Merge remote-tracking branch 'parent/main' into kbtopic-remove-quote
This commit is contained in:
commit
80542ea172
76 changed files with 658 additions and 390 deletions
|
@ -127,10 +127,10 @@ RSpec.describe 'FeaturedTags' do
|
|||
FeaturedTag.create(name: params[:name], account: user.account)
|
||||
end
|
||||
|
||||
it 'returns http unprocessable entity' do
|
||||
it 'returns http success' do
|
||||
post '/api/v1/featured_tags', headers: headers, params: params
|
||||
|
||||
expect(response).to have_http_status(422)
|
||||
expect(response).to have_http_status(200)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
end
|
||||
|
|
|
@ -161,4 +161,116 @@ RSpec.describe 'Tags' do
|
|||
end
|
||||
end
|
||||
end
|
||||
|
||||
describe 'POST /api/v1/tags/:id/feature' do
|
||||
subject do
|
||||
post "/api/v1/tags/#{name}/feature", headers: headers
|
||||
end
|
||||
|
||||
let!(:tag) { Fabricate(:tag) }
|
||||
let(:name) { tag.name }
|
||||
let(:scopes) { 'write:accounts' }
|
||||
|
||||
it_behaves_like 'forbidden for wrong scope', 'read read:follows'
|
||||
|
||||
context 'when the tag exists' do
|
||||
it 'creates featured tag', :aggregate_failures do
|
||||
subject
|
||||
|
||||
expect(response).to have_http_status(:success)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
expect(FeaturedTag.where(tag: tag, account: user.account)).to exist
|
||||
end
|
||||
end
|
||||
|
||||
context 'when the tag does not exist' do
|
||||
let(:name) { 'hoge' }
|
||||
|
||||
it 'creates a new tag with the specified name', :aggregate_failures do
|
||||
subject
|
||||
|
||||
expect(response).to have_http_status(200)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
expect(Tag.where(name: name)).to exist
|
||||
expect(FeaturedTag.where(tag: Tag.find_by(name: name), account: user.account)).to exist
|
||||
end
|
||||
end
|
||||
|
||||
context 'when the tag name is invalid' do
|
||||
let(:name) { 'tag-name' }
|
||||
|
||||
it 'returns http not found' do
|
||||
subject
|
||||
|
||||
expect(response).to have_http_status(404)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
end
|
||||
end
|
||||
|
||||
context 'when the Authorization header is missing' do
|
||||
let(:headers) { {} }
|
||||
let(:name) { 'unauthorized' }
|
||||
|
||||
it 'returns http unauthorized' do
|
||||
subject
|
||||
|
||||
expect(response).to have_http_status(401)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
describe 'POST #unfeature' do
|
||||
subject do
|
||||
post "/api/v1/tags/#{name}/unfeature", headers: headers
|
||||
end
|
||||
|
||||
let(:name) { tag.name }
|
||||
let!(:tag) { Fabricate(:tag, name: 'foo') }
|
||||
let(:scopes) { 'write:accounts' }
|
||||
|
||||
before do
|
||||
Fabricate(:featured_tag, account: user.account, tag: tag)
|
||||
end
|
||||
|
||||
it_behaves_like 'forbidden for wrong scope', 'read read:follows'
|
||||
|
||||
it 'removes the featured tag', :aggregate_failures do
|
||||
subject
|
||||
|
||||
expect(response).to have_http_status(200)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
expect(FeaturedTag.where(tag: tag, account: user.account)).to_not exist
|
||||
end
|
||||
|
||||
context 'when the tag name is invalid' do
|
||||
let(:name) { 'tag-name' }
|
||||
|
||||
it 'returns http not found' do
|
||||
subject
|
||||
|
||||
expect(response).to have_http_status(404)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
end
|
||||
end
|
||||
|
||||
context 'when the Authorization header is missing' do
|
||||
let(:headers) { {} }
|
||||
let(:name) { 'unauthorized' }
|
||||
|
||||
it 'returns http unauthorized' do
|
||||
subject
|
||||
|
||||
expect(response).to have_http_status(401)
|
||||
expect(response.content_type)
|
||||
.to start_with('application/json')
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -29,7 +29,7 @@ RSpec.describe 'Managing OAuth Tokens' do
|
|||
access_grant.plaintext_token
|
||||
end
|
||||
|
||||
shared_examples 'returns originally requested scopes' do
|
||||
shared_examples 'original scope request preservation' do
|
||||
it 'returns all scopes requested for the given code' do
|
||||
subject
|
||||
|
||||
|
@ -41,26 +41,26 @@ RSpec.describe 'Managing OAuth Tokens' do
|
|||
context 'with no scopes specified' do
|
||||
let(:scope) { nil }
|
||||
|
||||
include_examples 'returns originally requested scopes'
|
||||
it_behaves_like 'original scope request preservation'
|
||||
end
|
||||
|
||||
context 'with scopes specified' do
|
||||
context 'when the scopes were requested for this code' do
|
||||
let(:scope) { 'write' }
|
||||
|
||||
include_examples 'returns originally requested scopes'
|
||||
it_behaves_like 'original scope request preservation'
|
||||
end
|
||||
|
||||
context 'when the scope was not requested for the code' do
|
||||
let(:scope) { 'follow' }
|
||||
|
||||
include_examples 'returns originally requested scopes'
|
||||
it_behaves_like 'original scope request preservation'
|
||||
end
|
||||
|
||||
context 'when the scope does not belong to the application' do
|
||||
let(:scope) { 'push' }
|
||||
|
||||
include_examples 'returns originally requested scopes'
|
||||
it_behaves_like 'original scope request preservation'
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
|
@ -130,14 +130,14 @@ RSpec.describe 'OmniAuth callbacks' do
|
|||
end
|
||||
|
||||
describe '#openid_connect', if: ENV['OIDC_ENABLED'] == 'true' && ENV['OIDC_SCOPE'].present? do
|
||||
include_examples 'omniauth provider callbacks', :openid_connect
|
||||
it_behaves_like 'omniauth provider callbacks', :openid_connect
|
||||
end
|
||||
|
||||
describe '#cas', if: ENV['CAS_ENABLED'] == 'true' do
|
||||
include_examples 'omniauth provider callbacks', :cas
|
||||
it_behaves_like 'omniauth provider callbacks', :cas
|
||||
end
|
||||
|
||||
describe '#saml', if: ENV['SAML_ENABLED'] == 'true' do
|
||||
include_examples 'omniauth provider callbacks', :saml
|
||||
it_behaves_like 'omniauth provider callbacks', :saml
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue