| use Mojo::Base -strict; |
| use Test::More; |
| use Test::Mojo; |
| use Mojo::File qw/path/; |
| use Data::Dumper; |
| |
| |
| ##################### |
| # Start Fake server # |
| ##################### |
| my $mount_point = '/realapi/'; |
| $ENV{KALAMAR_API} = $mount_point; |
| |
| my $t = Test::Mojo->new('Kalamar' => { |
| Kalamar => { |
| plugins => ['Auth'] |
| }, |
| 'Kalamar-Auth' => { |
| client_id => 2, |
| client_secret => 'k414m4r-s3cr3t', |
| oauth2 => 1 |
| } |
| }); |
| |
| # Mount fake backend |
| # Get the fixture path |
| my $fixtures_path = path(Mojo::File->new(__FILE__)->dirname, '..', 'server'); |
| my $fake_backend = $t->app->plugin( |
| Mount => { |
| $mount_point => |
| $fixtures_path->child('mock.pl') |
| } |
| ); |
| # Configure fake backend |
| $fake_backend->pattern->defaults->{app}->log($t->app->log); |
| |
| $t->get_ok('/realapi/v1.0') |
| ->status_is(200) |
| ->content_is('Fake server available'); |
| |
| $t->get_ok('/?q=Baum') |
| ->status_is(200) |
| ->text_like('h1 span', qr/KorAP: Find .Baum./i) |
| ->text_like('#total-results', qr/\d+$/) |
| ->content_like(qr/\"authorized\"\:null/) |
| ->element_exists_not('div.button.top a') |
| ->element_exists_not('aside.active') |
| ->element_exists_not('aside.off') |
| ; |
| |
| $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists('form[action=/user/login] input[name=handle_or_email]') |
| ->element_exists('aside.active') |
| ->element_exists_not('aside.off') |
| ; |
| |
| $t->post_ok('/user/login' => form => { handle_or_email => 'test', pwd => 'fail' }) |
| ->status_is(302) |
| ->header_is('Location' => '/'); |
| |
| $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists('div.notify-error') |
| ->text_is('div.notify-error', 'Bad CSRF token') |
| ->element_exists('input[name=handle_or_email][value=test]') |
| ->element_exists_not('div.button.top a') |
| ; |
| |
| $t->post_ok('/user/login' => form => { handle_or_email => 'test', pwd => 'pass' }) |
| ->status_is(302) |
| ->header_is('Location' => '/'); |
| |
| my $csrf = $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists('div.notify-error') |
| ->text_is('div.notify-error', 'Bad CSRF token') |
| ->element_exists_not('div.button.top a') |
| ->tx->res->dom->at('input[name=csrf_token]')->attr('value') |
| ; |
| |
| $t->post_ok('/user/login' => form => { |
| handle_or_email => 'test', |
| pwd => 'ldaperr', |
| csrf_token => $csrf |
| }) |
| ->status_is(302) |
| ->content_is('') |
| ->header_is('Location' => '/'); |
| |
| $csrf = $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists('div.notify-error') |
| ->text_is('div.notify-error', '2022: LDAP Authentication failed due to unknown user or password!') |
| ->element_exists('input[name=handle_or_email][value=test]') |
| ->element_exists_not('div.button.top a') |
| ->tx->res->dom->at('input[name=csrf_token]')->attr('value') |
| ; |
| |
| $t->post_ok('/user/login' => form => { |
| handle_or_email => 'test', |
| pwd => 'unknown', |
| csrf_token => $csrf |
| }) |
| ->status_is(302) |
| ->content_is('') |
| ->header_is('Location' => '/'); |
| |
| $csrf = $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists('div.notify-error') |
| ->text_is('div.notify-error', '2022: LDAP Authentication failed due to unknown user or password!') |
| ->element_exists('input[name=handle_or_email][value=test]') |
| ->element_exists_not('div.button.top a') |
| ->tx->res->dom->at('input[name=csrf_token]')->attr('value') |
| ; |
| |
| $t->post_ok('/user/login' => form => { |
| handle_or_email => 'test', |
| pwd => 'pass', |
| csrf_token => $csrf |
| }) |
| ->status_is(302) |
| ->content_is('') |
| ->header_is('Location' => '/'); |
| |
| $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists_not('div.notify-error') |
| ->element_exists('div.notify-success') |
| ->text_is('div.notify-success', 'Login successful') |
| ->element_exists('aside.off') |
| ->element_exists_not('aside.active') |
| ; |
| |
| # Now the user is logged in and should be able to |
| # search with authorization |
| $t->get_ok('/?q=Baum') |
| ->status_is(200) |
| ->text_like('h1 span', qr/KorAP: Find .Baum./i) |
| ->text_like('#total-results', qr/\d+$/) |
| ->element_exists_not('div.notify-error') |
| ->content_like(qr/\"authorized\"\:\"yes\"/) |
| ->element_exists('div.button.top a') |
| ->element_exists('div.button.top a.logout[title~="test"]') |
| ; |
| |
| # Logout |
| $t->get_ok('/user/logout') |
| ->status_is(302) |
| ->header_is('Location' => '/'); |
| |
| $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists_not('div.notify-error') |
| ->element_exists('div.notify-success') |
| ->text_is('div.notify-success', 'Logout successful') |
| ; |
| |
| $t->get_ok('/?q=Baum') |
| ->status_is(200) |
| ->text_like('h1 span', qr/KorAP: Find .Baum./i) |
| ->text_like('#total-results', qr/\d+$/) |
| ->content_like(qr/\"authorized\"\:null/) |
| ; |
| |
| # Get redirect |
| my $fwd = $t->get_ok('/?q=Baum&ql=poliqarp') |
| ->status_is(200) |
| ->element_exists_not('div.notify-error') |
| ->tx->res->dom->at('input[name=fwd]')->attr('value') |
| ; |
| |
| is($fwd, '/?q=Baum&ql=poliqarp', 'Redirect is valid'); |
| |
| $t->post_ok('/user/login' => form => { |
| handle_or_email => 'test', |
| pwd => 'pass', |
| csrf_token => $csrf, |
| fwd => 'http://bad.example.com/test' |
| }) |
| ->status_is(302) |
| ->header_is('Location' => '/'); |
| |
| $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists('div.notify-error') |
| ->element_exists_not('div.notify-success') |
| ->text_is('div.notify-error', 'Redirect failure') |
| ; |
| |
| $t->post_ok('/user/login' => form => { |
| handle_or_email => 'test', |
| pwd => 'pass', |
| csrf_token => $csrf, |
| fwd => $fwd |
| }) |
| ->status_is(302) |
| ->header_is('Location' => '/?q=Baum&ql=poliqarp'); |
| |
| $t->get_ok('/?q=Baum&ql=poliqarp') |
| ->status_is(200) |
| ->element_exists_not('div.notify-error') |
| ->element_exists('div.notify-success') |
| ->text_is('div.notify-success', 'Login successful') |
| ; |
| |
| $t->app->routes->get( |
| '/user/refresh' => sub { |
| my $c = shift; |
| |
| my $old_auth = $c->auth->token; |
| my $refresh = $c->chi('user')->get("refr_$old_auth"); |
| |
| $c->auth->refresh_token($refresh)->then( |
| sub { |
| my $new_auth = $c->auth->token; |
| $c->notify(success => $new_auth . ' vs. ' . $old_auth); |
| } |
| )->catch( |
| sub { |
| |
| # Notify the user on login failure |
| unless (@_) { |
| $c->notify(error => $c->loc('Auth_refreshFail')); |
| } |
| |
| # There are known errors |
| foreach (@_) { |
| if (ref $_ eq 'HASH') { |
| my $err = ($_->{code} ? $_->{code} . ': ' : '') . |
| $_->{message}; |
| $c->notify(error => $err); |
| } |
| else { |
| $c->notify(error => $_); |
| } |
| }; |
| } |
| )->finally( |
| sub { |
| return $c->redirect_to('index'); |
| } |
| )->wait; |
| } |
| ); |
| |
| $t->get_ok('/user/refresh') |
| ->status_is(302) |
| ->header_is('Location' => '/'); |
| |
| $t->get_ok('/') |
| ->status_is(200) |
| ->element_exists_not('div.notify-error') |
| ->element_exists('div.notify-success') |
| ->text_like('div.notify-success', qr!Bearer abcde vs\. Bearer .{6,}!) |
| ; |
| |
| |
| done_testing; |
| __END__ |
| |
| |
| |
| # Login mit falschem Nutzernamen: |
| # 400 und: |
| {"errors":[[2022,"LDAP Authentication failed due to unknown user or password!"]]} |
| |