1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
|
require 'helper'
describe OAuth2::Strategy::Assertion do
let(:client) do
cli = OAuth2::Client.new('abc', 'def', :site => 'http://api.example.com')
cli.connection.build do |b|
b.adapter :test do |stub|
stub.post('/oauth/token') do |env|
case @mode
when 'formencoded'
[200, {'Content-Type' => 'application/x-www-form-urlencoded'}, 'expires_in=600&access_token=salmon&refresh_token=trout']
when 'json'
[200, {'Content-Type' => 'application/json'}, '{"expires_in":600,"access_token":"salmon","refresh_token":"trout"}']
end
end
end
end
cli
end
let(:params) { {:hmac_secret => 'foo'} }
subject { client.assertion }
describe '#authorize_url' do
it 'raises NotImplementedError' do
expect { subject.authorize_url }.to raise_error(NotImplementedError)
end
end
%w(json formencoded).each do |mode|
describe "#get_token (#{mode})" do
before do
@mode = mode
@access = subject.get_token(params)
end
it 'returns AccessToken with same Client' do
expect(@access.client).to eq(client)
end
it 'returns AccessToken with #token' do
expect(@access.token).to eq('salmon')
end
it 'returns AccessToken with #expires_in' do
expect(@access.expires_in).to eq(600)
end
it 'returns AccessToken with #expires_at' do
expect(@access.expires_at).not_to be_nil
end
end
end
end
|