mirror of
https://github.com/owncast/owncast.git
synced 2024-12-18 07:12:33 +03:00
092134f3f3
The semantics of the Authorization header are defined by RFC 9110, which says: > It uses a case-insensitive token to identify the authentication scheme: Therefore, "bearer", "Bearer", and "bEARER" are equivalent. This patch fixes the parsing of the Authorization header to check for the Bearer authentication scheme case insensitively. I've modified one of the test cases to use lowercase "bearer", so there's test coverage for this.
167 lines
4.3 KiB
JavaScript
167 lines
4.3 KiB
JavaScript
var request = require('supertest');
|
|
request = request('http://127.0.0.1:8080');
|
|
|
|
const getAdminResponse = require('./lib/admin').getAdminResponse;
|
|
const sendAdminPayload = require('./lib/admin').sendAdminPayload;
|
|
|
|
var accessToken = '';
|
|
var webhookID;
|
|
|
|
const webhook = 'https://super.duper.cool.thing.biz/owncast';
|
|
const events = ['CHAT'];
|
|
|
|
test('create webhook', async (done) => {
|
|
const res = await sendAdminPayload('webhooks/create', {
|
|
url: webhook,
|
|
events: events,
|
|
});
|
|
|
|
expect(res.body.url).toBe(webhook);
|
|
expect(res.body.timestamp).toBeTruthy();
|
|
expect(res.body.events).toStrictEqual(events);
|
|
done();
|
|
});
|
|
|
|
test('check webhooks', (done) => {
|
|
getAdminResponse('webhooks').then((res) => {
|
|
expect(res.body).toHaveLength(1);
|
|
expect(res.body[0].url).toBe(webhook);
|
|
expect(res.body[0].events).toStrictEqual(events);
|
|
webhookID = res.body[0].id;
|
|
done();
|
|
});
|
|
});
|
|
|
|
test('delete webhook', async (done) => {
|
|
const res = await sendAdminPayload('webhooks/delete', {
|
|
id: webhookID,
|
|
});
|
|
expect(res.body.success).toBe(true);
|
|
done();
|
|
});
|
|
|
|
test('check that webhook was deleted', (done) => {
|
|
getAdminResponse('webhooks').then((res) => {
|
|
expect(res.body).toHaveLength(0);
|
|
done();
|
|
});
|
|
});
|
|
|
|
test('create access token', async (done) => {
|
|
const name = 'Automated integration test';
|
|
const scopes = [
|
|
'CAN_SEND_SYSTEM_MESSAGES',
|
|
'CAN_SEND_MESSAGES',
|
|
'HAS_ADMIN_ACCESS',
|
|
];
|
|
const res = await sendAdminPayload('accesstokens/create', {
|
|
name: name,
|
|
scopes: scopes,
|
|
});
|
|
|
|
expect(res.body.accessToken).toBeTruthy();
|
|
expect(res.body.createdAt).toBeTruthy();
|
|
expect(res.body.displayName).toBe(name);
|
|
expect(res.body.scopes).toStrictEqual(scopes);
|
|
accessToken = res.body.accessToken;
|
|
|
|
done();
|
|
});
|
|
|
|
test('check access tokens', async (done) => {
|
|
const res = await getAdminResponse('accesstokens');
|
|
const tokenCheck = res.body.filter(
|
|
(token) => token.accessToken === accessToken
|
|
);
|
|
expect(tokenCheck).toHaveLength(1);
|
|
done();
|
|
});
|
|
|
|
test('send a system message using access token', async (done) => {
|
|
const payload = {
|
|
body: 'This is a test system message from the automated integration test',
|
|
};
|
|
const res = await request
|
|
.post('/api/integrations/chat/system')
|
|
.set('Authorization', 'bearer ' + accessToken)
|
|
.send(payload)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('send an external integration message using access token', async (done) => {
|
|
const payload = {
|
|
body: 'This is a test external message from the automated integration test',
|
|
};
|
|
const res = await request
|
|
.post('/api/integrations/chat/send')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.send(payload)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('send an external integration action using access token', async (done) => {
|
|
const payload = {
|
|
body: 'This is a test external action from the automated integration test',
|
|
};
|
|
await request
|
|
.post('/api/integrations/chat/action')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.send(payload)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('test fetch chat history using access token', async (done) => {
|
|
const res = await request
|
|
.get('/api/integrations/chat')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('test fetch chat history failure using invalid access token', async (done) => {
|
|
const res = await request
|
|
.get('/api/integrations/chat')
|
|
.set('Authorization', 'Bearer ' + 'invalidToken')
|
|
.expect(401);
|
|
done();
|
|
});
|
|
|
|
test('test fetch chat history OPTIONS request', async (done) => {
|
|
const res = await request
|
|
.options('/api/integrations/chat')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.expect(204);
|
|
done();
|
|
});
|
|
|
|
test('delete access token', async (done) => {
|
|
const res = await sendAdminPayload('accesstokens/delete', {
|
|
token: accessToken,
|
|
});
|
|
expect(res.body.success).toBe(true);
|
|
done();
|
|
});
|
|
|
|
test('check token delete was successful', async (done) => {
|
|
const res = await getAdminResponse('accesstokens');
|
|
const tokenCheck = res.body.filter(
|
|
(token) => token.accessToken === accessToken
|
|
);
|
|
expect(tokenCheck).toHaveLength(0);
|
|
done();
|
|
});
|
|
|
|
test('send an external integration action using access token expecting failure', async (done) => {
|
|
const payload = {
|
|
body: 'This is a test external action from the automated integration test',
|
|
};
|
|
await request
|
|
.post('/api/integrations/chat/action')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.send(payload)
|
|
.expect(401);
|
|
done();
|
|
});
|