mirror of
https://github.com/nextcloud/server.git
synced 2025-01-31 14:53:18 +00:00
ca587b1108
Signed-off-by: Julien Veyssier <julien-nc@posteo.net>
626 lines
19 KiB
PHP
626 lines
19 KiB
PHP
<?php
|
|
/**
|
|
* @copyright Copyright (c) 2017 Lukas Reschke <lukas@statuscode.ch>
|
|
*
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
|
*
|
|
* @license GNU AGPL version 3 or any later version
|
|
*
|
|
* This program is free software: you can redistribute it and/or modify
|
|
* it under the terms of the GNU Affero General Public License as
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
* License, or (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU Affero General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*
|
|
*/
|
|
namespace OCA\OAuth2\Tests\Controller;
|
|
|
|
use OC\Authentication\Exceptions\ExpiredTokenException;
|
|
use OC\Authentication\Exceptions\InvalidTokenException;
|
|
use OC\Authentication\Token\IProvider as TokenProvider;
|
|
use OC\Authentication\Token\PublicKeyToken;
|
|
use OCA\OAuth2\Controller\OauthApiController;
|
|
use OCA\OAuth2\Db\AccessToken;
|
|
use OCA\OAuth2\Db\AccessTokenMapper;
|
|
use OCA\OAuth2\Db\Client;
|
|
use OCA\OAuth2\Db\ClientMapper;
|
|
use OCA\OAuth2\Exceptions\AccessTokenNotFoundException;
|
|
use OCA\OAuth2\Exceptions\ClientNotFoundException;
|
|
use OCP\AppFramework\Http;
|
|
use OCP\AppFramework\Http\JSONResponse;
|
|
use OCP\AppFramework\Utility\ITimeFactory;
|
|
use OCP\IRequest;
|
|
use OCP\Security\Bruteforce\IThrottler;
|
|
use OCP\Security\ICrypto;
|
|
use OCP\Security\ISecureRandom;
|
|
use Psr\Log\LoggerInterface;
|
|
use Test\TestCase;
|
|
|
|
/* We have to use this to add a property to the mocked request and avoid warnings about dynamic properties on PHP>=8.2 */
|
|
abstract class RequestMock implements IRequest {
|
|
public array $server = [];
|
|
}
|
|
|
|
class OauthApiControllerTest extends TestCase {
|
|
/** @var IRequest|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $request;
|
|
/** @var ICrypto|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $crypto;
|
|
/** @var AccessTokenMapper|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $accessTokenMapper;
|
|
/** @var ClientMapper|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $clientMapper;
|
|
/** @var TokenProvider|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $tokenProvider;
|
|
/** @var ISecureRandom|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $secureRandom;
|
|
/** @var ITimeFactory|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $time;
|
|
/** @var IThrottler|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $throttler;
|
|
/** @var LoggerInterface|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $logger;
|
|
/** @var ITimeFactory|\PHPUnit\Framework\MockObject\MockObject */
|
|
private $timeFactory;
|
|
/** @var OauthApiController */
|
|
private $oauthApiController;
|
|
|
|
protected function setUp(): void {
|
|
parent::setUp();
|
|
|
|
$this->request = $this->createMock(RequestMock::class);
|
|
$this->crypto = $this->createMock(ICrypto::class);
|
|
$this->accessTokenMapper = $this->createMock(AccessTokenMapper::class);
|
|
$this->clientMapper = $this->createMock(ClientMapper::class);
|
|
$this->tokenProvider = $this->createMock(TokenProvider::class);
|
|
$this->secureRandom = $this->createMock(ISecureRandom::class);
|
|
$this->time = $this->createMock(ITimeFactory::class);
|
|
$this->throttler = $this->createMock(IThrottler::class);
|
|
$this->logger = $this->createMock(LoggerInterface::class);
|
|
$this->timeFactory = $this->createMock(ITimeFactory::class);
|
|
|
|
$this->oauthApiController = new OauthApiController(
|
|
'oauth2',
|
|
$this->request,
|
|
$this->crypto,
|
|
$this->accessTokenMapper,
|
|
$this->clientMapper,
|
|
$this->tokenProvider,
|
|
$this->secureRandom,
|
|
$this->time,
|
|
$this->logger,
|
|
$this->throttler,
|
|
$this->timeFactory
|
|
);
|
|
}
|
|
|
|
public function testGetTokenInvalidGrantType() {
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_grant',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_grant' => 'foo']);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('foo', null, null, null, null));
|
|
}
|
|
|
|
public function testGetTokenInvalidCode() {
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_request',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_request' => 'token not found', 'code' => 'invalidcode']);
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('invalidcode')
|
|
->willThrowException(new AccessTokenNotFoundException());
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('authorization_code', 'invalidcode', null, null, null));
|
|
}
|
|
|
|
public function testGetTokenExpiredCode() {
|
|
$codeCreatedAt = 100;
|
|
$expiredSince = 123;
|
|
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_request',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_request' => 'authorization_code_expired', 'expired_since' => $expiredSince]);
|
|
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
$accessToken->setCodeCreatedAt($codeCreatedAt);
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validcode')
|
|
->willReturn($accessToken);
|
|
|
|
$tsNow = $codeCreatedAt + OauthApiController::AUTHORIZATION_CODE_EXPIRES_AFTER + $expiredSince;
|
|
$dateNow = (new \DateTimeImmutable())->setTimestamp($tsNow);
|
|
$this->timeFactory->method('now')
|
|
->willReturn($dateNow);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('authorization_code', 'validcode', null, null, null));
|
|
}
|
|
|
|
public function testGetTokenWithCodeForActiveToken() {
|
|
// if a token has already delivered oauth tokens,
|
|
// it should not be possible to get a new oauth token from a valid authorization code
|
|
$codeCreatedAt = 100;
|
|
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_request',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_request' => 'authorization_code_received_for_active_token']);
|
|
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
$accessToken->setCodeCreatedAt($codeCreatedAt);
|
|
$accessToken->setTokenCount(1);
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validcode')
|
|
->willReturn($accessToken);
|
|
|
|
$tsNow = $codeCreatedAt + 1;
|
|
$dateNow = (new \DateTimeImmutable())->setTimestamp($tsNow);
|
|
$this->timeFactory->method('now')
|
|
->willReturn($dateNow);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('authorization_code', 'validcode', null, null, null));
|
|
}
|
|
|
|
public function testGetTokenClientDoesNotExist() {
|
|
// In this test, the token's authorization code is valid and has not expired
|
|
// and we check what happens when the associated Oauth client does not exist
|
|
$codeCreatedAt = 100;
|
|
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_request',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_request' => 'client not found', 'client_id' => 42]);
|
|
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
$accessToken->setCodeCreatedAt($codeCreatedAt);
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validcode')
|
|
->willReturn($accessToken);
|
|
|
|
// 'now' is before the token's authorization code expiration
|
|
$tsNow = $codeCreatedAt + OauthApiController::AUTHORIZATION_CODE_EXPIRES_AFTER - 1;
|
|
$dateNow = (new \DateTimeImmutable())->setTimestamp($tsNow);
|
|
$this->timeFactory->method('now')
|
|
->willReturn($dateNow);
|
|
|
|
$this->clientMapper->method('getByUid')
|
|
->with(42)
|
|
->willThrowException(new ClientNotFoundException());
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('authorization_code', 'validcode', null, null, null));
|
|
}
|
|
|
|
public function testRefreshTokenInvalidRefreshToken() {
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_request',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_request' => 'token not found', 'code' => 'invalidrefresh']);
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('invalidrefresh')
|
|
->willThrowException(new AccessTokenNotFoundException());
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('refresh_token', null, 'invalidrefresh', null, null));
|
|
}
|
|
|
|
public function testRefreshTokenClientDoesNotExist() {
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_request',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_request' => 'client not found', 'client_id' => 42]);
|
|
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validrefresh')
|
|
->willReturn($accessToken);
|
|
|
|
$this->clientMapper->method('getByUid')
|
|
->with(42)
|
|
->willThrowException(new ClientNotFoundException());
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('refresh_token', null, 'validrefresh', null, null));
|
|
}
|
|
|
|
public function invalidClientProvider() {
|
|
return [
|
|
['invalidClientId', 'invalidClientSecret'],
|
|
['clientId', 'invalidClientSecret'],
|
|
['invalidClientId', 'clientSecret'],
|
|
];
|
|
}
|
|
|
|
/**
|
|
* @dataProvider invalidClientProvider
|
|
*
|
|
* @param string $clientId
|
|
* @param string $clientSecret
|
|
*/
|
|
public function testRefreshTokenInvalidClient($clientId, $clientSecret) {
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_client',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_client' => 'client ID or secret does not match']);
|
|
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validrefresh')
|
|
->willReturn($accessToken);
|
|
|
|
$this->crypto
|
|
->method('calculateHMAC')
|
|
->with($this->callback(function (string $text) {
|
|
return $text === 'clientSecret' || $text === 'invalidClientSecret';
|
|
}))
|
|
->willReturnCallback(function (string $text) {
|
|
return $text === 'clientSecret'
|
|
? 'hashedClientSecret'
|
|
: 'hashedInvalidClientSecret';
|
|
});
|
|
|
|
$client = new Client();
|
|
$client->setClientIdentifier('clientId');
|
|
$client->setSecret(bin2hex('hashedClientSecret'));
|
|
$this->clientMapper->method('getByUid')
|
|
->with(42)
|
|
->willReturn($client);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('refresh_token', null, 'validrefresh', $clientId, $clientSecret));
|
|
}
|
|
|
|
public function testRefreshTokenInvalidAppToken() {
|
|
$expected = new JSONResponse([
|
|
'error' => 'invalid_request',
|
|
], Http::STATUS_BAD_REQUEST);
|
|
$expected->throttle(['invalid_request' => 'token is invalid']);
|
|
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
$accessToken->setTokenId(1337);
|
|
$accessToken->setEncryptedToken('encryptedToken');
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validrefresh')
|
|
->willReturn($accessToken);
|
|
|
|
$client = new Client();
|
|
$client->setClientIdentifier('clientId');
|
|
$client->setSecret(bin2hex('hashedClientSecret'));
|
|
$this->clientMapper->method('getByUid')
|
|
->with(42)
|
|
->willReturn($client);
|
|
|
|
$this->crypto
|
|
->method('decrypt')
|
|
->with('encryptedToken')
|
|
->willReturn('decryptedToken');
|
|
|
|
$this->crypto
|
|
->method('calculateHMAC')
|
|
->with('clientSecret')
|
|
->willReturn('hashedClientSecret');
|
|
|
|
$this->tokenProvider->method('getTokenById')
|
|
->with(1337)
|
|
->willThrowException(new InvalidTokenException());
|
|
|
|
$this->accessTokenMapper->expects($this->once())
|
|
->method('delete')
|
|
->with($accessToken);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('refresh_token', null, 'validrefresh', 'clientId', 'clientSecret'));
|
|
}
|
|
|
|
public function testRefreshTokenValidAppToken() {
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
$accessToken->setTokenId(1337);
|
|
$accessToken->setEncryptedToken('encryptedToken');
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validrefresh')
|
|
->willReturn($accessToken);
|
|
|
|
$client = new Client();
|
|
$client->setClientIdentifier('clientId');
|
|
$client->setSecret(bin2hex('hashedClientSecret'));
|
|
$this->clientMapper->method('getByUid')
|
|
->with(42)
|
|
->willReturn($client);
|
|
|
|
$this->crypto
|
|
->method('decrypt')
|
|
->with('encryptedToken')
|
|
->willReturn('decryptedToken');
|
|
|
|
$this->crypto
|
|
->method('calculateHMAC')
|
|
->with('clientSecret')
|
|
->willReturn('hashedClientSecret');
|
|
|
|
$appToken = new PublicKeyToken();
|
|
$appToken->setUid('userId');
|
|
$this->tokenProvider->method('getTokenById')
|
|
->with(1337)
|
|
->willThrowException(new ExpiredTokenException($appToken));
|
|
|
|
$this->accessTokenMapper->expects($this->never())
|
|
->method('delete')
|
|
->with($accessToken);
|
|
|
|
$this->secureRandom->method('generate')
|
|
->willReturnCallback(function ($len) {
|
|
return 'random'.$len;
|
|
});
|
|
|
|
$this->tokenProvider->expects($this->once())
|
|
->method('rotate')
|
|
->with(
|
|
$appToken,
|
|
'decryptedToken',
|
|
'random72'
|
|
)->willReturn($appToken);
|
|
|
|
$this->time->method('getTime')
|
|
->willReturn(1000);
|
|
|
|
$this->tokenProvider->expects($this->once())
|
|
->method('updateToken')
|
|
->with(
|
|
$this->callback(function (PublicKeyToken $token) {
|
|
return $token->getExpires() === 4600;
|
|
})
|
|
);
|
|
|
|
$this->crypto->method('encrypt')
|
|
->with('random72', 'random128')
|
|
->willReturn('newEncryptedToken');
|
|
|
|
$this->accessTokenMapper->expects($this->once())
|
|
->method('update')
|
|
->with(
|
|
$this->callback(function (AccessToken $token) {
|
|
return $token->getHashedCode() === hash('sha512', 'random128') &&
|
|
$token->getEncryptedToken() === 'newEncryptedToken';
|
|
})
|
|
);
|
|
|
|
$expected = new JSONResponse([
|
|
'access_token' => 'random72',
|
|
'token_type' => 'Bearer',
|
|
'expires_in' => 3600,
|
|
'refresh_token' => 'random128',
|
|
'user_id' => 'userId',
|
|
]);
|
|
|
|
$this->request->method('getRemoteAddress')
|
|
->willReturn('1.2.3.4');
|
|
|
|
$this->throttler->expects($this->once())
|
|
->method('resetDelay')
|
|
->with(
|
|
'1.2.3.4',
|
|
'login',
|
|
['user' => 'userId']
|
|
);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('refresh_token', null, 'validrefresh', 'clientId', 'clientSecret'));
|
|
}
|
|
|
|
public function testRefreshTokenValidAppTokenBasicAuth() {
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
$accessToken->setTokenId(1337);
|
|
$accessToken->setEncryptedToken('encryptedToken');
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validrefresh')
|
|
->willReturn($accessToken);
|
|
|
|
$client = new Client();
|
|
$client->setClientIdentifier('clientId');
|
|
$client->setSecret(bin2hex('hashedClientSecret'));
|
|
$this->clientMapper->method('getByUid')
|
|
->with(42)
|
|
->willReturn($client);
|
|
|
|
$this->crypto
|
|
->method('decrypt')
|
|
->with('encryptedToken')
|
|
->willReturn('decryptedToken');
|
|
|
|
$this->crypto
|
|
->method('calculateHMAC')
|
|
->with('clientSecret')
|
|
->willReturn('hashedClientSecret');
|
|
|
|
$appToken = new PublicKeyToken();
|
|
$appToken->setUid('userId');
|
|
$this->tokenProvider->method('getTokenById')
|
|
->with(1337)
|
|
->willThrowException(new ExpiredTokenException($appToken));
|
|
|
|
$this->accessTokenMapper->expects($this->never())
|
|
->method('delete')
|
|
->with($accessToken);
|
|
|
|
$this->secureRandom->method('generate')
|
|
->willReturnCallback(function ($len) {
|
|
return 'random'.$len;
|
|
});
|
|
|
|
$this->tokenProvider->expects($this->once())
|
|
->method('rotate')
|
|
->with(
|
|
$appToken,
|
|
'decryptedToken',
|
|
'random72'
|
|
)->willReturn($appToken);
|
|
|
|
$this->time->method('getTime')
|
|
->willReturn(1000);
|
|
|
|
$this->tokenProvider->expects($this->once())
|
|
->method('updateToken')
|
|
->with(
|
|
$this->callback(function (PublicKeyToken $token) {
|
|
return $token->getExpires() === 4600;
|
|
})
|
|
);
|
|
|
|
$this->crypto->method('encrypt')
|
|
->with('random72', 'random128')
|
|
->willReturn('newEncryptedToken');
|
|
|
|
$this->accessTokenMapper->expects($this->once())
|
|
->method('update')
|
|
->with(
|
|
$this->callback(function (AccessToken $token) {
|
|
return $token->getHashedCode() === hash('sha512', 'random128') &&
|
|
$token->getEncryptedToken() === 'newEncryptedToken';
|
|
})
|
|
);
|
|
|
|
$expected = new JSONResponse([
|
|
'access_token' => 'random72',
|
|
'token_type' => 'Bearer',
|
|
'expires_in' => 3600,
|
|
'refresh_token' => 'random128',
|
|
'user_id' => 'userId',
|
|
]);
|
|
|
|
$this->request->server['PHP_AUTH_USER'] = 'clientId';
|
|
$this->request->server['PHP_AUTH_PW'] = 'clientSecret';
|
|
|
|
$this->request->method('getRemoteAddress')
|
|
->willReturn('1.2.3.4');
|
|
|
|
$this->throttler->expects($this->once())
|
|
->method('resetDelay')
|
|
->with(
|
|
'1.2.3.4',
|
|
'login',
|
|
['user' => 'userId']
|
|
);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('refresh_token', null, 'validrefresh', null, null));
|
|
}
|
|
|
|
public function testRefreshTokenExpiredAppToken() {
|
|
$accessToken = new AccessToken();
|
|
$accessToken->setClientId(42);
|
|
$accessToken->setTokenId(1337);
|
|
$accessToken->setEncryptedToken('encryptedToken');
|
|
|
|
$this->accessTokenMapper->method('getByCode')
|
|
->with('validrefresh')
|
|
->willReturn($accessToken);
|
|
|
|
$client = new Client();
|
|
$client->setClientIdentifier('clientId');
|
|
$client->setSecret(bin2hex('hashedClientSecret'));
|
|
$this->clientMapper->method('getByUid')
|
|
->with(42)
|
|
->willReturn($client);
|
|
|
|
$this->crypto
|
|
->method('decrypt')
|
|
->with('encryptedToken')
|
|
->willReturn('decryptedToken');
|
|
|
|
$this->crypto
|
|
->method('calculateHMAC')
|
|
->with('clientSecret')
|
|
->willReturn('hashedClientSecret');
|
|
|
|
$appToken = new PublicKeyToken();
|
|
$appToken->setUid('userId');
|
|
$this->tokenProvider->method('getTokenById')
|
|
->with(1337)
|
|
->willReturn($appToken);
|
|
|
|
$this->accessTokenMapper->expects($this->never())
|
|
->method('delete')
|
|
->with($accessToken);
|
|
|
|
$this->secureRandom->method('generate')
|
|
->willReturnCallback(function ($len) {
|
|
return 'random'.$len;
|
|
});
|
|
|
|
$this->tokenProvider->expects($this->once())
|
|
->method('rotate')
|
|
->with(
|
|
$appToken,
|
|
'decryptedToken',
|
|
'random72'
|
|
)->willReturn($appToken);
|
|
|
|
$this->time->method('getTime')
|
|
->willReturn(1000);
|
|
|
|
$this->tokenProvider->expects($this->once())
|
|
->method('updateToken')
|
|
->with(
|
|
$this->callback(function (PublicKeyToken $token) {
|
|
return $token->getExpires() === 4600;
|
|
})
|
|
);
|
|
|
|
$this->crypto->method('encrypt')
|
|
->with('random72', 'random128')
|
|
->willReturn('newEncryptedToken');
|
|
|
|
$this->accessTokenMapper->expects($this->once())
|
|
->method('update')
|
|
->with(
|
|
$this->callback(function (AccessToken $token) {
|
|
return $token->getHashedCode() === hash('sha512', 'random128') &&
|
|
$token->getEncryptedToken() === 'newEncryptedToken';
|
|
})
|
|
);
|
|
|
|
$expected = new JSONResponse([
|
|
'access_token' => 'random72',
|
|
'token_type' => 'Bearer',
|
|
'expires_in' => 3600,
|
|
'refresh_token' => 'random128',
|
|
'user_id' => 'userId',
|
|
]);
|
|
|
|
$this->request->method('getRemoteAddress')
|
|
->willReturn('1.2.3.4');
|
|
|
|
$this->throttler->expects($this->once())
|
|
->method('resetDelay')
|
|
->with(
|
|
'1.2.3.4',
|
|
'login',
|
|
['user' => 'userId']
|
|
);
|
|
|
|
$this->assertEquals($expected, $this->oauthApiController->getToken('refresh_token', null, 'validrefresh', 'clientId', 'clientSecret'));
|
|
}
|
|
}
|