PageRenderTime 55ms CodeModel.GetById 29ms RepoModel.GetById 0ms app.codeStats 0ms

/lib/plugins/Twitter/test/oauth.js

https://github.com/Kapinko/ExpressMVC
JavaScript | 140 lines | 119 code | 15 blank | 6 comment | 3 complexity | 792aee251ad02a5fe5836f9a0b878fb7 MD5 | raw file
  1. /**
  2. * Test for the oauth module.
  3. */
  4. (function () {
  5. var vows = require('vows'),
  6. assert = require('assert'),
  7. url = require('url'),
  8. crypto = require('crypto'),
  9. oAuth = require('../oauth'),
  10. //Following values are obtained from:
  11. //@see https://dev.twitter.com/docs/auth/creating-signature
  12. consumer_key = 'xvz1evFS4wEEPTGEFPHBog',
  13. consumer_secret = 'kAcSOqF21Fu85e7zjz7ZN2U4ZRhfV3WpwPAoE3Z7kBw',
  14. token = '370773112-GmHxMAgYyLbNEtIKZeRNFsMKPR9EyMZeS9weJAEb',
  15. token_secret = 'LswwdoUaIvS8ltyTt5jkRh4J50vUPVVHtR2YPi5kE',
  16. oauth_nonce = 'kYjzVBB8Y0ZFabxSWbWovY3uYSQ2pTgmZeNu2VS4cg',
  17. oauth_timestamp = '1318622958',
  18. twitter_method = 'POST',
  19. twitter_url = 'https://api.twitter.com/1/statuses/update.json?include_entities=true',
  20. twitter_params = { 'status': 'Hello Ladies + Gentlemen, a signed OAuth request!' };
  21. function twitter_oauth() {
  22. var oauth = new oAuth(consumer_key, consumer_secret);
  23. oauth.setToken(token, token_secret);
  24. //monkey patch to return static values.
  25. oauth.timestamp = function () { return oauth_timestamp; };
  26. oauth.nonce = function () { return oauth_nonce; };
  27. return oauth;
  28. }
  29. function md5_sign(key, base_string, encoding) {
  30. var hmac = crypto.createHmac('md5', key);
  31. hmac.update(base_string);
  32. return hmac.digest(encoding);
  33. }
  34. vows.describe('oAuth object').addBatch({
  35. 'When created it': {
  36. topic: new oAuth(consumer_key, consumer_secret),
  37. 'should store the proper consumer key values': function (topic) {
  38. assert.strictEqual(topic.consumer_key, consumer_key);
  39. assert.strictEqual(topic.consumer_secret, consumer_secret);
  40. },
  41. 'and it should have the proper defaults': function (topic) {
  42. assert.strictEqual(topic.signature_method, 'HMAC-SHA1');
  43. assert.strictEqual(topic.oauth_version, '1.0');
  44. }
  45. },
  46. 'Setting a token': {
  47. topic: twitter_oauth,
  48. 'should store the proper token values': function (topic) {
  49. assert.strictEqual(topic.token, token);
  50. assert.strictEqual(topic.token_secret, token_secret);
  51. }
  52. },
  53. 'Setting a version': {
  54. topic: function () {
  55. return twitter_oauth().setVersion('2.0');
  56. },
  57. 'should store the given version': function (topic) {
  58. assert.strictEqual(topic.version, '2.0');
  59. }
  60. },
  61. 'Setting an signature method': {
  62. topic: function () {
  63. return twitter_oauth().setSignatureMethod('blah');
  64. },
  65. 'should store the method': function (topic) {
  66. assert.strictEqual(topic.signature_method, 'blah');
  67. }
  68. },
  69. 'Signing a given string': {
  70. topic: function () {
  71. return twitter_oauth().sign(oauth_nonce);
  72. },
  73. 'should return the proper signature': function (topic) {
  74. var key = consumer_secret + '&' + token_secret,
  75. hmac = require('crypto').createHmac('sha1', key);
  76. hmac.update(oauth_nonce);
  77. assert.strictEqual(topic, hmac.digest('base64'));
  78. }
  79. },
  80. 'Asking for the parameter string': {
  81. topic: function () {
  82. var oauth = twitter_oauth(),
  83. purl = url.parse(twitter_url, true);
  84. return oauth.getParameterString(purl.query, twitter_params);
  85. },
  86. 'should return the expected string': function (topic) {
  87. var expected = "include_entities=true&oauth_consumer_key=xvz1evFS4wEEPTGEFPHBog&oauth_nonce=kYjzVBB8Y0ZFabxSWbWovY3uYSQ2pTgmZeNu2VS4cg&oauth_signature_method=HMAC-SHA1&oauth_timestamp=1318622958&oauth_token=370773112-GmHxMAgYyLbNEtIKZeRNFsMKPR9EyMZeS9weJAEb&oauth_version=1.0&status=Hello%20Ladies%20%2B%20Gentlemen%2C%20a%20signed%20OAuth%20request%21";
  88. assert.strictEqual(topic, expected);
  89. }
  90. },
  91. 'Asking for the signature base string': {
  92. topic: function () {
  93. var oauth = twitter_oauth();
  94. return oauth.getSignatureBaseString('post', twitter_url, twitter_params);
  95. },
  96. 'should return the expected string': function (topic) {
  97. var expected = 'POST&https%3A%2F%2Fapi.twitter.com%2F1%2Fstatuses%2Fupdate.json&include_entities%3Dtrue%26oauth_consumer_key%3Dxvz1evFS4wEEPTGEFPHBog%26oauth_nonce%3DkYjzVBB8Y0ZFabxSWbWovY3uYSQ2pTgmZeNu2VS4cg%26oauth_signature_method%3DHMAC-SHA1%26oauth_timestamp%3D1318622958%26oauth_token%3D370773112-GmHxMAgYyLbNEtIKZeRNFsMKPR9EyMZeS9weJAEb%26oauth_version%3D1.0%26status%3DHello%2520Ladies%2520%252B%2520Gentlemen%252C%2520a%2520signed%2520OAuth%2520request%2521';
  98. assert.strictEqual(topic, expected);
  99. }
  100. },
  101. 'Asking for the authorization header': {
  102. topic: function () {
  103. var oauth = twitter_oauth();
  104. return oauth.getHeader(twitter_method, twitter_url, twitter_params);
  105. },
  106. 'should return the expected string': function (topic) {
  107. var expected = 'OAuth oauth_consumer_key="xvz1evFS4wEEPTGEFPHBog", oauth_nonce="kYjzVBB8Y0ZFabxSWbWovY3uYSQ2pTgmZeNu2VS4cg", oauth_signature="tnnArxj06cWHq44gCs1OSKk%2FjLY%3D", oauth_signature_method="HMAC-SHA1", oauth_timestamp="1318622958", oauth_token="370773112-GmHxMAgYyLbNEtIKZeRNFsMKPR9EyMZeS9weJAEb", oauth_version="1.0"';
  108. assert.strictEqual(topic, expected);
  109. }
  110. },
  111. 'Adding a signature method': {
  112. topic: function () {
  113. oAuth.addSignatureMethod('HMAC-MD5', md5_sign);
  114. var oauth = twitter_oauth();
  115. oauth.setSignatureMethod('HMAC-MD5');
  116. return oauth;
  117. },
  118. 'should allow the user to request that method': function (topic) {
  119. var key = consumer_secret + '&' + token_secret,
  120. expected = md5_sign(key, oauth_nonce, 'base64');
  121. assert.strictEqual(topic.sign(oauth_nonce), expected);
  122. }
  123. }
  124. }).export(module);
  125. }());