accounts/api/tests/functional/authserver/AuthorizationCest.php
Octol1ttle 57d492da8a
Upgrade project to PHP 8.3, add PHPStan, upgrade almost every dependency (#36)
* start updating to PHP 8.3

* taking off!

Co-authored-by: ErickSkrauch <erickskrauch@yandex.ru>
Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* dropped this

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* migrate to symfonymailer

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* this is so stupid 😭

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* ah, free, at last.

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* oh, Gabriel.

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* now dawns thy reckoning.

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* and thy gore shall GLISTEN before the temples of man.

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* creature of steel.

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* my gratitude upon thee for my freedom.

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* but the crimes thy kind has committed against humanity

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* Upgrade PHP-CS-Fixer and do fix the codebase

* First review round (maybe I have broken something)

* are NOT forgotten.

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>

* Enable parallel PHP-CS-Fixer runner

* PHPStan level 1

* PHPStan level 2

* PHPStan level 3

* PHPStan level 4

* PHPStan level 5

* Levels 6 and 7 takes too much effort. Generate a baseline and fix them eventually

* Resolve TODO's related to the php-mock

* Drastically reduce baseline size with the Rector

* More code modernization with help of the Rector

* Update GitLab CI

---------

Signed-off-by: Octol1ttle <l1ttleofficial@outlook.com>
Co-authored-by: ErickSkrauch <erickskrauch@yandex.ru>
2024-12-02 11:10:55 +01:00

192 lines
7.0 KiB
PHP

<?php
declare(strict_types=1);
namespace api\tests\functional\authserver;
use api\tests\FunctionalTester;
use Codeception\Example;
use OTPHP\TOTP;
use Ramsey\Uuid\Uuid;
class AuthorizationCest {
/**
* # Matrix:
* # * login: username/email
* # * requestUser: true/false
* # * json: true/false
*
* JSON: false
* @example {"login": "admin", "password": "password_0"}
* @example {"login": "admin", "password": "password_0", "requestUser": true}
* @example {"login": "admin@ely.by", "password": "password_0"}
* @example {"login": "admin@ely.by", "password": "password_0", "requestUser": true}
*
* JSON: true
* @example {"json": true, "login": "admin", "password": "password_0"}
* @example {"json": true, "login": "admin", "password": "password_0", "requestUser": true}
* @example {"json": true, "login": "admin@ely.by", "password": "password_0"}
* @example {"json": true, "login": "admin@ely.by", "password": "password_0", "requestUser": true}
*/
public function authenticate(FunctionalTester $I, Example $case): void {
$params = [
'username' => $case['login'],
'password' => $case['password'],
'clientToken' => Uuid::uuid4()->toString(),
];
if ($case['requestUser'] ?? false) {
$params['requestUser'] = true;
}
if ($case['json'] ?? false) {
$params = json_encode($params);
}
$I->sendPOST('/api/authserver/authentication/authenticate', $params);
$I->canSeeResponseJsonMatchesJsonPath('$.accessToken');
$I->canSeeResponseJsonMatchesJsonPath('$.clientToken');
$I->canSeeResponseContainsJson([
'selectedProfile' => [
'id' => 'df936908b2e1544d96f82977ec213022',
'name' => 'Admin',
],
'availableProfiles' => [
[
'id' => 'df936908b2e1544d96f82977ec213022',
'name' => 'Admin',
],
],
]);
if ($case['requestUser'] ?? false) {
$I->canSeeResponseContainsJson([
'user' => [
'id' => 'df936908b2e1544d96f82977ec213022',
'username' => 'Admin',
'properties' => [
[
'name' => 'preferredLanguage',
'value' => 'en',
],
],
],
]);
} else {
$I->cantSeeResponseJsonMatchesJsonPath('$.user');
}
}
public function byEmailWithEnabledTwoFactorAuth(FunctionalTester $I): void {
$I->wantTo('get valid error by authenticate account with enabled two factor auth');
$I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'otp@gmail.com',
'password' => 'password_0',
'clientToken' => Uuid::uuid4()->toString(),
]);
$I->canSeeResponseCodeIs(401);
$I->canSeeResponseIsJson();
$I->canSeeResponseContainsJson([
'error' => 'ForbiddenOperationException',
'errorMessage' => 'Account protected with two factor auth.',
]);
}
public function byEmailWithEnabledTwoFactorAuthAndCorrectToken(FunctionalTester $I): void {
$I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'otp@gmail.com',
'password' => 'password_0:' . TOTP::create('BBBB')->now(),
'clientToken' => Uuid::uuid4()->toString(),
]);
$I->canSeeResponseCodeIs(200);
$I->canSeeResponseContainsJson([
'selectedProfile' => [
'id' => '15d0afa7a2bb44d39f31964cbccc6043',
'name' => 'AccountWithEnabledOtp',
],
]);
}
public function withoutClientToken(FunctionalTester $I): void {
$I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'admin',
'password' => 'password_0',
]);
$I->canSeeResponseCodeIs(200);
$clientToken = $I->grabDataFromResponseByJsonPath('$.clientToken')[0];
$I->assertNotEmpty($clientToken);
}
public function tooLongClientToken(FunctionalTester $I): void {
$I->wantTo('send non uuid clientToken with more then 255 characters length');
$I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'admin@ely.by',
'password' => 'password_0',
'clientToken' => str_pad('', 256, 'x'),
]);
$I->canSeeResponseCodeIs(400);
$I->canSeeResponseIsJson();
$I->canSeeResponseContainsJson([
'error' => 'IllegalArgumentException',
'errorMessage' => 'clientToken is too long.',
]);
}
public function wrongArguments(FunctionalTester $I): void {
$I->wantTo('get error on wrong amount of arguments');
$I->sendPOST('/api/authserver/authentication/authenticate', [
'key' => 'value',
]);
$I->canSeeResponseCodeIs(400);
$I->canSeeResponseIsJson();
$I->canSeeResponseContainsJson([
'error' => 'IllegalArgumentException',
'errorMessage' => 'credentials can not be null.',
]);
}
public function wrongNicknameAndPassword(FunctionalTester $I): void {
$I->wantTo('authenticate by username and password with wrong data');
$I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'nonexistent_user',
'password' => 'nonexistent_password',
'clientToken' => Uuid::uuid4()->toString(),
]);
$I->canSeeResponseCodeIs(401);
$I->canSeeResponseIsJson();
$I->canSeeResponseContainsJson([
'error' => 'ForbiddenOperationException',
'errorMessage' => 'Invalid credentials. Invalid nickname or password.',
]);
}
public function deletedAccount(FunctionalTester $I): void {
$I->wantTo('authenticate in account marked for deletion');
$I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'DeletedAccount',
'password' => 'password_0',
'clientToken' => Uuid::uuid4()->toString(),
]);
$I->canSeeResponseCodeIs(401);
$I->canSeeResponseContainsJson([
'error' => 'ForbiddenOperationException',
'errorMessage' => 'Invalid credentials. Invalid nickname or password.',
]);
}
public function bannedAccount(FunctionalTester $I): void {
$I->wantTo('authenticate in suspended account');
$I->sendPOST('/api/authserver/authentication/authenticate', [
'username' => 'Banned',
'password' => 'password_0',
'clientToken' => Uuid::uuid4()->toString(),
]);
$I->canSeeResponseCodeIs(401);
$I->canSeeResponseContainsJson([
'error' => 'ForbiddenOperationException',
'errorMessage' => 'This account has been suspended.',
]);
}
}