discourse/spec/lib/auth/twitter_authenticator_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

102 lines
2.7 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
RSpec.describe Auth::TwitterAuthenticator do
it "takes over account if email is supplied" do
auth = Auth::TwitterAuthenticator.new
user = Fabricate(:user)
auth_token = {
info: {
email: user.email,
username: "test",
name: "test",
nickname: "minion",
},
uid: "123",
provider: "twitter",
}
result = auth.after_authenticate(auth_token)
expect(result.user.id).to eq(user.id)
info = UserAssociatedAccount.find_by(provider_name: "twitter", user_id: user.id)
expect(info.info["email"]).to eq(user.email)
end
it "can connect to a different existing user account" do
authenticator = Auth::TwitterAuthenticator.new
user1 = Fabricate(:user)
user2 = Fabricate(:user)
UserAssociatedAccount.create!(provider_name: "twitter", user_id: user1.id, provider_uid: 100)
hash = {
info: {
email: user1.email,
username: "test",
name: "test",
nickname: "minion",
},
uid: "100",
provider: "twitter",
}
result = authenticator.after_authenticate(hash, existing_account: user2)
expect(result.user.id).to eq(user2.id)
expect(UserAssociatedAccount.exists?(provider_name: "twitter", user_id: user1.id)).to eq(false)
expect(UserAssociatedAccount.exists?(provider_name: "twitter", user_id: user2.id)).to eq(true)
end
describe "revoke" do
fab!(:user)
let(:authenticator) { Auth::TwitterAuthenticator.new }
it "raises exception if no entry for user" do
expect { authenticator.revoke(user) }.to raise_error(Discourse::NotFound)
end
it "revokes correctly" do
UserAssociatedAccount.create!(provider_name: "twitter", user_id: user.id, provider_uid: 100)
expect(authenticator.can_revoke?).to eq(true)
expect(authenticator.revoke(user)).to eq(true)
expect(authenticator.description_for_user(user)).to eq("")
end
end
describe "#healthy?" do
let(:authenticator) { described_class.new }
let(:connection) { mock("Faraday::Connection") }
let(:response) { mock("Faraday::Response") }
before do
Faraday.stubs(:new).returns(connection)
connection.stubs(:post).returns(response)
response.stubs(:status).returns(status)
end
context "when endpoint is reachable" do
let(:status) { 200 }
it { expect(authenticator).to be_healthy }
end
context "when credentials aren't recognized" do
let(:status) { 403 }
it { expect(authenticator).not_to be_healthy }
end
context "when an unexpected error happens" do
let(:status) { anything }
before { connection.stubs(:post).raises(Faraday::ServerError) }
it { expect(authenticator).not_to be_healthy }
end
end
end