1
0
Fork 0
composer/tests/Composer/Test/Util/BitbucketTest.php

456 lines
16 KiB
PHP
Raw Normal View History

2022-02-23 15:58:18 +00:00
<?php declare(strict_types=1);
/*
* This file is part of Composer.
*
* (c) Nils Adermann <naderman@naderman.de>
* Jordi Boggiano <j.boggiano@seld.be>
*
* For the full copyright and license information, please view the LICENSE
* file that was distributed with this source code.
*/
namespace Composer\Test\Util;
use Composer\Test\Mock\IOMock;
use Composer\Util\Bitbucket;
use Composer\Util\Http\Response;
2020-02-07 03:18:45 +00:00
use Composer\Test\TestCase;
/**
* @author Paul Wenke <wenke.paul@gmail.com>
*/
class BitbucketTest extends TestCase
{
2021-10-27 14:18:46 +00:00
/** @var string */
private $username = 'username';
2021-10-27 14:18:46 +00:00
/** @var string */
private $password = 'password';
2021-10-27 14:18:46 +00:00
/** @var string */
private $consumer_key = 'consumer_key';
2021-10-27 14:18:46 +00:00
/** @var string */
private $consumer_secret = 'consumer_secret';
2021-10-27 14:18:46 +00:00
/** @var string */
private $message = 'mymessage';
2021-10-27 14:18:46 +00:00
/** @var string */
private $origin = 'bitbucket.org';
2021-10-27 14:18:46 +00:00
/** @var string */
private $token = 'bitbuckettoken';
/** @var IOMock */
private $io;
2021-10-27 14:18:46 +00:00
/** @var \Composer\Util\HttpDownloader&\PHPUnit\Framework\MockObject\MockObject */
private $httpDownloader;
2021-10-27 14:18:46 +00:00
/** @var \Composer\Config&\PHPUnit\Framework\MockObject\MockObject */
private $config;
2021-10-27 14:18:46 +00:00
/** @var Bitbucket */
private $bitbucket;
/** @var int */
private $time;
2021-12-08 16:03:05 +00:00
protected function setUp(): void
{
$this->io = $this->getIOMock();
$this->httpDownloader = $this
->getMockBuilder('Composer\Util\HttpDownloader')
->disableOriginalConstructor()
->getMock()
;
$this->config = $this->getMockBuilder('Composer\Config')->getMock();
$this->time = time();
$this->bitbucket = new Bitbucket($this->io, $this->config, null, $this->httpDownloader, $this->time);
}
public function testRequestAccessTokenWithValidOAuthConsumer(): void
{
$this->io->expects([
['auth' => [$this->origin, $this->consumer_key, $this->consumer_secret]],
]);
$this->httpDownloader->expects($this->once())
->method('get')
->with(
Bitbucket::OAUTH2_ACCESS_TOKEN_URL,
2022-08-17 12:20:07 +00:00
[
'retry-auth-failure' => false,
2022-08-17 12:20:07 +00:00
'http' => [
'method' => 'POST',
'content' => 'grant_type=client_credentials',
2022-08-17 12:20:07 +00:00
],
]
)
->willReturn(
new Response(
2022-08-17 12:20:07 +00:00
['url' => Bitbucket::OAUTH2_ACCESS_TOKEN_URL],
200,
2022-08-17 12:20:07 +00:00
[],
sprintf(
'{"access_token": "%s", "scopes": "repository", "expires_in": 3600, "refresh_token": "refreshtoken", "token_type": "bearer"}',
$this->token
)
)
);
$this->config->expects($this->once())
->method('get')
->with('bitbucket-oauth')
->willReturn(null);
$this->setExpectationsForStoringAccessToken();
$this->assertEquals(
$this->token,
$this->bitbucket->requestToken($this->origin, $this->consumer_key, $this->consumer_secret)
);
}
2022-02-22 15:47:09 +00:00
public function testRequestAccessTokenWithValidOAuthConsumerAndValidStoredAccessToken(): Bitbucket
{
$this->config->expects($this->once())
->method('get')
->with('bitbucket-oauth')
->willReturn(
2022-08-17 12:20:07 +00:00
[
$this->origin => [
'access-token' => $this->token,
'access-token-expiration' => $this->time + 1800,
'consumer-key' => $this->consumer_key,
2017-03-08 14:07:29 +00:00
'consumer-secret' => $this->consumer_secret,
2022-08-17 12:20:07 +00:00
],
]
);
$this->assertEquals(
$this->token,
$this->bitbucket->requestToken($this->origin, $this->consumer_key, $this->consumer_secret)
);
return $this->bitbucket;
}
public function testRequestAccessTokenWithValidOAuthConsumerAndExpiredAccessToken(): void
{
$this->config->expects($this->once())
->method('get')
->with('bitbucket-oauth')
->willReturn(
2022-08-17 12:20:07 +00:00
[
$this->origin => [
'access-token' => 'randomExpiredToken',
'access-token-expiration' => $this->time - 400,
'consumer-key' => $this->consumer_key,
2017-03-08 14:07:29 +00:00
'consumer-secret' => $this->consumer_secret,
2022-08-17 12:20:07 +00:00
],
]
);
$this->io->expects([
['auth' => [$this->origin, $this->consumer_key, $this->consumer_secret]],
]);
$this->httpDownloader->expects($this->once())
->method('get')
->with(
Bitbucket::OAUTH2_ACCESS_TOKEN_URL,
2022-08-17 12:20:07 +00:00
[
'retry-auth-failure' => false,
2022-08-17 12:20:07 +00:00
'http' => [
'method' => 'POST',
'content' => 'grant_type=client_credentials',
2022-08-17 12:20:07 +00:00
],
]
)
->willReturn(
new Response(
2022-08-17 12:20:07 +00:00
['url' => Bitbucket::OAUTH2_ACCESS_TOKEN_URL],
200,
2022-08-17 12:20:07 +00:00
[],
sprintf(
'{"access_token": "%s", "scopes": "repository", "expires_in": 3600, "refresh_token": "refreshtoken", "token_type": "bearer"}',
$this->token
)
)
);
$this->setExpectationsForStoringAccessToken();
$this->assertEquals(
$this->token,
$this->bitbucket->requestToken($this->origin, $this->consumer_key, $this->consumer_secret)
);
}
public function testRequestAccessTokenWithUsernameAndPassword(): void
{
$this->io->expects([
['auth' => [$this->origin, $this->username, $this->password]],
['text' => 'Invalid OAuth consumer provided.'],
['text' => 'This can have three reasons:'],
['text' => '1. You are authenticating with a bitbucket username/password combination'],
['text' => '2. You are using an OAuth consumer, but didn\'t configure a (dummy) callback url'],
['text' => '3. You are using an OAuth consumer, but didn\'t configure it as private consumer'],
], true);
$this->httpDownloader->expects($this->once())
->method('get')
->with(
Bitbucket::OAUTH2_ACCESS_TOKEN_URL,
2022-08-17 12:20:07 +00:00
[
'retry-auth-failure' => false,
2022-08-17 12:20:07 +00:00
'http' => [
'method' => 'POST',
'content' => 'grant_type=client_credentials',
2022-08-17 12:20:07 +00:00
],
]
)
->willThrowException(
new \Composer\Downloader\TransportException(
sprintf(
'The \'%s\' URL could not be accessed: HTTP/1.1 400 BAD REQUEST',
Bitbucket::OAUTH2_ACCESS_TOKEN_URL
),
400
)
);
$this->config->expects($this->once())
->method('get')
->with('bitbucket-oauth')
->willReturn(null);
$this->assertEquals('', $this->bitbucket->requestToken($this->origin, $this->username, $this->password));
}
public function testRequestAccessTokenWithUsernameAndPasswordWithUnauthorizedResponse(): void
{
$this->config->expects($this->once())
->method('get')
->with('bitbucket-oauth')
->willReturn(null);
$this->io->expects([
['auth' => [$this->origin, $this->username, $this->password]],
['text' => 'Invalid OAuth consumer provided.'],
['text' => 'You can also add it manually later by using "composer config --global --auth bitbucket-oauth.bitbucket.org <consumer-key> <consumer-secret>"'],
], true);
$this->httpDownloader->expects($this->once())
->method('get')
->with(
Bitbucket::OAUTH2_ACCESS_TOKEN_URL,
2022-08-17 12:20:07 +00:00
[
'retry-auth-failure' => false,
2022-08-17 12:20:07 +00:00
'http' => [
'method' => 'POST',
'content' => 'grant_type=client_credentials',
2022-08-17 12:20:07 +00:00
],
]
)
2020-11-22 13:48:56 +00:00
->willThrowException(new \Composer\Downloader\TransportException('HTTP/1.1 401 UNAUTHORIZED', 401));
$this->assertEquals('', $this->bitbucket->requestToken($this->origin, $this->username, $this->password));
}
public function testRequestAccessTokenWithUsernameAndPasswordWithNotFoundResponse(): void
{
2021-12-09 19:55:26 +00:00
self::expectException('Composer\Downloader\TransportException');
$this->config->expects($this->once())
->method('get')
->with('bitbucket-oauth')
->willReturn(null);
$this->io->expects([
['auth' => [$this->origin, $this->username, $this->password]],
]);
2020-11-22 13:48:56 +00:00
$exception = new \Composer\Downloader\TransportException('HTTP/1.1 404 NOT FOUND', 404);
$this->httpDownloader->expects($this->once())
->method('get')
->with(
Bitbucket::OAUTH2_ACCESS_TOKEN_URL,
2022-08-17 12:20:07 +00:00
[
'retry-auth-failure' => false,
2022-08-17 12:20:07 +00:00
'http' => [
'method' => 'POST',
'content' => 'grant_type=client_credentials',
2022-08-17 12:20:07 +00:00
],
]
)
->willThrowException($exception);
$this->bitbucket->requestToken($this->origin, $this->username, $this->password);
}
public function testUsernamePasswordAuthenticationFlow(): void
{
$this->io->expects([
['text' => $this->message],
['ask' => 'Consumer Key (hidden): ', 'reply' => $this->consumer_key],
['ask' => 'Consumer Secret (hidden): ', 'reply' => $this->consumer_secret],
]);
$this->httpDownloader
->expects($this->once())
->method('get')
->with(
$this->equalTo($url = sprintf('https://%s/site/oauth2/access_token', $this->origin)),
$this->anything()
)
->willReturn(
new Response(
2022-08-17 12:20:07 +00:00
['url' => $url],
200,
2022-08-17 12:20:07 +00:00
[],
sprintf(
'{"access_token": "%s", "scopes": "repository", "expires_in": 3600, "refresh_token": "refresh_token", "token_type": "bearer"}',
$this->token
)
2016-07-02 15:03:01 +00:00
)
2020-09-11 21:13:42 +00:00
)
;
2016-07-02 15:03:01 +00:00
$this->setExpectationsForStoringAccessToken(true);
2016-07-02 15:03:01 +00:00
$this->assertTrue($this->bitbucket->authorizeOAuthInteractively($this->origin, $this->message));
}
public function testAuthorizeOAuthInteractivelyWithEmptyUsername(): void
{
$authConfigSourceMock = $this->getMockBuilder('Composer\Config\ConfigSourceInterface')->getMock();
$this->config->expects($this->atLeastOnce())
->method('getAuthConfigSource')
->willReturn($authConfigSourceMock);
$this->io->expects([
['ask' => 'Consumer Key (hidden): ', 'reply' => ''],
]);
$this->assertFalse($this->bitbucket->authorizeOAuthInteractively($this->origin, $this->message));
}
public function testAuthorizeOAuthInteractivelyWithEmptyPassword(): void
{
$authConfigSourceMock = $this->getMockBuilder('Composer\Config\ConfigSourceInterface')->getMock();
$this->config->expects($this->atLeastOnce())
->method('getAuthConfigSource')
->willReturn($authConfigSourceMock);
$this->io->expects([
['text' => $this->message],
['ask' => 'Consumer Key (hidden): ', 'reply' => $this->consumer_key],
['ask' => 'Consumer Secret (hidden): ', 'reply' => ''],
]);
$this->assertFalse($this->bitbucket->authorizeOAuthInteractively($this->origin, $this->message));
}
public function testAuthorizeOAuthInteractivelyWithRequestAccessTokenFailure(): void
{
$authConfigSourceMock = $this->getMockBuilder('Composer\Config\ConfigSourceInterface')->getMock();
$this->config->expects($this->atLeastOnce())
->method('getAuthConfigSource')
->willReturn($authConfigSourceMock);
$this->io->expects([
['text' => $this->message],
['ask' => 'Consumer Key (hidden): ', 'reply' => $this->consumer_key],
['ask' => 'Consumer Secret (hidden): ', 'reply' => $this->consumer_secret],
]);
$this->httpDownloader
->expects($this->once())
->method('get')
->with(
$this->equalTo($url = sprintf('https://%s/site/oauth2/access_token', $this->origin)),
$this->anything()
)
->willThrowException(
new \Composer\Downloader\TransportException(
sprintf(
'The \'%s\' URL could not be accessed: HTTP/1.1 400 BAD REQUEST',
Bitbucket::OAUTH2_ACCESS_TOKEN_URL
),
400
)
);
$this->assertFalse($this->bitbucket->authorizeOAuthInteractively($this->origin, $this->message));
}
2022-02-22 15:47:09 +00:00
private function setExpectationsForStoringAccessToken(bool $removeBasicAuth = false): void
{
$configSourceMock = $this->getMockBuilder('Composer\Config\ConfigSourceInterface')->getMock();
$this->config->expects($this->once())
->method('getConfigSource')
->willReturn($configSourceMock);
$configSourceMock->expects($this->once())
->method('removeConfigSetting')
->with('bitbucket-oauth.' . $this->origin);
$authConfigSourceMock = $this->getMockBuilder('Composer\Config\ConfigSourceInterface')->getMock();
$this->config->expects($this->atLeastOnce())
->method('getAuthConfigSource')
->willReturn($authConfigSourceMock);
$authConfigSourceMock->expects($this->once())
->method('addConfigSetting')
->with(
'bitbucket-oauth.' . $this->origin,
2022-08-17 12:20:07 +00:00
[
"consumer-key" => $this->consumer_key,
"consumer-secret" => $this->consumer_secret,
"access-token" => $this->token,
2017-03-08 14:07:29 +00:00
"access-token-expiration" => $this->time + 3600,
2022-08-17 12:20:07 +00:00
]
);
if ($removeBasicAuth) {
$authConfigSourceMock->expects($this->once())
->method('removeConfigSetting')
->with('http-basic.' . $this->origin);
}
}
public function testGetTokenWithoutAccessToken(): void
{
$this->assertSame('', $this->bitbucket->getToken());
}
/**
* @depends testRequestAccessTokenWithValidOAuthConsumerAndValidStoredAccessToken
*/
public function testGetTokenWithAccessToken(Bitbucket $bitbucket): void
{
$this->assertSame($this->token, $bitbucket->getToken());
}
public function testAuthorizeOAuthWithWrongOriginUrl(): void
{
2020-11-22 13:48:56 +00:00
$this->assertFalse($this->bitbucket->authorizeOAuth('non-' . $this->origin));
}
public function testAuthorizeOAuthWithoutAvailableGitConfigToken(): void
{
$process = $this->getProcessExecutorMock();
2022-08-17 12:20:07 +00:00
$process->expects([], false, ['return' => -1]);
$bitbucket = new Bitbucket($this->io, $this->config, $process, $this->httpDownloader, $this->time);
$this->assertFalse($bitbucket->authorizeOAuth($this->origin));
}
public function testAuthorizeOAuthWithAvailableGitConfigToken(): void
{
$process = $this->getProcessExecutorMock();
$bitbucket = new Bitbucket($this->io, $this->config, $process, $this->httpDownloader, $this->time);
$this->assertTrue($bitbucket->authorizeOAuth($this->origin));
}
}