fatal(err)
   310  	}
   311  }
   312  
   313  func testOAuthGetAuthorizedApps(t *testing.T, ss store.Store) {
   314  	a1 := model.OAuthApp{}
   315  	a1.CreatorId = model.NewId()
   316  	a1.Name = "TestApp" + model.NewId()
   317  	a1.CallbackUrls = []string{"https://nowhere.com"}
   318  	a1.Homepage = "https://nowhere.com"
   319  	store.Must(ss.OAuth().SaveApp(&a1))
   320  
   321  	// Lets try and get an Authorized app for a user who hasn't authorized it
   322  	if result := <-ss.OAuth().GetAuthorizedApps("fake0123456789abcderfgret1", 0, 1000); result.Err == nil {
   323  		if len(result.Data.([]*model.OAuthApp)) > 0 {
   324  			t.Fatal("Should have failed. Fake user hasn't authorized the app")
   325  		}
   326  	} else {
   327  		t.Fatal(result.Err)
   328  	}
   329  
   330  	// allow the app
   331  	p := model.Preference{}
   332  	p.UserId = a1.CreatorId
   333  	p.Category = model.PREFERENCE_CATEGORY_AUTHORIZED_OAUTH_APP
   334  	p.Name = a1.Id
   335  	p.Value = "true"
   336  	store.Must(ss.Preference().Save(&model.Preferences{p}))
   337  
   338  	if result := <-ss.OAuth().GetAuthorizedApps(a1.CreatorId, 0, 1000); result.Err != nil {
   339  		t.Fatal(result.Err)
   340  	} else {
   341  		apps := result.Data.([]*model.OAuthApp)
   342  		if len(apps) == 0 {
   343  			t.Fatal("It should have return apps")
   344  		}
   345  	}
   346  }
   347  
   348  func testOAuthGetAccessDataByUserForApp(t *testing.T, ss store.Store) {
   349  	a1 := model.OAuthApp{}
   350  	a1.CreatorId = model.NewId()
   351  	a1.Name = "TestApp" + model.NewId()
   352  	a1.CallbackUrls = []string{"https://nowhere.com"}
   353  	a1.Homepage = "https://nowhere.com"
   354  	store.Must(ss.OAuth().SaveApp(&a1))
   355  
   356  	// allow the app
   357  	p := model.Preference{}
   358  	p.UserId = a1.CreatorId
   359  	p.Category = model.PREFERENCE_CATEGORY_AUTHORIZED_OAUTH_APP
   360  	p.Name = a1.Id
   361  	p.Value = "true"
   362  	store.Must(ss.Preference().Save(&model.Preferences{p}))
   363  
   364  	if result := <-ss.OAuth().GetAuthorizedApps(a1.CreatorId, 0, 1000); result.Err != nil {
   365  		t.Fatal(result.Err)
   366  	} else {
   367  		apps := result.Data.([]*model.OAuthApp)
   368  		if len(apps) == 0 {
   369  			t.Fatal("It should have return apps")
   370  		}
   371  	}
   372  
   373  	// save the token
   374  	ad1 := model.AccessData{}
   375  	ad1.ClientId = a1.Id
   376  	ad1.UserId = a1.CreatorId
   377  	ad1.Token = model.NewId()
   378  	ad1.RefreshToken = model.NewId()
   379  	ad1.RedirectUri = "http://example.com"
   380  
   381  	if err := (<-ss.OAuth().SaveAccessData(&ad1)).Err; err != nil {
   382  		t.Fatal(err)
   383  	}
   384  
   385  	if result := <-ss.OAuth().GetAccessDataByUserForApp(a1.CreatorId, a1.Id); result.Err != nil {
   386  		t.Fatal(result.Err)
   387  	} else {
   388  		accessData := result.Data.([]*model.AccessData)
   389  		if len(accessData) == 0 {
   390  			t.Fatal("It should have return access data")
   391  		}
   392  	}
   393  }
   394  
   395  func testOAuthStoreDeleteApp(t *testing.T, ss store.Store) {
   396  	a1 := model.OAuthApp{}
   397  	a1.CreatorId = model.NewId()
   398  	a1.Name = "TestApp" + model.NewId()
   399  	a1.CallbackUrls = []string{"https://nowhere.com"}
   400  	a1.Homepage = "https://nowhere.com"
   401  	store.Must(ss.OAuth().SaveApp(&a1))
   402  
   403  	// delete a non-existent app
   404  	if err := (<-ss.OAuth().DeleteApp("fakeclientId")).Err; err != nil {
   405  		t.Fatal(err)
   406  	}
   407  
   408  	s1 := model.Session{}
   409  	s1.UserId = model.NewId()
   410  	s1.Token = model.NewId()
   411  	s1.IsOAuth = true
   412  
   413  	store.Must(ss.Session().Save(&s1))
   414  
   415  	ad1 := model.AccessData{}
   416  	ad1.ClientId = a1.Id
   417  	ad1.UserId = a1.CreatorId
   418  	ad1.Token = s1.Token
   419  	ad1.RefreshToken = model.NewId()
   420  	ad1.RedirectUri = "http://example.com"
   421  
   422  	store.Must(ss.OAuth().SaveAccessData(&ad1))
   423  
   424  	if err := (<-ss.OAuth().DeleteApp(a1.Id)).Err; err != nil {
   425  		t.Fatal(err)
   426  	}
   427  
   428  	if err := (<-ss.Session().Get(s1.Token)).Err; err == nil {
   429  		t.Fatal("should error - session should be deleted")
   430  	}
   431  
   432  	if err := (<-ss.OAuth().GetAccessData(s1.Token)).Err; err == nil {
   433  		t.Fatal("should error - access data should be deleted")
   434  	}
   435  }