mirror of
https://github.com/mastodon/mastodon.git
synced 2024-12-18 07:38:42 +00:00
Reduce factory creation (36 -> 12) in spec/controllers/oauth/*
area (#32045)
This commit is contained in:
parent
06ecf9008b
commit
c3b6a7a297
|
@ -10,13 +10,6 @@ RSpec.describe Oauth::AuthorizationsController do
|
||||||
get :new, params: { client_id: app.uid, response_type: 'code', redirect_uri: 'http://localhost/', scope: 'read' }
|
get :new, params: { client_id: app.uid, response_type: 'code', redirect_uri: 'http://localhost/', scope: 'read' }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'stores location for user' do
|
|
||||||
it 'stores location for user' do
|
|
||||||
subject
|
|
||||||
expect(controller.stored_location_for(:user)).to eq "/oauth/authorize?client_id=#{app.uid}&redirect_uri=http%3A%2F%2Flocalhost%2F&response_type=code&scope=read"
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
context 'when signed in' do
|
context 'when signed in' do
|
||||||
let!(:user) { Fabricate(:user) }
|
let!(:user) { Fabricate(:user) }
|
||||||
|
|
||||||
|
@ -24,18 +17,17 @@ RSpec.describe Oauth::AuthorizationsController do
|
||||||
sign_in user, scope: :user
|
sign_in user, scope: :user
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'returns http success' do
|
it 'returns http success and private cache control headers' do
|
||||||
subject
|
subject
|
||||||
expect(response).to have_http_status(200)
|
|
||||||
end
|
|
||||||
|
|
||||||
it 'returns private cache control headers' do
|
expect(response)
|
||||||
subject
|
.to have_http_status(200)
|
||||||
expect(response.headers['Cache-Control']).to include('private, no-store')
|
expect(response.headers['Cache-Control'])
|
||||||
|
.to include('private, no-store')
|
||||||
|
expect(controller.stored_location_for(:user))
|
||||||
|
.to eq authorize_path_for(app)
|
||||||
end
|
end
|
||||||
|
|
||||||
include_examples 'stores location for user'
|
|
||||||
|
|
||||||
context 'when app is already authorized' do
|
context 'when app is already authorized' do
|
||||||
before do
|
before do
|
||||||
Doorkeeper::AccessToken.find_or_create_for(
|
Doorkeeper::AccessToken.find_or_create_for(
|
||||||
|
@ -52,10 +44,12 @@ RSpec.describe Oauth::AuthorizationsController do
|
||||||
expect(response).to redirect_to(/\A#{app.redirect_uri}/)
|
expect(response).to redirect_to(/\A#{app.redirect_uri}/)
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'does not redirect to callback with force_login=true' do
|
context 'with `force_login` param true' do
|
||||||
|
subject do
|
||||||
get :new, params: { client_id: app.uid, response_type: 'code', redirect_uri: 'http://localhost/', scope: 'read', force_login: 'true' }
|
get :new, params: { client_id: app.uid, response_type: 'code', redirect_uri: 'http://localhost/', scope: 'read', force_login: 'true' }
|
||||||
|
end
|
||||||
|
|
||||||
expect(response).to have_http_status(:success)
|
it { is_expected.to have_http_status(:success) }
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
@ -63,10 +57,16 @@ RSpec.describe Oauth::AuthorizationsController do
|
||||||
context 'when not signed in' do
|
context 'when not signed in' do
|
||||||
it 'redirects' do
|
it 'redirects' do
|
||||||
subject
|
subject
|
||||||
expect(response).to redirect_to '/auth/sign_in'
|
|
||||||
|
expect(response)
|
||||||
|
.to redirect_to '/auth/sign_in'
|
||||||
|
expect(controller.stored_location_for(:user))
|
||||||
|
.to eq authorize_path_for(app)
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
include_examples 'stores location for user'
|
def authorize_path_for(app)
|
||||||
|
"/oauth/authorize?client_id=#{app.uid}&redirect_uri=http%3A%2F%2Flocalhost%2F&response_type=code&scope=read"
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -10,38 +10,31 @@ RSpec.describe Oauth::AuthorizedApplicationsController do
|
||||||
get :index
|
get :index
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'stores location for user' do
|
|
||||||
it 'stores location for user' do
|
|
||||||
subject
|
|
||||||
expect(controller.stored_location_for(:user)).to eq '/oauth/authorized_applications'
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
context 'when signed in' do
|
context 'when signed in' do
|
||||||
before do
|
before do
|
||||||
sign_in Fabricate(:user), scope: :user
|
sign_in Fabricate(:user), scope: :user
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'returns http success' do
|
it 'returns http success with private cache control headers' do
|
||||||
subject
|
subject
|
||||||
expect(response).to have_http_status(200)
|
expect(response)
|
||||||
|
.to have_http_status(200)
|
||||||
|
expect(response.headers['Cache-Control'])
|
||||||
|
.to include('private, no-store')
|
||||||
|
expect(controller.stored_location_for(:user))
|
||||||
|
.to eq '/oauth/authorized_applications'
|
||||||
end
|
end
|
||||||
|
|
||||||
it 'returns private cache control headers' do
|
|
||||||
subject
|
|
||||||
expect(response.headers['Cache-Control']).to include('private, no-store')
|
|
||||||
end
|
|
||||||
|
|
||||||
include_examples 'stores location for user'
|
|
||||||
end
|
end
|
||||||
|
|
||||||
context 'when not signed in' do
|
context 'when not signed in' do
|
||||||
it 'redirects' do
|
it 'redirects' do
|
||||||
subject
|
subject
|
||||||
expect(response).to redirect_to '/auth/sign_in'
|
|
||||||
end
|
|
||||||
|
|
||||||
include_examples 'stores location for user'
|
expect(response)
|
||||||
|
.to redirect_to '/auth/sign_in'
|
||||||
|
expect(controller.stored_location_for(:user))
|
||||||
|
.to eq '/oauth/authorized_applications'
|
||||||
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -55,23 +48,19 @@ RSpec.describe Oauth::AuthorizedApplicationsController do
|
||||||
before do
|
before do
|
||||||
sign_in user, scope: :user
|
sign_in user, scope: :user
|
||||||
allow(redis).to receive(:pipelined).and_yield(redis_pipeline_stub)
|
allow(redis).to receive(:pipelined).and_yield(redis_pipeline_stub)
|
||||||
|
end
|
||||||
|
|
||||||
|
it 'revokes access tokens for the application and removes subscriptions and sends kill payload to streaming' do
|
||||||
post :destroy, params: { id: application.id }
|
post :destroy, params: { id: application.id }
|
||||||
end
|
|
||||||
|
|
||||||
it 'revokes access tokens for the application' do
|
expect(Doorkeeper::AccessToken.where(application: application).first.revoked_at)
|
||||||
expect(Doorkeeper::AccessToken.where(application: application).first.revoked_at).to_not be_nil
|
.to_not be_nil
|
||||||
end
|
expect(Web::PushSubscription.where(user: user).count)
|
||||||
|
.to eq(0)
|
||||||
it 'removes subscriptions for the application\'s access tokens' do
|
expect { web_push_subscription.reload }
|
||||||
expect(Web::PushSubscription.where(user: user).count).to eq 0
|
.to raise_error(ActiveRecord::RecordNotFound)
|
||||||
end
|
expect(redis_pipeline_stub)
|
||||||
|
.to have_received(:publish).with("timeline:access_token:#{access_token.id}", '{"event":"kill"}')
|
||||||
it 'removes the web_push_subscription' do
|
|
||||||
expect { web_push_subscription.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
||||||
end
|
|
||||||
|
|
||||||
it 'sends a session kill payload to the streaming server' do
|
|
||||||
expect(redis_pipeline_stub).to have_received(:publish).with("timeline:access_token:#{access_token.id}", '{"event":"kill"}')
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -9,20 +9,15 @@ RSpec.describe Oauth::TokensController do
|
||||||
let!(:access_token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, application: application) }
|
let!(:access_token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, application: application) }
|
||||||
let!(:web_push_subscription) { Fabricate(:web_push_subscription, user: user, access_token: access_token) }
|
let!(:web_push_subscription) { Fabricate(:web_push_subscription, user: user, access_token: access_token) }
|
||||||
|
|
||||||
before do
|
it 'revokes the token and removes subscriptions' do
|
||||||
post :revoke, params: { client_id: application.uid, token: access_token.token }
|
post :revoke, params: { client_id: application.uid, token: access_token.token }
|
||||||
end
|
|
||||||
|
|
||||||
it 'revokes the token' do
|
expect(access_token.reload.revoked_at)
|
||||||
expect(access_token.reload.revoked_at).to_not be_nil
|
.to_not be_nil
|
||||||
end
|
expect(Web::PushSubscription.where(access_token: access_token).count)
|
||||||
|
.to eq(0)
|
||||||
it 'removes web push subscription for token' do
|
expect { web_push_subscription.reload }
|
||||||
expect(Web::PushSubscription.where(access_token: access_token).count).to eq 0
|
.to raise_error(ActiveRecord::RecordNotFound)
|
||||||
end
|
|
||||||
|
|
||||||
it 'removes the web_push_subscription' do
|
|
||||||
expect { web_push_subscription.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
Loading…
Reference in a new issue