Merge remote-tracking branch 'parent/main' into kbtopic-remove-quote

This commit is contained in:
KMY 2025-04-26 08:30:17 +09:00
commit 80542ea172
76 changed files with 658 additions and 390 deletions

View file

@ -127,10 +127,10 @@ RSpec.describe 'FeaturedTags' do
FeaturedTag.create(name: params[:name], account: user.account)
end
it 'returns http unprocessable entity' do
it 'returns http success' do
post '/api/v1/featured_tags', headers: headers, params: params
expect(response).to have_http_status(422)
expect(response).to have_http_status(200)
expect(response.content_type)
.to start_with('application/json')
end

View file

@ -161,4 +161,116 @@ RSpec.describe 'Tags' do
end
end
end
describe 'POST /api/v1/tags/:id/feature' do
subject do
post "/api/v1/tags/#{name}/feature", headers: headers
end
let!(:tag) { Fabricate(:tag) }
let(:name) { tag.name }
let(:scopes) { 'write:accounts' }
it_behaves_like 'forbidden for wrong scope', 'read read:follows'
context 'when the tag exists' do
it 'creates featured tag', :aggregate_failures do
subject
expect(response).to have_http_status(:success)
expect(response.content_type)
.to start_with('application/json')
expect(FeaturedTag.where(tag: tag, account: user.account)).to exist
end
end
context 'when the tag does not exist' do
let(:name) { 'hoge' }
it 'creates a new tag with the specified name', :aggregate_failures do
subject
expect(response).to have_http_status(200)
expect(response.content_type)
.to start_with('application/json')
expect(Tag.where(name: name)).to exist
expect(FeaturedTag.where(tag: Tag.find_by(name: name), account: user.account)).to exist
end
end
context 'when the tag name is invalid' do
let(:name) { 'tag-name' }
it 'returns http not found' do
subject
expect(response).to have_http_status(404)
expect(response.content_type)
.to start_with('application/json')
end
end
context 'when the Authorization header is missing' do
let(:headers) { {} }
let(:name) { 'unauthorized' }
it 'returns http unauthorized' do
subject
expect(response).to have_http_status(401)
expect(response.content_type)
.to start_with('application/json')
end
end
end
describe 'POST #unfeature' do
subject do
post "/api/v1/tags/#{name}/unfeature", headers: headers
end
let(:name) { tag.name }
let!(:tag) { Fabricate(:tag, name: 'foo') }
let(:scopes) { 'write:accounts' }
before do
Fabricate(:featured_tag, account: user.account, tag: tag)
end
it_behaves_like 'forbidden for wrong scope', 'read read:follows'
it 'removes the featured tag', :aggregate_failures do
subject
expect(response).to have_http_status(200)
expect(response.content_type)
.to start_with('application/json')
expect(FeaturedTag.where(tag: tag, account: user.account)).to_not exist
end
context 'when the tag name is invalid' do
let(:name) { 'tag-name' }
it 'returns http not found' do
subject
expect(response).to have_http_status(404)
expect(response.content_type)
.to start_with('application/json')
end
end
context 'when the Authorization header is missing' do
let(:headers) { {} }
let(:name) { 'unauthorized' }
it 'returns http unauthorized' do
subject
expect(response).to have_http_status(401)
expect(response.content_type)
.to start_with('application/json')
end
end
end
end

View file

@ -29,7 +29,7 @@ RSpec.describe 'Managing OAuth Tokens' do
access_grant.plaintext_token
end
shared_examples 'returns originally requested scopes' do
shared_examples 'original scope request preservation' do
it 'returns all scopes requested for the given code' do
subject
@ -41,26 +41,26 @@ RSpec.describe 'Managing OAuth Tokens' do
context 'with no scopes specified' do
let(:scope) { nil }
include_examples 'returns originally requested scopes'
it_behaves_like 'original scope request preservation'
end
context 'with scopes specified' do
context 'when the scopes were requested for this code' do
let(:scope) { 'write' }
include_examples 'returns originally requested scopes'
it_behaves_like 'original scope request preservation'
end
context 'when the scope was not requested for the code' do
let(:scope) { 'follow' }
include_examples 'returns originally requested scopes'
it_behaves_like 'original scope request preservation'
end
context 'when the scope does not belong to the application' do
let(:scope) { 'push' }
include_examples 'returns originally requested scopes'
it_behaves_like 'original scope request preservation'
end
end
end

View file

@ -130,14 +130,14 @@ RSpec.describe 'OmniAuth callbacks' do
end
describe '#openid_connect', if: ENV['OIDC_ENABLED'] == 'true' && ENV['OIDC_SCOPE'].present? do
include_examples 'omniauth provider callbacks', :openid_connect
it_behaves_like 'omniauth provider callbacks', :openid_connect
end
describe '#cas', if: ENV['CAS_ENABLED'] == 'true' do
include_examples 'omniauth provider callbacks', :cas
it_behaves_like 'omniauth provider callbacks', :cas
end
describe '#saml', if: ENV['SAML_ENABLED'] == 'true' do
include_examples 'omniauth provider callbacks', :saml
it_behaves_like 'omniauth provider callbacks', :saml
end
end