mirror of
https://github.com/element-hq/matrix-authentication-service.git
synced 2026-04-26 02:12:27 +00:00
Add a test for the new skip_confirmation option
This commit is contained in:
@@ -1469,6 +1469,178 @@ mod tests {
|
||||
assert!(email_auth.completed_at.is_some());
|
||||
}
|
||||
|
||||
#[sqlx::test(migrator = "mas_storage_pg::MIGRATOR")]
|
||||
async fn test_register_skip_confirmation(pool: PgPool) {
|
||||
// Same test as test_register, but checks that we get straight to the
|
||||
// registration flown skipping the confirmation
|
||||
setup();
|
||||
let state = TestState::from_pool(pool).await.unwrap();
|
||||
let mut rng = state.rng();
|
||||
let cookies = CookieHelper::new();
|
||||
|
||||
let claims_imports = UpstreamOAuthProviderClaimsImports {
|
||||
skip_confirmation: true,
|
||||
localpart: UpstreamOAuthProviderLocalpartPreference {
|
||||
action: mas_data_model::UpstreamOAuthProviderImportAction::Force,
|
||||
template: None,
|
||||
on_conflict: mas_data_model::UpstreamOAuthProviderOnConflict::default(),
|
||||
},
|
||||
email: UpstreamOAuthProviderImportPreference {
|
||||
action: mas_data_model::UpstreamOAuthProviderImportAction::Force,
|
||||
template: None,
|
||||
},
|
||||
..UpstreamOAuthProviderClaimsImports::default()
|
||||
};
|
||||
|
||||
let id_token_claims = serde_json::json!({
|
||||
"preferred_username": "john",
|
||||
"email": "john@example.com",
|
||||
"email_verified": true,
|
||||
});
|
||||
|
||||
// Grab a key to sign the id_token
|
||||
// We could generate a key on the fly, but because we have one available here,
|
||||
// why not use it?
|
||||
let key = state
|
||||
.key_store
|
||||
.signing_key_for_algorithm(&JsonWebSignatureAlg::Rs256)
|
||||
.unwrap();
|
||||
|
||||
let signer = key
|
||||
.params()
|
||||
.signing_key_for_alg(&JsonWebSignatureAlg::Rs256)
|
||||
.unwrap();
|
||||
let header = JsonWebSignatureHeader::new(JsonWebSignatureAlg::Rs256);
|
||||
let id_token =
|
||||
Jwt::sign_with_rng(&mut rng, header, id_token_claims.clone(), &signer).unwrap();
|
||||
|
||||
// Provision a provider and a link
|
||||
let mut repo = state.repository().await.unwrap();
|
||||
let provider = repo
|
||||
.upstream_oauth_provider()
|
||||
.add(
|
||||
&mut rng,
|
||||
&state.clock,
|
||||
UpstreamOAuthProviderParams {
|
||||
issuer: Some("https://example.com/".to_owned()),
|
||||
human_name: Some("Example Ltd.".to_owned()),
|
||||
brand_name: None,
|
||||
scope: Scope::from_iter([OPENID]),
|
||||
token_endpoint_auth_method: UpstreamOAuthProviderTokenAuthMethod::None,
|
||||
token_endpoint_signing_alg: None,
|
||||
id_token_signed_response_alg: JsonWebSignatureAlg::Rs256,
|
||||
client_id: "client".to_owned(),
|
||||
encrypted_client_secret: None,
|
||||
claims_imports,
|
||||
authorization_endpoint_override: None,
|
||||
token_endpoint_override: None,
|
||||
userinfo_endpoint_override: None,
|
||||
fetch_userinfo: false,
|
||||
userinfo_signed_response_alg: None,
|
||||
jwks_uri_override: None,
|
||||
discovery_mode: mas_data_model::UpstreamOAuthProviderDiscoveryMode::Oidc,
|
||||
pkce_mode: mas_data_model::UpstreamOAuthProviderPkceMode::Auto,
|
||||
response_mode: None,
|
||||
additional_authorization_parameters: Vec::new(),
|
||||
forward_login_hint: false,
|
||||
ui_order: 0,
|
||||
on_backchannel_logout:
|
||||
mas_data_model::UpstreamOAuthProviderOnBackchannelLogout::DoNothing,
|
||||
},
|
||||
)
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
let session = repo
|
||||
.upstream_oauth_session()
|
||||
.add(
|
||||
&mut rng,
|
||||
&state.clock,
|
||||
&provider,
|
||||
"state".to_owned(),
|
||||
None,
|
||||
None,
|
||||
)
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
let link = repo
|
||||
.upstream_oauth_link()
|
||||
.add(
|
||||
&mut rng,
|
||||
&state.clock,
|
||||
&provider,
|
||||
"subject".to_owned(),
|
||||
None,
|
||||
)
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
let session = repo
|
||||
.upstream_oauth_session()
|
||||
.complete_with_link(
|
||||
&state.clock,
|
||||
session,
|
||||
&link,
|
||||
Some(id_token.into_string()),
|
||||
Some(id_token_claims),
|
||||
None,
|
||||
None,
|
||||
)
|
||||
.await
|
||||
.unwrap();
|
||||
|
||||
repo.save().await.unwrap();
|
||||
|
||||
let cookie_jar = state.cookie_jar();
|
||||
let upstream_sessions = UpstreamSessionsCookie::default()
|
||||
.add(session.id, provider.id, "state".to_owned(), None)
|
||||
.add_link_to_session(session.id, link.id)
|
||||
.unwrap();
|
||||
let cookie_jar = upstream_sessions.save(cookie_jar, &state.clock);
|
||||
cookies.import(cookie_jar);
|
||||
|
||||
let request = Request::get(&*mas_router::UpstreamOAuth2Link::new(link.id).path()).empty();
|
||||
let request = cookies.with_cookies(request);
|
||||
let response = state.request(request).await;
|
||||
cookies.save_cookies(&response);
|
||||
let location = response.headers().get(hyper::header::LOCATION).unwrap();
|
||||
// Grab the registration ID from the redirected URL:
|
||||
// /register/steps/{id}/finish
|
||||
let registration_id: Ulid = str::from_utf8(location.as_bytes())
|
||||
.unwrap()
|
||||
.rsplit('/')
|
||||
.nth(1)
|
||||
.expect("Location to have two slashes")
|
||||
.parse()
|
||||
.expect("last segment of location to be a ULID");
|
||||
|
||||
// Check that we have a registered user, with the email imported
|
||||
let mut repo = state.repository().await.unwrap();
|
||||
let registration: UserRegistration = repo
|
||||
.user_registration()
|
||||
.lookup(registration_id)
|
||||
.await
|
||||
.unwrap()
|
||||
.expect("user registration exists");
|
||||
|
||||
assert_eq!(registration.password, None);
|
||||
assert_eq!(registration.completed_at, None);
|
||||
assert_eq!(registration.username, "john");
|
||||
|
||||
let email_auth_id = registration
|
||||
.email_authentication_id
|
||||
.expect("registration should have an email authentication");
|
||||
let email_auth: UserEmailAuthentication = repo
|
||||
.user_email()
|
||||
.lookup_authentication(email_auth_id)
|
||||
.await
|
||||
.unwrap()
|
||||
.expect("email authentication should exist");
|
||||
assert_eq!(email_auth.email, "john@example.com");
|
||||
assert!(email_auth.completed_at.is_some());
|
||||
}
|
||||
|
||||
#[sqlx::test(migrator = "mas_storage_pg::MIGRATOR")]
|
||||
async fn test_link_existing_account(pool: PgPool) {
|
||||
let existing_username = "john";
|
||||
|
||||
Reference in New Issue
Block a user