2017-04-24 17:30:30 +02:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'rails_helper'
|
|
|
|
|
2024-09-04 07:12:25 +02:00
|
|
|
RSpec.describe Oauth::AuthorizedApplicationsController do
|
2017-04-24 17:30:30 +02:00
|
|
|
render_views
|
|
|
|
|
|
|
|
describe 'GET #index' do
|
2017-05-29 18:08:05 +02:00
|
|
|
subject do
|
2017-04-24 17:30:30 +02:00
|
|
|
get :index
|
|
|
|
end
|
|
|
|
|
2017-05-29 18:08:05 +02:00
|
|
|
shared_examples 'stores location for user' do
|
|
|
|
it 'stores location for user' do
|
|
|
|
subject
|
2023-02-18 23:38:14 +01:00
|
|
|
expect(controller.stored_location_for(:user)).to eq '/oauth/authorized_applications'
|
2017-05-29 18:08:05 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when signed in' do
|
|
|
|
before do
|
|
|
|
sign_in Fabricate(:user), scope: :user
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns http success' do
|
|
|
|
subject
|
2018-04-21 21:35:07 +02:00
|
|
|
expect(response).to have_http_status(200)
|
2017-05-29 18:08:05 +02:00
|
|
|
end
|
|
|
|
|
2023-04-19 16:07:29 +02:00
|
|
|
it 'returns private cache control headers' do
|
|
|
|
subject
|
|
|
|
expect(response.headers['Cache-Control']).to include('private, no-store')
|
|
|
|
end
|
|
|
|
|
2017-05-29 18:08:05 +02:00
|
|
|
include_examples 'stores location for user'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when not signed in' do
|
|
|
|
it 'redirects' do
|
|
|
|
subject
|
|
|
|
expect(response).to redirect_to '/auth/sign_in'
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'stores location for user'
|
2017-04-24 17:30:30 +02:00
|
|
|
end
|
|
|
|
end
|
2018-05-19 21:05:08 +02:00
|
|
|
|
|
|
|
describe 'DELETE #destroy' do
|
|
|
|
let!(:user) { Fabricate(:user) }
|
|
|
|
let!(:application) { Fabricate(:application) }
|
|
|
|
let!(:access_token) { Fabricate(:accessible_access_token, application: application, resource_owner_id: user.id) }
|
|
|
|
let!(:web_push_subscription) { Fabricate(:web_push_subscription, user: user, access_token: access_token) }
|
2024-07-04 16:11:28 +02:00
|
|
|
let(:redis_pipeline_stub) { instance_double(Redis::Namespace, publish: nil) }
|
2018-05-19 21:05:08 +02:00
|
|
|
|
|
|
|
before do
|
|
|
|
sign_in user, scope: :user
|
2024-07-04 16:11:28 +02:00
|
|
|
allow(redis).to receive(:pipelined).and_yield(redis_pipeline_stub)
|
2018-05-19 21:05:08 +02:00
|
|
|
post :destroy, params: { id: application.id }
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'revokes access tokens for the application' do
|
|
|
|
expect(Doorkeeper::AccessToken.where(application: application).first.revoked_at).to_not be_nil
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes subscriptions for the application\'s access tokens' do
|
|
|
|
expect(Web::PushSubscription.where(user: user).count).to eq 0
|
|
|
|
end
|
2023-12-21 10:28:41 +01:00
|
|
|
|
|
|
|
it 'removes the web_push_subscription' do
|
|
|
|
expect { web_push_subscription.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
|
|
end
|
2024-07-04 16:11:28 +02:00
|
|
|
|
|
|
|
it 'sends a session kill payload to the streaming server' do
|
|
|
|
expect(redis_pipeline_stub).to have_received(:publish).with("timeline:access_token:#{access_token.id}", '{"event":"kill"}')
|
|
|
|
end
|
2018-05-19 21:05:08 +02:00
|
|
|
end
|
2017-04-24 17:30:30 +02:00
|
|
|
end
|