mirror of
https://github.com/discourse/discourse.git
synced 2024-12-15 14:34:31 +08:00
ed2496c59d
This PR adds a new scheduled problem check that simply tries to connect to Twitter OAuth endpoint to check that it's working. It is using the default retry strategy of 2 retries 30 seconds apart.
102 lines
2.7 KiB
Ruby
102 lines
2.7 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
RSpec.describe Auth::TwitterAuthenticator do
|
|
it "takes over account if email is supplied" do
|
|
auth = Auth::TwitterAuthenticator.new
|
|
|
|
user = Fabricate(:user)
|
|
|
|
auth_token = {
|
|
info: {
|
|
email: user.email,
|
|
username: "test",
|
|
name: "test",
|
|
nickname: "minion",
|
|
},
|
|
uid: "123",
|
|
provider: "twitter",
|
|
}
|
|
|
|
result = auth.after_authenticate(auth_token)
|
|
|
|
expect(result.user.id).to eq(user.id)
|
|
|
|
info = UserAssociatedAccount.find_by(provider_name: "twitter", user_id: user.id)
|
|
expect(info.info["email"]).to eq(user.email)
|
|
end
|
|
|
|
it "can connect to a different existing user account" do
|
|
authenticator = Auth::TwitterAuthenticator.new
|
|
user1 = Fabricate(:user)
|
|
user2 = Fabricate(:user)
|
|
|
|
UserAssociatedAccount.create!(provider_name: "twitter", user_id: user1.id, provider_uid: 100)
|
|
|
|
hash = {
|
|
info: {
|
|
email: user1.email,
|
|
username: "test",
|
|
name: "test",
|
|
nickname: "minion",
|
|
},
|
|
uid: "100",
|
|
provider: "twitter",
|
|
}
|
|
|
|
result = authenticator.after_authenticate(hash, existing_account: user2)
|
|
|
|
expect(result.user.id).to eq(user2.id)
|
|
expect(UserAssociatedAccount.exists?(provider_name: "twitter", user_id: user1.id)).to eq(false)
|
|
expect(UserAssociatedAccount.exists?(provider_name: "twitter", user_id: user2.id)).to eq(true)
|
|
end
|
|
|
|
describe "revoke" do
|
|
fab!(:user)
|
|
let(:authenticator) { Auth::TwitterAuthenticator.new }
|
|
|
|
it "raises exception if no entry for user" do
|
|
expect { authenticator.revoke(user) }.to raise_error(Discourse::NotFound)
|
|
end
|
|
|
|
it "revokes correctly" do
|
|
UserAssociatedAccount.create!(provider_name: "twitter", user_id: user.id, provider_uid: 100)
|
|
expect(authenticator.can_revoke?).to eq(true)
|
|
expect(authenticator.revoke(user)).to eq(true)
|
|
expect(authenticator.description_for_user(user)).to eq("")
|
|
end
|
|
end
|
|
|
|
describe "#healthy?" do
|
|
let(:authenticator) { described_class.new }
|
|
|
|
let(:connection) { mock("Faraday::Connection") }
|
|
let(:response) { mock("Faraday::Response") }
|
|
|
|
before do
|
|
Faraday.stubs(:new).returns(connection)
|
|
connection.stubs(:post).returns(response)
|
|
response.stubs(:status).returns(status)
|
|
end
|
|
|
|
context "when endpoint is reachable" do
|
|
let(:status) { 200 }
|
|
|
|
it { expect(authenticator).to be_healthy }
|
|
end
|
|
|
|
context "when credentials aren't recognized" do
|
|
let(:status) { 403 }
|
|
|
|
it { expect(authenticator).not_to be_healthy }
|
|
end
|
|
|
|
context "when an unexpected error happens" do
|
|
let(:status) { anything }
|
|
|
|
before { connection.stubs(:post).raises(Faraday::ServerError) }
|
|
|
|
it { expect(authenticator).not_to be_healthy }
|
|
end
|
|
end
|
|
end
|