2023-04-02 21:59:38 +02:00
|
|
|
process.env.NODE_ENV = 'test';
|
|
|
|
|
|
|
|
import * as assert from 'assert';
|
2023-04-07 10:06:07 +02:00
|
|
|
import { port, relativeFetch, signup, startServer } from '../utils.js';
|
2023-04-02 21:59:38 +02:00
|
|
|
import type { INestApplicationContext } from '@nestjs/common';
|
|
|
|
import { AuthorizationCode } from 'simple-oauth2';
|
|
|
|
import pkceChallenge from 'pkce-challenge';
|
|
|
|
import { JSDOM } from 'jsdom';
|
|
|
|
|
2023-04-10 10:17:41 +02:00
|
|
|
const host = `http://127.0.0.1:${port}`;
|
|
|
|
|
2023-04-03 22:32:12 +02:00
|
|
|
const clientPort = port + 1;
|
|
|
|
const redirect_uri = `http://127.0.0.1:${clientPort}/redirect`;
|
|
|
|
|
|
|
|
function getClient(): AuthorizationCode<'client_id'> {
|
|
|
|
return new AuthorizationCode({
|
|
|
|
client: {
|
|
|
|
id: `http://127.0.0.1:${clientPort}/`,
|
|
|
|
},
|
|
|
|
auth: {
|
2023-04-10 10:17:41 +02:00
|
|
|
tokenHost: host,
|
2023-04-03 22:32:12 +02:00
|
|
|
tokenPath: '/oauth/token',
|
|
|
|
authorizePath: '/oauth/authorize',
|
|
|
|
},
|
|
|
|
options: {
|
|
|
|
authorizationMethod: 'body',
|
|
|
|
},
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
function getTransactionId(html: string): string | undefined {
|
|
|
|
const fragment = JSDOM.fragment(html);
|
|
|
|
return fragment.querySelector<HTMLMetaElement>('meta[name="misskey:oauth:transaction-id"]')?.content;
|
|
|
|
}
|
|
|
|
|
|
|
|
function fetchDecision(cookie: string, transactionId: string, user: any, { cancel }: { cancel?: boolean } = {}): Promise<Response> {
|
2023-04-10 10:17:41 +02:00
|
|
|
return fetch(new URL('/oauth/decision', host), {
|
2023-04-03 22:32:12 +02:00
|
|
|
method: 'post',
|
|
|
|
body: new URLSearchParams({
|
|
|
|
transaction_id: transactionId!,
|
|
|
|
login_token: user.token,
|
|
|
|
cancel: cancel ? 'cancel' : '',
|
|
|
|
}),
|
|
|
|
redirect: 'manual',
|
|
|
|
headers: {
|
|
|
|
'content-type': 'application/x-www-form-urlencoded',
|
|
|
|
cookie,
|
|
|
|
},
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
async function fetchDecisionFromResponse(response: Response, user: any, { cancel }: { cancel?: boolean } = {}): Promise<Response> {
|
|
|
|
const cookie = response.headers.get('set-cookie');
|
|
|
|
const transactionId = getTransactionId(await response.text());
|
|
|
|
|
|
|
|
return await fetchDecision(cookie!, transactionId!, user, { cancel });
|
|
|
|
}
|
|
|
|
|
2023-04-02 21:59:38 +02:00
|
|
|
describe('OAuth', () => {
|
|
|
|
let app: INestApplicationContext;
|
|
|
|
|
|
|
|
let alice: any;
|
|
|
|
|
|
|
|
beforeAll(async () => {
|
|
|
|
app = await startServer();
|
|
|
|
alice = await signup({ username: 'alice' });
|
|
|
|
// fastify = Fastify();
|
|
|
|
}, 1000 * 60 * 2);
|
|
|
|
|
|
|
|
afterAll(async () => {
|
|
|
|
await app.close();
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Full flow', async () => {
|
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
2023-04-03 22:32:12 +02:00
|
|
|
const client = getClient();
|
2023-04-02 21:59:38 +02:00
|
|
|
|
2023-04-03 22:32:12 +02:00
|
|
|
const response = await fetch(client.authorizeURL({
|
2023-04-02 21:59:38 +02:00
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge,
|
|
|
|
code_challenge_method: 'S256',
|
2023-04-03 22:32:12 +02:00
|
|
|
}));
|
2023-04-02 21:59:38 +02:00
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
const cookie = response.headers.get('set-cookie');
|
|
|
|
assert.ok(cookie?.startsWith('connect.sid='));
|
|
|
|
|
2023-04-03 22:32:12 +02:00
|
|
|
const transactionId = getTransactionId(await response.text());
|
2023-04-02 21:59:38 +02:00
|
|
|
assert.strictEqual(typeof transactionId, 'string');
|
|
|
|
|
2023-04-03 22:32:12 +02:00
|
|
|
const decisionResponse = await fetchDecision(cookie!, transactionId!, alice);
|
2023-04-02 21:59:38 +02:00
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
assert.ok(decisionResponse.headers.has('location'));
|
|
|
|
|
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.strictEqual(location.origin + location.pathname, redirect_uri);
|
|
|
|
assert.ok(location.searchParams.has('code'));
|
|
|
|
assert.strictEqual(location.searchParams.get('state'), 'state');
|
2023-04-09 18:49:58 +02:00
|
|
|
assert.strictEqual(location.searchParams.get('iss'), 'http://misskey.local'); // RFC 9207
|
2023-04-02 21:59:38 +02:00
|
|
|
|
|
|
|
const token = await client.getToken({
|
|
|
|
code: location.searchParams.get('code')!,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier,
|
|
|
|
});
|
|
|
|
assert.strictEqual(typeof token.token.access_token, 'string');
|
|
|
|
assert.strictEqual(token.token.token_type, 'Bearer');
|
2023-04-09 21:21:10 +02:00
|
|
|
assert.strictEqual(token.token.scope, 'write:notes');
|
2023-04-07 10:06:07 +02:00
|
|
|
|
|
|
|
const createResponse = await relativeFetch('api/notes/create', {
|
|
|
|
method: 'POST',
|
|
|
|
headers: {
|
|
|
|
Authorization: `Bearer ${token.token.access_token}`,
|
|
|
|
'Content-Type': 'application/json',
|
|
|
|
},
|
|
|
|
body: JSON.stringify({ text: 'test' }),
|
|
|
|
});
|
|
|
|
assert.strictEqual(createResponse.status, 200);
|
|
|
|
|
|
|
|
const createResponseBody: any = await createResponse.json();
|
|
|
|
assert.strictEqual(createResponseBody.createdNote.text, 'test');
|
2023-04-02 21:59:38 +02:00
|
|
|
});
|
2023-04-03 22:32:12 +02:00
|
|
|
|
2023-04-08 15:52:43 +02:00
|
|
|
describe('PKCE', () => {
|
|
|
|
test('Require PKCE', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
2023-04-08 16:03:20 +02:00
|
|
|
// Pattern 1: No PKCE fields at all
|
2023-04-08 15:52:43 +02:00
|
|
|
let response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
}));
|
|
|
|
assert.ok(!response.ok);
|
|
|
|
|
2023-04-08 16:03:20 +02:00
|
|
|
// Pattern 2: Only code_challenge
|
2023-04-08 15:52:43 +02:00
|
|
|
response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
}));
|
|
|
|
assert.ok(!response.ok);
|
|
|
|
|
2023-04-08 16:03:20 +02:00
|
|
|
// Pattern 2: Only code_challenge_method
|
2023-04-08 15:52:43 +02:00
|
|
|
response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
assert.ok(!response.ok);
|
|
|
|
|
2023-04-08 16:03:20 +02:00
|
|
|
// Pattern 3: Unsupported code_challenge_method
|
2023-04-08 15:52:43 +02:00
|
|
|
response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'SSSS',
|
|
|
|
}));
|
|
|
|
assert.ok(!response.ok);
|
|
|
|
});
|
2023-04-03 22:32:12 +02:00
|
|
|
|
2023-04-08 15:52:43 +02:00
|
|
|
test('Verify PKCE', async () => {
|
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge,
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
|
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice);
|
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
|
|
|
const code = new URL(decisionResponse.headers.get('location')!).searchParams.get('code')!;
|
|
|
|
assert.ok(!!code);
|
|
|
|
|
|
|
|
// Pattern 1: code followed by some junk code
|
|
|
|
await assert.rejects(client.getToken({
|
|
|
|
code,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier: code_verifier + 'x',
|
|
|
|
}));
|
|
|
|
|
|
|
|
// Pattern 2: clipped code
|
|
|
|
await assert.rejects(client.getToken({
|
|
|
|
code,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier: code_verifier.slice(0, 80),
|
|
|
|
}));
|
|
|
|
|
|
|
|
// Pattern 3: Some part of code is replaced
|
|
|
|
await assert.rejects(client.getToken({
|
|
|
|
code,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier: code_verifier.slice(0, -10) + 'x'.repeat(10),
|
|
|
|
}));
|
|
|
|
|
|
|
|
// And now the code is invalidated by the previous failures
|
|
|
|
await assert.rejects(client.getToken({
|
|
|
|
code,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier,
|
|
|
|
}));
|
|
|
|
});
|
2023-04-03 22:32:12 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
test('Cancellation', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
|
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice, { cancel: true });
|
2023-04-08 15:52:43 +02:00
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
2023-04-03 22:32:12 +02:00
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.ok(!location.searchParams.has('code'));
|
|
|
|
assert.ok(location.searchParams.has('error'));
|
|
|
|
});
|
2023-04-05 20:47:12 +02:00
|
|
|
|
2023-04-08 20:31:18 +02:00
|
|
|
describe('Scope', () => {
|
|
|
|
test('Missing scope', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
|
|
|
|
// TODO: But 500 is not a valid code, should be 403 or such. Check the OAuth spec
|
|
|
|
assert.strictEqual(response.status, 500);
|
|
|
|
});
|
2023-04-05 20:47:12 +02:00
|
|
|
|
2023-04-08 20:31:18 +02:00
|
|
|
test('Empty scope', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: '',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
|
|
|
|
// TODO: But 500 is not a valid code, should be 403 or such. Check the OAuth spec
|
|
|
|
assert.strictEqual(response.status, 500);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Unknown scopes', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'test:unknown test:unknown2',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
|
|
|
|
// TODO: But 500 is not a valid code, should be 403 or such. Check the OAuth spec
|
|
|
|
assert.strictEqual(response.status, 500);
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Partially known scopes', async () => {
|
2023-04-09 21:21:10 +02:00
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
2023-04-08 20:31:18 +02:00
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes test:unknown test:unknown2',
|
|
|
|
state: 'state',
|
2023-04-09 21:21:10 +02:00
|
|
|
code_challenge,
|
2023-04-08 20:31:18 +02:00
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
|
|
|
|
// Just get the known scope for this case for backward compatibility
|
|
|
|
assert.strictEqual(response.status, 200);
|
2023-04-09 21:21:10 +02:00
|
|
|
|
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice);
|
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.ok(location.searchParams.has('code'));
|
|
|
|
|
|
|
|
const code = new URL(decisionResponse.headers.get('location')!).searchParams.get('code')!;
|
|
|
|
assert.ok(!!code);
|
|
|
|
|
|
|
|
const token = await client.getToken({
|
|
|
|
code,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier,
|
|
|
|
});
|
|
|
|
|
|
|
|
// OAuth2 requires returning `scope` in the token response if the resulting scope is different than the requested one
|
|
|
|
// (Although Misskey always return scope, which is also fine)
|
|
|
|
assert.strictEqual(token.token.scope, 'write:notes');
|
2023-04-08 20:31:18 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
test('Known scopes', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes read:account',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
});
|
|
|
|
|
2023-04-09 21:21:10 +02:00
|
|
|
test('Duplicated scopes', async () => {
|
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes write:notes read:account read:account',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge,
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
|
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice);
|
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.ok(location.searchParams.has('code'));
|
|
|
|
|
|
|
|
const code = new URL(decisionResponse.headers.get('location')!).searchParams.get('code')!;
|
|
|
|
assert.ok(!!code);
|
|
|
|
|
|
|
|
const token = await client.getToken({
|
|
|
|
code,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier,
|
|
|
|
});
|
|
|
|
assert.strictEqual(token.token.scope, 'write:notes read:account');
|
|
|
|
});
|
|
|
|
|
|
|
|
test('Scope check by API', async () => {
|
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'read:account',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge,
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
assert.strictEqual(response.status, 200);
|
2023-04-09 14:01:44 +02:00
|
|
|
|
2023-04-09 21:21:10 +02:00
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice);
|
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.ok(location.searchParams.has('code'));
|
|
|
|
|
|
|
|
const token = await client.getToken({
|
|
|
|
code: location.searchParams.get('code')!,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier,
|
|
|
|
});
|
|
|
|
assert.strictEqual(typeof token.token.access_token, 'string');
|
|
|
|
|
|
|
|
const createResponse = await relativeFetch('api/notes/create', {
|
|
|
|
method: 'POST',
|
|
|
|
headers: {
|
|
|
|
Authorization: `Bearer ${token.token.access_token}`,
|
|
|
|
'Content-Type': 'application/json',
|
|
|
|
},
|
|
|
|
body: JSON.stringify({ text: 'test' }),
|
|
|
|
});
|
|
|
|
// XXX: PERMISSION_DENIED is not using kind: 'permission' and gives 400 instead of 403
|
|
|
|
assert.strictEqual(createResponse.status, 400);
|
|
|
|
});
|
2023-04-09 14:01:44 +02:00
|
|
|
});
|
|
|
|
|
|
|
|
test('Authorization header', async () => {
|
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge,
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
|
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice);
|
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.ok(location.searchParams.has('code'));
|
|
|
|
|
|
|
|
const token = await client.getToken({
|
|
|
|
code: location.searchParams.get('code')!,
|
|
|
|
redirect_uri,
|
|
|
|
code_verifier,
|
|
|
|
});
|
|
|
|
|
|
|
|
// Pattern 1: No preceding "Bearer "
|
|
|
|
let createResponse = await relativeFetch('api/notes/create', {
|
|
|
|
method: 'POST',
|
|
|
|
headers: {
|
|
|
|
Authorization: token.token.access_token as string,
|
|
|
|
'Content-Type': 'application/json',
|
|
|
|
},
|
|
|
|
body: JSON.stringify({ text: 'test' }),
|
|
|
|
});
|
|
|
|
assert.strictEqual(createResponse.status, 401);
|
|
|
|
|
|
|
|
// Pattern 2: Incorrect token
|
|
|
|
createResponse = await relativeFetch('api/notes/create', {
|
|
|
|
method: 'POST',
|
|
|
|
headers: {
|
|
|
|
Authorization: `Bearer ${(token.token.access_token as string).slice(0, -1)}`,
|
|
|
|
'Content-Type': 'application/json',
|
|
|
|
},
|
|
|
|
body: JSON.stringify({ text: 'test' }),
|
|
|
|
});
|
|
|
|
// RFC 6750 section 3.1 says 401 but it's SHOULD not MUST. 403 should be okay for now.
|
|
|
|
assert.strictEqual(createResponse.status, 403);
|
|
|
|
|
|
|
|
// TODO: error code (invalid_token)
|
2023-04-08 20:31:18 +02:00
|
|
|
});
|
|
|
|
|
2023-04-09 16:43:19 +02:00
|
|
|
describe('Redirection', () => {
|
|
|
|
test('Invalid redirect_uri at authorization endpoint', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri: 'http://127.0.0.2/',
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
// TODO: status code
|
|
|
|
assert.strictEqual(response.status, 500);
|
|
|
|
});
|
|
|
|
|
2023-04-09 18:49:58 +02:00
|
|
|
test('No redirect_uri at authorization endpoint', async () => {
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge: 'code',
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
// TODO: status code
|
|
|
|
assert.strictEqual(response.status, 500);
|
|
|
|
});
|
|
|
|
|
2023-04-09 16:43:19 +02:00
|
|
|
test('Invalid redirect_uri at token endpoint', async () => {
|
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge,
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
|
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice);
|
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.ok(location.searchParams.has('code'));
|
|
|
|
|
|
|
|
await assert.rejects(client.getToken({
|
|
|
|
code: location.searchParams.get('code')!,
|
|
|
|
redirect_uri: 'http://127.0.0.2/',
|
|
|
|
code_verifier,
|
|
|
|
}));
|
|
|
|
});
|
|
|
|
|
2023-04-09 18:49:58 +02:00
|
|
|
test('No redirect_uri at token endpoint', async () => {
|
|
|
|
const { code_challenge, code_verifier } = pkceChallenge.default(128);
|
|
|
|
|
|
|
|
const client = getClient();
|
|
|
|
|
|
|
|
const response = await fetch(client.authorizeURL({
|
|
|
|
redirect_uri,
|
|
|
|
scope: 'write:notes',
|
|
|
|
state: 'state',
|
|
|
|
code_challenge,
|
|
|
|
code_challenge_method: 'S256',
|
|
|
|
}));
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
|
|
|
|
const decisionResponse = await fetchDecisionFromResponse(response, alice);
|
|
|
|
assert.strictEqual(decisionResponse.status, 302);
|
|
|
|
|
|
|
|
const location = new URL(decisionResponse.headers.get('location')!);
|
|
|
|
assert.ok(location.searchParams.has('code'));
|
|
|
|
|
|
|
|
await assert.rejects(client.getToken({
|
|
|
|
code: location.searchParams.get('code')!,
|
|
|
|
code_verifier,
|
|
|
|
}));
|
|
|
|
});
|
|
|
|
|
2023-04-09 16:43:19 +02:00
|
|
|
// TODO: disallow random same-origin URLs with strict redirect_uris with client information discovery
|
|
|
|
});
|
|
|
|
|
2023-04-10 10:17:41 +02:00
|
|
|
test('Server metadata', async () => {
|
|
|
|
const response = await fetch(new URL('.well-known/oauth-authorization-server', host));
|
|
|
|
assert.strictEqual(response.status, 200);
|
|
|
|
|
|
|
|
const body = await response.json();
|
|
|
|
assert.strictEqual(body.issuer, 'http://misskey.local');
|
|
|
|
assert.ok(body.scopes_supported.includes('write:notes'));
|
|
|
|
});
|
2023-04-05 20:47:12 +02:00
|
|
|
|
|
|
|
// TODO: authorizing two users concurrently
|
|
|
|
|
2023-04-08 20:31:18 +02:00
|
|
|
// TODO: Error format required by OAuth spec
|
2023-04-09 18:49:58 +02:00
|
|
|
|
|
|
|
// TODO: Client Information Discovery
|
2023-04-02 21:59:38 +02:00
|
|
|
});
|