1
0
mirror of https://github.com/node-red/node-red.git synced 2023-10-10 13:36:53 +02:00
node-red/test/unit/@node-red/editor-api/lib/auth/index_spec.js

217 lines
7.8 KiB
JavaScript
Raw Permalink Normal View History

2014-11-06 23:59:48 +01:00
/**
* Copyright JS Foundation and other contributors, http://js.foundation
2014-11-06 23:59:48 +01:00
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
**/
2015-07-15 23:43:24 +02:00
2014-11-06 23:59:48 +01:00
var should = require("should");
var sinon = require("sinon");
var passport = require("passport");
2018-08-20 17:17:24 +02:00
var NR_TEST_UTILS = require("nr-test-utils");
var auth = NR_TEST_UTILS.require("@node-red/editor-api/lib/auth");
var Users = NR_TEST_UTILS.require("@node-red/editor-api/lib/auth/users");
var Tokens = NR_TEST_UTILS.require("@node-red/editor-api/lib/auth/tokens");
var Permissions = NR_TEST_UTILS.require("@node-red/editor-api/lib/auth/permissions");
2014-11-06 23:59:48 +01:00
2017-09-20 11:30:07 +02:00
describe("api/auth/index",function() {
2014-11-06 23:59:48 +01:00
2015-07-15 23:43:24 +02:00
2014-11-06 23:59:48 +01:00
describe("ensureClientSecret", function() {
before(function() {
2018-04-24 16:01:49 +02:00
auth.init({},{})
});
2014-11-06 23:59:48 +01:00
it("leaves client_secret alone if not present",function(done) {
var req = {
body: {
client_secret: "test_value"
}
};
auth.ensureClientSecret(req,null,function() {
req.body.should.have.a.property("client_secret","test_value");
done();
})
});
it("applies a default client_secret if not present",function(done) {
var req = {
body: { }
};
auth.ensureClientSecret(req,null,function() {
req.body.should.have.a.property("client_secret","not_available");
done();
})
});
});
2015-07-15 23:43:24 +02:00
describe("revoke", function() {
it("revokes a token", function(done) {
2021-04-09 12:22:57 +02:00
var revokeToken = sinon.stub(Tokens,"revoke").callsFake(function() {
2020-11-30 15:38:48 +01:00
return Promise.resolve();
});
2015-07-15 23:43:24 +02:00
var req = { body: { token: "abcdef" } };
2015-07-15 23:43:24 +02:00
var res = { status: function(resp) {
revokeToken.restore();
resp.should.equal(200);
2015-10-03 21:32:24 +02:00
return {
end: done
}
}};
2015-07-15 23:43:24 +02:00
auth.revoke(req,res);
});
});
2015-07-15 23:43:24 +02:00
describe("login", function() {
beforeEach(function() {
2021-04-09 12:22:57 +02:00
sinon.stub(Tokens,"init").callsFake(function(){});
sinon.stub(Users,"init").callsFake(function(){});
});
afterEach(function() {
Tokens.init.restore();
Users.init.restore();
});
it("returns login details - credentials", function(done) {
2018-04-24 16:01:49 +02:00
auth.init({adminAuth:{type:"credentials"}},{})
auth.login(null,{json: function(resp) {
resp.should.have.a.property("type","credentials");
resp.should.have.a.property("prompts");
resp.prompts.should.have.a.lengthOf(2);
done();
}});
});
it("returns login details - none", function(done) {
2018-04-24 16:01:49 +02:00
auth.init({},{})
auth.login(null,{json: function(resp) {
resp.should.eql({});
done();
}});
});
it("returns login details - strategy", function(done) {
2018-04-24 16:01:49 +02:00
auth.init({adminAuth:{type:"strategy",strategy:{label:"test-strategy",icon:"test-icon"}}},{})
auth.login(null,{json: function(resp) {
resp.should.have.a.property("type","strategy");
resp.should.have.a.property("prompts");
resp.prompts.should.have.a.lengthOf(1);
resp.prompts[0].should.have.a.property("type","button");
resp.prompts[0].should.have.a.property("label","test-strategy");
resp.prompts[0].should.have.a.property("icon","test-icon");
done();
}});
});
2015-07-15 23:43:24 +02:00
});
2018-04-24 16:01:49 +02:00
describe("needsPermission", function() {
beforeEach(function() {
2021-04-09 12:22:57 +02:00
sinon.stub(Tokens,"init").callsFake(function(){});
sinon.stub(Users,"init").callsFake(function(){});
2018-04-24 16:01:49 +02:00
});
afterEach(function() {
Tokens.init.restore();
Users.init.restore();
if (passport.authenticate.restore) {
passport.authenticate.restore();
}
if (Permissions.hasPermission.restore) {
Permissions.hasPermission.restore();
}
});
it('no-ops if adminAuth not set', function(done) {
2021-04-09 12:22:57 +02:00
sinon.stub(passport,"authenticate").callsFake(function(scopes,opts) {
2018-04-24 16:01:49 +02:00
return function(req,res,next) {
}
});
auth.init({});
var func = auth.needsPermission("foo");
func({},{},function() {
passport.authenticate.called.should.be.false();
done();
})
});
it('skips auth if req.user undefined', function(done) {
2021-04-09 12:22:57 +02:00
sinon.stub(passport,"authenticate").callsFake(function(scopes,opts) {
2018-04-24 16:01:49 +02:00
return function(req,res,next) {
next();
}
});
2021-04-09 12:22:57 +02:00
sinon.stub(Permissions,"hasPermission").callsFake(function(perm) { return true });
2018-04-24 16:01:49 +02:00
auth.init({adminAuth:{}});
var func = auth.needsPermission("foo");
func({user:null},{},function() {
try {
passport.authenticate.called.should.be.true();
Permissions.hasPermission.called.should.be.false();
done();
} catch(err) {
done(err);
}
})
});
it('passes for valid user permission', function(done) {
2021-04-09 12:22:57 +02:00
sinon.stub(passport,"authenticate").callsFake(function(scopes,opts) {
2018-04-24 16:01:49 +02:00
return function(req,res,next) {
next();
}
});
2021-04-09 12:22:57 +02:00
sinon.stub(Permissions,"hasPermission").callsFake(function(perm) { return true });
2018-04-24 16:01:49 +02:00
auth.init({adminAuth:{}});
var func = auth.needsPermission("foo");
func({user:true,authInfo: { scope: "read"}},{},function() {
try {
passport.authenticate.called.should.be.true();
Permissions.hasPermission.called.should.be.true();
Permissions.hasPermission.lastCall.args[0].should.eql("read");
Permissions.hasPermission.lastCall.args[1].should.eql("foo");
done();
} catch(err) {
done(err);
}
})
});
2015-07-15 23:43:24 +02:00
2018-04-24 16:01:49 +02:00
it('rejects for invalid user permission', function(done) {
2021-04-09 12:22:57 +02:00
sinon.stub(passport,"authenticate").callsFake(function(scopes,opts) {
2018-04-24 16:01:49 +02:00
return function(req,res,next) {
next();
}
});
2021-04-09 12:22:57 +02:00
sinon.stub(Permissions,"hasPermission").callsFake(function(perm) { return false });
2018-04-24 16:01:49 +02:00
auth.init({adminAuth:{}});
var func = auth.needsPermission("foo");
func({user:true,authInfo: { scope: "read"}},{
status: function(status) {
return { end: function() {
try {
status.should.eql(401);
done();
} catch(err) {
done(err);
}
}}
}
},function() {
done(new Error("hasPermission unexpected passed"))
});
});
});
2014-11-06 23:59:48 +01:00
});