debian-mirror-gitlab/spec/models/oauth_access_token_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

75 lines
2.3 KiB
Ruby
Raw Normal View History

2019-12-04 20:38:33 +05:30
# frozen_string_literal: true
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe OauthAccessToken do
2019-12-04 20:38:33 +05:30
let(:app_one) { create(:oauth_application) }
let(:app_two) { create(:oauth_application) }
let(:app_three) { create(:oauth_application) }
2022-08-13 15:12:31 +05:30
let(:token) { create(:oauth_access_token, application_id: app_one.id) }
2019-12-04 20:38:33 +05:30
2022-08-13 15:12:31 +05:30
describe 'scopes' do
describe '.latest_per_application' do
let!(:app_two_token1) { create(:oauth_access_token, application: app_two) }
let!(:app_two_token2) { create(:oauth_access_token, application: app_two) }
let!(:app_three_token1) { create(:oauth_access_token, application: app_three) }
let!(:app_three_token2) { create(:oauth_access_token, application: app_three) }
2019-12-04 20:38:33 +05:30
2022-08-13 15:12:31 +05:30
it 'returns only the latest token for each application' do
expect(described_class.latest_per_application.map(&:id))
.to match_array([app_two_token2.id, app_three_token2.id])
end
end
2019-12-04 20:38:33 +05:30
end
2022-08-27 11:52:29 +05:30
describe 'Doorkeeper secret storing' do
it 'stores the token in hashed format' do
expect(token.token).not_to eq(token.plaintext_token)
end
it 'does not allow falling back to plaintext token comparison' do
expect(described_class.by_token(token.token)).to be_nil
end
it 'finds a token by plaintext token' do
expect(described_class.by_token(token.plaintext_token)).to be_a(OauthAccessToken)
end
context 'when the token is stored in plaintext' do
let(:plaintext_token) { Devise.friendly_token(20) }
before do
token.update_column(:token, plaintext_token)
end
it 'falls back to plaintext token comparison' do
expect(described_class.by_token(plaintext_token)).to be_a(OauthAccessToken)
end
end
end
2022-10-11 01:57:18 +05:30
describe '.matching_token_for' do
it 'does not find existing tokens' do
expect(described_class.matching_token_for(app_one, token.resource_owner, token.scopes)).to be_nil
end
end
2023-03-17 16:20:25 +05:30
describe '#expires_in' do
context 'when token has expires_in value set' do
it 'uses the expires_in value' do
token = OauthAccessToken.new(expires_in: 1.minute)
2023-05-27 22:25:52 +05:30
expect(token).to be_valid
2023-03-17 16:20:25 +05:30
end
end
context 'when token has nil expires_in' do
it 'uses default value' do
token = OauthAccessToken.new(expires_in: nil)
2023-05-27 22:25:52 +05:30
expect(token).to be_invalid
2023-03-17 16:20:25 +05:30
end
end
end
2019-12-04 20:38:33 +05:30
end