Open Journal Systems  3.3.0
OauthPluginTest.php
1 <?php
2 
4 
9 
14 {
15  const TIMESTAMP = '1327274290';
16  const NONCE = 'e7aa11195ca58349bec8b5ebe351d3497eb9e603';
17 
18  protected $config = array(
19  'consumer_key' => 'foo',
20  'consumer_secret' => 'bar',
21  'token' => 'count',
22  'token_secret' => 'dracula'
23  );
24 
25  protected function getRequest()
26  {
27  return RequestFactory::getInstance()->create('POST', 'http://www.test.com/path?a=b&c=d', null, array(
28  'e' => 'f'
29  ));
30  }
31 
32  public function testSubscribesToEvents()
33  {
35  $this->assertArrayHasKey('request.before_send', $events);
36  }
37 
38  public function testAcceptsConfigurationData()
39  {
40  $p = new OauthPlugin($this->config);
41 
42  // Access the config object
43  $class = new \ReflectionClass($p);
44  $property = $class->getProperty('config');
45  $property->setAccessible(true);
46  $config = $property->getValue($p);
47 
48  $this->assertEquals('foo', $config['consumer_key']);
49  $this->assertEquals('bar', $config['consumer_secret']);
50  $this->assertEquals('count', $config['token']);
51  $this->assertEquals('dracula', $config['token_secret']);
52  $this->assertEquals('1.0', $config['version']);
53  $this->assertEquals('HMAC-SHA1', $config['signature_method']);
54  $this->assertEquals('header', $config['request_method']);
55  }
56 
58  {
59  $p = new OauthPlugin($this->config);
60  $request = $this->getRequest();
61  $signString = $p->getStringToSign($request, self::TIMESTAMP, self::NONCE);
62 
63  $this->assertContains('&e=f', rawurldecode($signString));
64 
65  $expectedSignString =
66  // Method and URL
67  'POST&http%3A%2F%2Fwww.test.com%2Fpath' .
68  // Sorted parameters from query string and body
69  '&a%3Db%26c%3Dd%26e%3Df%26oauth_consumer_key%3Dfoo' .
70  '%26oauth_nonce%3De7aa11195ca58349bec8b5ebe351d3497eb9e603%26' .
71  'oauth_signature_method%3DHMAC-SHA1' .
72  '%26oauth_timestamp%3D' . self::TIMESTAMP . '%26oauth_token%3Dcount%26oauth_version%3D1.0';
73 
74  $this->assertEquals($expectedSignString, $signString);
75  }
76 
78  {
80  $config['disable_post_params'] = true;
81  $p = new OauthPlugin($config);
82  $request = $this->getRequest();
83  $sts = rawurldecode($p->getStringToSign($request, self::TIMESTAMP, self::NONCE));
84  $this->assertNotContains('&e=f', $sts);
85  }
86 
88  {
89  $p = new OauthPlugin($this->config);
90  $request = $this->getRequest();
91  $request->setHeader('Content-Type', 'Foo');
92  $this->assertEquals(
93  // Method and URL
94  'POST&http%3A%2F%2Fwww.test.com%2Fpath' .
95  // Sorted parameters from query string and body
96  '&a%3Db%26c%3Dd%26oauth_consumer_key%3Dfoo' .
97  '%26oauth_nonce%3D'. self::NONCE .'%26' .
98  'oauth_signature_method%3DHMAC-SHA1' .
99  '%26oauth_timestamp%3D' . self::TIMESTAMP . '%26oauth_token%3Dcount%26oauth_version%3D1.0',
100  $p->getStringToSign($request, self::TIMESTAMP, self::NONCE)
101  );
102  }
103 
108  {
109  $p = new OauthPlugin($this->config);
110  $request = $this->getRequest();
111  $request->getQuery()->set('a', true);
112  $request->getQuery()->set('c', false);
113  $this->assertContains('&a%3Dtrue%26c%3Dfalse', $p->getStringToSign($request, self::TIMESTAMP, self::NONCE));
114  }
115 
117  {
118  $config = array(
119  'consumer_key' => 'foo',
120  'consumer_secret' => 'bar',
121  'token' => null,
122  'token_secret' => 'dracula'
123  );
124 
125  $p = new OauthPlugin($config);
126  $request = $this->getRequest();
127  $signString = $p->getStringToSign($request, self::TIMESTAMP, self::NONCE);
128 
129  $this->assertContains('&e=f', rawurldecode($signString));
130 
131  $expectedSignString = // Method and URL
132  'POST&http%3A%2F%2Fwww.test.com%2Fpath' .
133  // Sorted parameters from query string and body
134  '&a%3Db%26c%3Dd%26e%3Df%26oauth_consumer_key%3Dfoo' .
135  '%26oauth_nonce%3De7aa11195ca58349bec8b5ebe351d3497eb9e603%26' .
136  'oauth_signature_method%3DHMAC-SHA1' .
137  '%26oauth_timestamp%3D' . self::TIMESTAMP . '%26oauth_version%3D1.0';
138 
139  $this->assertEquals($expectedSignString, $signString);
140  }
141 
145  public function testMultiDimensionalArray()
146  {
147  $p = new OauthPlugin($this->config);
148  $request = $this->getRequest();
149  $request->getQuery()->set('a', array('b' => array('e' => 'f', 'c' => 'd')));
150  $this->assertContains('a%255Bb%255D%255Bc%255D%3Dd%26a%255Bb%255D%255Be%255D%3Df%26c%3Dd%26e%3Df%26', $p->getStringToSign($request, self::TIMESTAMP, self::NONCE));
151  }
152 
157  {
158  $p = new OauthPlugin($this->config);
159  $request = $this->getRequest();
160  $aggregator = new CommaAggregator();
161  $query = $request->getQuery()->setAggregator($aggregator)
162  ->set('g', array('h', 'i', 'j'))
163  ->set('k', array('l'))
164  ->set('m', array('n', 'o'));
165  $this->assertContains('a%3Db%26c%3Dd%26e%3Df%26g%3Dh%2Ci%2Cj%26k%3Dl%26m%3Dn%2Co', $p->getStringToSign($request, self::TIMESTAMP, self::NONCE));
166  }
167 
171  public function testSignsStrings()
172  {
173  $p = new OauthPlugin(array_merge($this->config, array(
174  'signature_callback' => function($string, $key) {
175  return "_{$string}|{$key}_";
176  }
177  )));
178  $request = $this->getRequest();
179  $sig = $p->getSignature($request, self::TIMESTAMP, self::NONCE);
180  $this->assertEquals(
181  '_POST&http%3A%2F%2Fwww.test.com%2Fpath&a%3Db%26c%3Dd%26e%3Df%26oauth_consumer_key%3Dfoo' .
182  '%26oauth_nonce%3D'. self::NONCE .'%26oauth_signature_method%3DHMAC-SHA1' .
183  '%26oauth_timestamp%3D' . self::TIMESTAMP . '%26oauth_token%3Dcount%26oauth_version%3D1.0|' .
184  'bar&dracula_',
185  base64_decode($sig)
186  );
187  }
188 
193  public function testSignsOauthRequests()
194  {
195  $p = new OauthPlugin($this->config);
196  $event = new Event(array(
197  'request' => $this->getRequest(),
198  'timestamp' => self::TIMESTAMP
199  ));
200  $params = $p->onRequestBeforeSend($event);
201 
202  $this->assertTrue($event['request']->hasHeader('Authorization'));
203 
204  $authorizationHeader = (string)$event['request']->getHeader('Authorization');
205 
206  $this->assertStringStartsWith('OAuth ', $authorizationHeader);
207 
208  $stringsToCheck = array(
209  'oauth_consumer_key="foo"',
210  'oauth_nonce="'.urlencode($params['oauth_nonce']).'"',
211  'oauth_signature="'.urlencode($params['oauth_signature']).'"',
212  'oauth_signature_method="HMAC-SHA1"',
213  'oauth_timestamp="' . self::TIMESTAMP . '"',
214  'oauth_token="count"',
215  'oauth_version="1.0"',
216  );
217 
218  $totalLength = strlen('OAuth ');
219 
220  //Separator is not used before first parameter.
221  $separator = '';
222 
223  foreach ($stringsToCheck as $stringToCheck) {
224  $this->assertContains($stringToCheck, $authorizationHeader);
225  $totalLength += strlen($separator);
226  $totalLength += strlen($stringToCheck);
227  $separator = ', ';
228  }
229 
230  // Technically this test is not universally valid. It would be allowable to have extra \n characters
231  // in the Authorization header. However Guzzle does not do this, so we just perform a simple check
232  // on length to validate the Authorization header is composed of only the strings above.
233  $this->assertEquals($totalLength, strlen($authorizationHeader), 'Authorization has extra characters i.e. contains extra elements compared to stringsToCheck.');
234  }
235 
237  {
238  $config = array_merge(
239  $this->config,
240  array('request_method' => OauthPlugin::REQUEST_METHOD_QUERY)
241  );
242 
243  $p = new OauthPlugin($config);
244  $event = new Event(array(
245  'request' => $this->getRequest(),
246  'timestamp' => self::TIMESTAMP
247  ));
248  $params = $p->onRequestBeforeSend($event);
249 
250  $this->assertFalse($event['request']->hasHeader('Authorization'));
251 
252  $stringsToCheck = array(
253  'a=b',
254  'c=d',
255  'oauth_consumer_key=foo',
256  'oauth_nonce='.urlencode($params['oauth_nonce']),
257  'oauth_signature='.urlencode($params['oauth_signature']),
258  'oauth_signature_method=HMAC-SHA1',
259  'oauth_timestamp='.self::TIMESTAMP,
260  'oauth_token=count',
261  'oauth_version=1.0',
262  );
263 
264  $queryString = (string) $event['request']->getQuery();
265 
266  $totalLength = strlen('?');
267 
268  //Separator is not used before first parameter.
269  $separator = '';
270 
271  foreach ($stringsToCheck as $stringToCheck) {
272  $this->assertContains($stringToCheck, $queryString);
273  $totalLength += strlen($separator);
274  $totalLength += strlen($stringToCheck);
275  $separator = '&';
276  }
277 
278  // Removes the last query string separator '&'
279  $totalLength -= 1;
280 
281  $this->assertEquals($totalLength, strlen($queryString), 'Query string has extra characters i.e. contains extra elements compared to stringsToCheck.');
282  }
283 
288  {
289  $config = array_merge(
290  $this->config,
291  array('request_method' => 'FakeMethod')
292  );
293 
294  $p = new OauthPlugin($config);
295  $event = new Event(array(
296  'request' => $this->getRequest(),
297  'timestamp' => self::TIMESTAMP
298  ));
299 
300  $p->onRequestBeforeSend($event);
301  }
302 
304  {
305  unset($this->config['token']);
306  $p = new OauthPlugin($this->config);
307  $event = new Event(array('request' => $this->getRequest(), 'timestamp' => self::TIMESTAMP));
308  $p->onRequestBeforeSend($event);
309  $this->assertTrue($event['request']->hasHeader('Authorization'));
310  $this->assertNotContains('oauth_token=', (string) $event['request']->getHeader('Authorization'));
311  }
312 
314  {
315  // The only required Oauth parameters are the consumer key and secret. That is enough credentials
316  // for signing oauth requests.
317  $config = array(
318  'consumer_key' => 'foo',
319  'consumer_secret' => 'bar',
320  );
321 
322  $plugin = new OauthPlugin($config);
323  $event = new Event(array(
324  'request' => $this->getRequest(),
325  'timestamp' => self::TIMESTAMP
326  ));
327 
328  $timestamp = $plugin->getTimestamp($event);
329  $request = $event['request'];
330  $nonce = $plugin->generateNonce($request);
331 
332  $paramsToSign = $plugin->getParamsToSign($request, $timestamp, $nonce);
333 
334  $optionalParams = array(
335  'callback' => 'oauth_callback',
336  'token' => 'oauth_token',
337  'verifier' => 'oauth_verifier',
338  'token_secret' => 'token_secret'
339  );
340 
341  foreach ($optionalParams as $optionName => $oauthName) {
342  $this->assertArrayNotHasKey($oauthName, $paramsToSign, "Optional Oauth param '$oauthName' was not set via config variable '$optionName', but it is listed in getParamsToSign().");
343  }
344  }
345 }
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\getRequest
getRequest()
Definition: OauthPluginTest.php:25
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testOptionalOauthParametersAreNotAutomaticallyAdded
testOptionalOauthParametersAreNotAutomaticallyAdded()
Definition: OauthPluginTest.php:313
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testMultiDimensionalArrayWithNonDefaultQueryAggregator
testMultiDimensionalArrayWithNonDefaultQueryAggregator()
Definition: OauthPluginTest.php:156
Guzzle\Plugin\Oauth\OauthPlugin\REQUEST_METHOD_QUERY
const REQUEST_METHOD_QUERY
Definition: OauthPlugin.php:23
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testConvertsBooleansToStrings
testConvertsBooleansToStrings()
Definition: OauthPluginTest.php:107
Guzzle\Tests\GuzzleTestCase
Definition: GuzzleTestCase.php:22
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\NONCE
const NONCE
Definition: OauthPluginTest.php:16
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testCreatesStringToSignFromPostRequestWithNullValues
testCreatesStringToSignFromPostRequestWithNullValues()
Definition: OauthPluginTest.php:116
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testSignsStrings
testSignsStrings()
Definition: OauthPluginTest.php:171
Guzzle\Tests\Plugin\Oauth
Definition: OauthPluginTest.php:3
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testCreatesStringToSignFromPostRequest
testCreatesStringToSignFromPostRequest()
Definition: OauthPluginTest.php:57
Guzzle\Plugin\Oauth\OauthPlugin\getSubscribedEvents
static getSubscribedEvents()
Definition: OauthPlugin.php:64
Guzzle\Common\Event
Definition: lib/vendor/guzzle/guzzle/src/Guzzle/Common/Event.php:10
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testMultiDimensionalArray
testMultiDimensionalArray()
Definition: OauthPluginTest.php:145
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testInvalidArgumentExceptionOnMethodError
testInvalidArgumentExceptionOnMethodError()
Definition: OauthPluginTest.php:287
Guzzle\Http\Message\RequestFactory
Definition: lib/vendor/guzzle/guzzle/src/Guzzle/Http/Message/RequestFactory.php:14
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testAcceptsConfigurationData
testAcceptsConfigurationData()
Definition: OauthPluginTest.php:38
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testSignsOauthRequests
testSignsOauthRequests()
Definition: OauthPluginTest.php:193
Guzzle\Tests\Plugin\Oauth\OauthPluginTest
Definition: OauthPluginTest.php:13
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testDoesNotAddFalseyValuesToAuthorization
testDoesNotAddFalseyValuesToAuthorization()
Definition: OauthPluginTest.php:303
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testCreatesStringToSignIgnoringPostFields
testCreatesStringToSignIgnoringPostFields()
Definition: OauthPluginTest.php:77
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\$config
$config
Definition: OauthPluginTest.php:18
Guzzle\Http\Message\RequestFactory\getInstance
static getInstance()
Definition: lib/vendor/guzzle/guzzle/src/Guzzle/Http/Message/RequestFactory.php:42
Guzzle\Http\QueryAggregator\CommaAggregator
Definition: CommaAggregator.php:10
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\TIMESTAMP
const TIMESTAMP
Definition: OauthPluginTest.php:15
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testCreatesStringToSignFromPostRequestWithCustomContentType
testCreatesStringToSignFromPostRequestWithCustomContentType()
Definition: OauthPluginTest.php:87
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testSubscribesToEvents
testSubscribesToEvents()
Definition: OauthPluginTest.php:32
Guzzle\Plugin\Oauth\OauthPlugin
Definition: OauthPlugin.php:17
Guzzle\Tests\Plugin\Oauth\OauthPluginTest\testSignsOauthQueryStringRequest
testSignsOauthQueryStringRequest()
Definition: OauthPluginTest.php:236