2016-09-01 13:01:43 +05:30
|
|
|
<?php
|
2019-12-04 23:40:15 +05:30
|
|
|
declare(strict_types=1);
|
|
|
|
|
2019-02-21 01:28:52 +05:30
|
|
|
namespace api\tests\functional\authserver;
|
2016-09-01 13:01:43 +05:30
|
|
|
|
2019-02-21 01:28:52 +05:30
|
|
|
use api\tests\functional\_steps\AuthserverSteps;
|
2019-12-04 23:40:15 +05:30
|
|
|
use Codeception\Example;
|
2019-02-23 04:41:57 +05:30
|
|
|
use Ramsey\Uuid\Uuid;
|
2016-09-01 13:01:43 +05:30
|
|
|
|
|
|
|
class RefreshCest {
|
|
|
|
|
|
|
|
public function refresh(AuthserverSteps $I) {
|
2019-12-04 23:40:15 +05:30
|
|
|
$I->wantTo('refresh accessToken');
|
2017-01-24 04:30:08 +05:30
|
|
|
[$accessToken, $clientToken] = $I->amAuthenticated();
|
2019-12-04 23:40:15 +05:30
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
2016-09-01 13:01:43 +05:30
|
|
|
'accessToken' => $accessToken,
|
|
|
|
'clientToken' => $clientToken,
|
|
|
|
]);
|
2019-12-04 23:40:15 +05:30
|
|
|
$this->assertSuccessResponse($I);
|
|
|
|
}
|
2016-09-01 13:01:43 +05:30
|
|
|
|
2019-12-04 23:40:15 +05:30
|
|
|
public function refreshLegacyAccessToken(AuthserverSteps $I) {
|
|
|
|
$I->wantTo('refresh legacy accessToken');
|
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
|
|
|
'accessToken' => 'e7bb6648-2183-4981-9b86-eba5e7f87b42',
|
|
|
|
'clientToken' => '6f380440-0c05-47bd-b7c6-d011f1b5308f',
|
|
|
|
]);
|
|
|
|
$this->assertSuccessResponse($I);
|
|
|
|
}
|
|
|
|
|
2019-12-05 03:22:27 +05:30
|
|
|
public function refreshWithInvalidClientToken(AuthserverSteps $I) {
|
|
|
|
$I->wantTo('refresh accessToken with not matched client token');
|
|
|
|
[$accessToken] = $I->amAuthenticated();
|
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
|
|
|
'accessToken' => $accessToken,
|
|
|
|
'clientToken' => Uuid::uuid4()->toString(),
|
|
|
|
]);
|
|
|
|
$I->canSeeResponseContainsJson([
|
|
|
|
'error' => 'ForbiddenOperationException',
|
|
|
|
'errorMessage' => 'Invalid token.',
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function refreshLegacyAccessTokenWithInvalidClientToken(AuthserverSteps $I) {
|
|
|
|
$I->wantTo('refresh legacy accessToken with not matched client token');
|
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
|
|
|
'accessToken' => 'e7bb6648-2183-4981-9b86-eba5e7f87b42',
|
|
|
|
'clientToken' => Uuid::uuid4()->toString(),
|
|
|
|
]);
|
|
|
|
$I->canSeeResponseContainsJson([
|
|
|
|
'error' => 'ForbiddenOperationException',
|
|
|
|
'errorMessage' => 'Invalid token.',
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
2019-12-04 23:40:15 +05:30
|
|
|
/**
|
2019-12-11 16:46:11 +05:30
|
|
|
* @example {"accessToken": "eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiJ9.eyJpYXQiOjE1NzU1NjE1MjgsImV4cCI6MTU3NTU2MTUyOCwiZWx5LXNjb3BlcyI6Im1pbmVjcmFmdF9zZXJ2ZXJfc2Vzc2lvbiIsImVseS1jbGllbnQtdG9rZW4iOiIydnByWnRVdk40VTVtSnZzc0ozaXNpekdVWFhQYnFsV1FsQjVVRWVfUV81bkxKYzlsbUJ3VU1hQWJ1MjBtZC1FNzNtengxNWFsZmRJSU1OMTV5YUpBalZOM29vQW9IRDctOWdOcmciLCJzdWIiOiJlbHl8MSJ9.vwjXzy0VtjJlP6B4RxqoE69yRSBsluZ29VELe4vDi8GCy487eC5cIf9hz9oxp5YcdE7uEJZeqX2yi3nk_0nCaA", "clientToken": "4f368b58-9097-4e56-80b1-f421ae4b53cf"}
|
2019-12-04 23:40:15 +05:30
|
|
|
* @example {"accessToken": "6042634a-a1e2-4aed-866c-c661fe4e63e2", "clientToken": "47fb164a-2332-42c1-8bad-549e67bb210c"}
|
|
|
|
*/
|
|
|
|
public function refreshExpiredToken(AuthserverSteps $I, Example $example) {
|
|
|
|
$I->wantTo('refresh legacy accessToken');
|
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
|
|
|
'accessToken' => $example['accessToken'],
|
|
|
|
'clientToken' => $example['clientToken'],
|
|
|
|
]);
|
|
|
|
$this->assertSuccessResponse($I);
|
2016-09-01 13:01:43 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
public function wrongArguments(AuthserverSteps $I) {
|
|
|
|
$I->wantTo('get error on wrong amount of arguments');
|
2019-12-04 23:40:15 +05:30
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
2016-09-01 13:01:43 +05:30
|
|
|
'key' => 'value',
|
|
|
|
]);
|
|
|
|
$I->canSeeResponseCodeIs(400);
|
|
|
|
$I->canSeeResponseIsJson();
|
|
|
|
$I->canSeeResponseContainsJson([
|
|
|
|
'error' => 'IllegalArgumentException',
|
|
|
|
'errorMessage' => 'credentials can not be null.',
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function wrongAccessToken(AuthserverSteps $I) {
|
|
|
|
$I->wantTo('get error on wrong access or client tokens');
|
2019-12-04 23:40:15 +05:30
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
2016-09-01 13:01:43 +05:30
|
|
|
'accessToken' => Uuid::uuid4()->toString(),
|
|
|
|
'clientToken' => Uuid::uuid4()->toString(),
|
|
|
|
]);
|
|
|
|
$I->canSeeResponseCodeIs(401);
|
|
|
|
$I->canSeeResponseIsJson();
|
|
|
|
$I->canSeeResponseContainsJson([
|
|
|
|
'error' => 'ForbiddenOperationException',
|
|
|
|
'errorMessage' => 'Invalid token.',
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function refreshTokenFromBannedUser(AuthserverSteps $I) {
|
|
|
|
$I->wantTo('refresh token from suspended account');
|
2019-12-04 23:40:15 +05:30
|
|
|
$I->sendPOST('/api/authserver/authentication/refresh', [
|
2016-09-01 13:01:43 +05:30
|
|
|
'accessToken' => '918ecb41-616c-40ee-a7d2-0b0ef0d0d732',
|
|
|
|
'clientToken' => '6042634a-a1e2-4aed-866c-c661fe4e63e2',
|
|
|
|
]);
|
|
|
|
$I->canSeeResponseCodeIs(401);
|
|
|
|
$I->canSeeResponseContainsJson([
|
|
|
|
'error' => 'ForbiddenOperationException',
|
|
|
|
'errorMessage' => 'This account has been suspended.',
|
|
|
|
]);
|
|
|
|
}
|
|
|
|
|
2019-12-04 23:40:15 +05:30
|
|
|
private function assertSuccessResponse(AuthserverSteps $I) {
|
|
|
|
$I->seeResponseCodeIs(200);
|
|
|
|
$I->seeResponseIsJson();
|
|
|
|
$I->canSeeResponseJsonMatchesJsonPath('$.accessToken');
|
|
|
|
$I->canSeeResponseJsonMatchesJsonPath('$.clientToken');
|
|
|
|
$I->canSeeResponseJsonMatchesJsonPath('$.selectedProfile.id');
|
|
|
|
$I->canSeeResponseJsonMatchesJsonPath('$.selectedProfile.name');
|
|
|
|
$I->canSeeResponseJsonMatchesJsonPath('$.selectedProfile.legacy');
|
|
|
|
$I->cantSeeResponseJsonMatchesJsonPath('$.availableProfiles');
|
|
|
|
}
|
|
|
|
|
2016-09-01 13:01:43 +05:30
|
|
|
}
|