test_tokenauthenticatedrequest.js 1.7 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. /* Any copyright is dedicated to the Public Domain.
  2. * http://creativecommons.org/publicdomain/zero/1.0/ */
  3. Cu.import("resource://services-crypto/utils.js");
  4. Cu.import("resource://services-common/async.js");
  5. Cu.import("resource://services-common/rest.js");
  6. Cu.import("resource://services-common/utils.js");
  7. function run_test() {
  8. initTestLogging("Trace");
  9. run_next_test();
  10. }
  11. add_test(function test_authenticated_request() {
  12. _("Ensure that sending a MAC authenticated GET request works as expected.");
  13. let message = "Great Success!";
  14. // TODO: We use a preset key here, but use getTokenFromBrowserIDAssertion()
  15. // from TokenServerClient to get a real one when possible. (Bug 745800)
  16. let id = "eyJleHBpcmVzIjogMTM2NTAxMDg5OC4x";
  17. let key = "qTZf4ZFpAMpMoeSsX3zVRjiqmNs=";
  18. let method = "GET";
  19. let nonce = btoa(CryptoUtils.generateRandomBytes(16));
  20. let ts = Math.floor(Date.now() / 1000);
  21. let extra = {ts: ts, nonce: nonce};
  22. let auth;
  23. let server = httpd_setup({"/foo": function(request, response) {
  24. do_check_true(request.hasHeader("Authorization"));
  25. do_check_eq(auth, request.getHeader("Authorization"));
  26. response.setStatusLine(request.httpVersion, 200, "OK");
  27. response.bodyOutputStream.write(message, message.length);
  28. }
  29. });
  30. let uri = CommonUtils.makeURI(server.baseURI + "/foo");
  31. let sig = CryptoUtils.computeHTTPMACSHA1(id, key, method, uri, extra);
  32. auth = sig.getHeader();
  33. let req = new TokenAuthenticatedRESTRequest(uri, {id: id, key: key}, extra);
  34. let cb = Async.makeSpinningCallback();
  35. req.get(cb);
  36. let result = cb.wait();
  37. do_check_eq(null, result);
  38. do_check_eq(message, req.response.body);
  39. server.stop(run_next_test);
  40. });