mirror of
https://github.com/owncast/owncast.git
synced 2024-11-26 23:24:29 +03:00
b835de2dc4
* Able to authenticate user against IndieAuth. For #1273 * WIP server indieauth endpoint. For https://github.com/owncast/owncast/issues/1272 * Add migration to remove access tokens from user * Add authenticated bool to user for display purposes * Add indieauth modal and auth flair to display names. For #1273 * Validate URLs and display errors * Renames, cleanups * Handle relative auth endpoint paths. Add error handling for missing redirects. * Disallow using display names in use by registered users. Closes #1810 * Verify code verifier via code challenge on callback * Use relative path to authorization_endpoint * Post-rebase fixes * Use a timestamp instead of a bool for authenticated * Propertly handle and display error in modal * Use auth'ed timestamp to derive authenticated flag to display in chat * don't redirect unless a URL is present avoids redirecting to `undefined` if there was an error * improve error message if owncast server URL isn't set * fix IndieAuth PKCE implementation use SHA256 instead of SHA1, generates a longer code verifier (must be 43-128 chars long), fixes URL-safe SHA256 encoding * return real profile data for IndieAuth response * check the code verifier in the IndieAuth server * Linting * Add new chat settings modal anad split up indieauth ui * Remove logging error * Update the IndieAuth modal UI. For #1273 * Add IndieAuth repsonse error checking * Disable IndieAuth client if server URL is not set. * Add explicit error messages for specific error types * Fix bad logic * Return OAuth-keyed error responses for indieauth server * Display IndieAuth error in plain text with link to return to main page * Remove redundant check * Add additional detail to error * Hide IndieAuth details behind disclosure details * Break out migration into two steps because some people have been runing dev in production * Add auth option to user dropdown Co-authored-by: Aaron Parecki <aaron@parecki.com>
177 lines
4.5 KiB
JavaScript
177 lines
4.5 KiB
JavaScript
var request = require('supertest');
|
|
request = request('http://127.0.0.1:8080');
|
|
|
|
var accessToken = '';
|
|
var webhookID;
|
|
|
|
const webhook = 'https://super.duper.cool.thing.biz/owncast';
|
|
const events = ['CHAT'];
|
|
|
|
test('create webhook', async (done) => {
|
|
const res = await sendIntegrationsChangePayload('webhooks/create', {
|
|
url: webhook,
|
|
events: events,
|
|
});
|
|
|
|
expect(res.body.url).toBe(webhook);
|
|
expect(res.body.timestamp).toBeTruthy();
|
|
expect(res.body.events).toStrictEqual(events);
|
|
done();
|
|
});
|
|
|
|
test('check webhooks', (done) => {
|
|
request
|
|
.get('/api/admin/webhooks')
|
|
.auth('admin', 'abc123')
|
|
.expect(200)
|
|
.then((res) => {
|
|
expect(res.body).toHaveLength(1);
|
|
expect(res.body[0].url).toBe(webhook);
|
|
expect(res.body[0].events).toStrictEqual(events);
|
|
webhookID = res.body[0].id;
|
|
done();
|
|
});
|
|
});
|
|
|
|
test('delete webhook', async (done) => {
|
|
const res = await sendIntegrationsChangePayload('webhooks/delete', {
|
|
id: webhookID,
|
|
});
|
|
expect(res.body.success).toBe(true);
|
|
done();
|
|
});
|
|
|
|
test('check that webhook was deleted', (done) => {
|
|
request
|
|
.get('/api/admin/webhooks')
|
|
.auth('admin', 'abc123')
|
|
.expect(200)
|
|
.then((res) => {
|
|
expect(res.body).toHaveLength(0);
|
|
done();
|
|
});
|
|
});
|
|
|
|
test('create access token', async (done) => {
|
|
const name = 'Automated integration test';
|
|
const scopes = [
|
|
'CAN_SEND_SYSTEM_MESSAGES',
|
|
'CAN_SEND_MESSAGES',
|
|
'HAS_ADMIN_ACCESS',
|
|
];
|
|
const res = await sendIntegrationsChangePayload('accesstokens/create', {
|
|
name: name,
|
|
scopes: scopes,
|
|
});
|
|
|
|
expect(res.body.accessToken).toBeTruthy();
|
|
expect(res.body.createdAt).toBeTruthy();
|
|
expect(res.body.displayName).toBe(name);
|
|
expect(res.body.scopes).toStrictEqual(scopes);
|
|
accessToken = res.body.accessToken;
|
|
|
|
done();
|
|
});
|
|
|
|
test('check access tokens', async (done) => {
|
|
const res = await request
|
|
.get('/api/admin/accesstokens')
|
|
.auth('admin', 'abc123')
|
|
.expect(200);
|
|
const tokenCheck = res.body.filter(
|
|
(token) => token.accessToken === accessToken
|
|
);
|
|
expect(tokenCheck).toHaveLength(1);
|
|
done();
|
|
});
|
|
|
|
test('send a system message using access token', async (done) => {
|
|
const payload = {
|
|
body: 'This is a test system message from the automated integration test',
|
|
};
|
|
const res = await request
|
|
.post('/api/integrations/chat/system')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.send(payload)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('send an external integration message using access token', async (done) => {
|
|
const payload = {
|
|
body: 'This is a test external message from the automated integration test',
|
|
};
|
|
const res = await request
|
|
.post('/api/integrations/chat/send')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.send(payload)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('send an external integration action using access token', async (done) => {
|
|
const payload = {
|
|
body: 'This is a test external action from the automated integration test',
|
|
};
|
|
await request
|
|
.post('/api/integrations/chat/action')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.send(payload)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('test fetch chat history using access token', async (done) => {
|
|
const res = await request
|
|
.get('/api/integrations/chat')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.expect(200);
|
|
done();
|
|
});
|
|
|
|
test('test fetch chat history failure using invalid access token', async (done) => {
|
|
const res = await request
|
|
.get('/api/integrations/chat')
|
|
.set('Authorization', 'Bearer ' + 'invalidToken')
|
|
.expect(401);
|
|
done();
|
|
});
|
|
|
|
test('test fetch chat history OPTIONS request', async (done) => {
|
|
const res = await request
|
|
.options('/api/integrations/chat')
|
|
.set('Authorization', 'Bearer ' + accessToken)
|
|
.expect(204);
|
|
done();
|
|
});
|
|
|
|
test('delete access token', async (done) => {
|
|
const res = await sendIntegrationsChangePayload('accesstokens/delete', {
|
|
token: accessToken,
|
|
});
|
|
expect(res.body.success).toBe(true);
|
|
done();
|
|
});
|
|
|
|
test('check token delete was successful', async (done) => {
|
|
const res = await request
|
|
.get('/api/admin/accesstokens')
|
|
.auth('admin', 'abc123')
|
|
.expect(200);
|
|
const tokenCheck = res.body.filter(
|
|
(token) => token.accessToken === accessToken
|
|
);
|
|
expect(tokenCheck).toHaveLength(0);
|
|
done();
|
|
});
|
|
|
|
async function sendIntegrationsChangePayload(endpoint, payload) {
|
|
const url = '/api/admin/' + endpoint;
|
|
const res = await request
|
|
.post(url)
|
|
.auth('admin', 'abc123')
|
|
.send(payload)
|
|
.expect(200);
|
|
|
|
return res;
|
|
}
|