debian-mirror-gitlab/doorkeeper/spec/requests/endpoints/token_spec.rb

72 lines
2.7 KiB
Ruby
Raw Normal View History

2020-01-04 02:51:38 +05:30
require 'spec_helper_integration'
describe 'Token endpoint' do
before do
client_exists
authorization_code_exists application: @client, scopes: 'public'
end
it 'respond with correct headers' do
post token_endpoint_url(code: @authorization.token, client: @client)
should_have_header 'Pragma', 'no-cache'
# Rails 5.2 changed headers
if ::Rails::VERSION::MAJOR >= 5 && ::Rails::VERSION::MINOR >= 2 || ::Rails::VERSION::MAJOR >= 6
should_have_header 'Cache-Control', 'private, no-store'
else
should_have_header 'Cache-Control', 'no-store'
end
should_have_header 'Content-Type', 'application/json; charset=utf-8'
end
it 'accepts client credentials with basic auth header' do
post token_endpoint_url(
code: @authorization.token,
redirect_uri: @client.redirect_uri
), {}, 'HTTP_AUTHORIZATION' => basic_auth_header_for_client(@client)
should_have_json 'access_token', Doorkeeper::AccessToken.first.token
end
it 'returns null for expires_in when a permanent token is set' do
config_is_set(:access_token_expires_in, nil)
post token_endpoint_url(code: @authorization.token, client: @client)
should_have_json 'access_token', Doorkeeper::AccessToken.first.token
should_not_have_json 'expires_in'
end
it 'returns unsupported_grant_type for invalid grant_type param' do
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: 'nothing')
should_not_have_json 'access_token'
should_have_json 'error', 'unsupported_grant_type'
should_have_json 'error_description', translated_error_message('unsupported_grant_type')
end
it 'returns unsupported_grant_type for disabled grant flows' do
config_is_set(:grant_flows, ['implicit'])
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: 'authorization_code')
should_not_have_json 'access_token'
should_have_json 'error', 'unsupported_grant_type'
should_have_json 'error_description', translated_error_message('unsupported_grant_type')
end
it 'returns unsupported_grant_type when refresh_token is not in use' do
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: 'refresh_token')
should_not_have_json 'access_token'
should_have_json 'error', 'unsupported_grant_type'
should_have_json 'error_description', translated_error_message('unsupported_grant_type')
end
it 'returns invalid_request if grant_type is missing' do
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: '')
should_not_have_json 'access_token'
should_have_json 'error', 'invalid_request'
should_have_json 'error_description', translated_error_message('invalid_request')
end
end