pleroma-fe/test/unit/specs/stores/oauth.spec.js

198 lines
6.4 KiB
JavaScript
Raw Normal View History

2026-02-10 21:29:48 +02:00
import { createTestingPinia } from '@pinia/testing'
2026-02-11 20:42:31 +02:00
import { HttpResponse, http } from 'msw'
import { createPinia, setActivePinia } from 'pinia'
2026-01-08 17:26:52 +02:00
2026-01-06 16:22:52 +02:00
import {
authApis,
2026-01-06 16:23:17 +02:00
injectMswToTest,
2026-01-06 16:22:52 +02:00
testServer,
} from '/test/fixtures/mock_api.js'
2025-03-09 15:06:19 -04:00
2026-02-10 21:29:48 +02:00
import { useInstanceStore } from 'src/stores/instance.js'
2026-02-11 20:42:31 +02:00
import { useOAuthStore } from 'src/stores/oauth.js'
2026-01-29 20:40:00 +02:00
2025-03-09 15:06:19 -04:00
const test = injectMswToTest(authApis)
2026-02-10 21:29:48 +02:00
describe('oauth store', () => {
beforeEach(() => {
setActivePinia(createTestingPinia({ stubActions: false }))
useInstanceStore().server = testServer
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
describe('createApp', () => {
test('it should use create an app and record client id and secret', async () => {
const store = useOAuthStore()
const app = await store.createApp()
expect(store.clientId).to.eql('test-id')
expect(store.clientSecret).to.eql('test-secret')
expect(app.clientId).to.eql('test-id')
expect(app.clientSecret).to.eql('test-secret')
})
2025-03-09 15:06:19 -04:00
2026-02-10 21:29:48 +02:00
test('it should throw and not update if failed', async ({ worker }) => {
worker.use(
http.post(`${testServer}/api/v1/apps`, () => {
return HttpResponse.text('Throttled', { status: 429 })
}),
)
const store = useOAuthStore()
const res = store.createApp()
await expect(res).rejects.toThrowError('Throttled')
expect(store.clientId).to.eql(false)
expect(store.clientSecret).to.eql(false)
})
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
describe('ensureApp', () => {
test('it should create an app if it does not exist', async () => {
const store = useOAuthStore()
const app = await store.ensureApp()
expect(store.clientId).to.eql('test-id')
expect(store.clientSecret).to.eql('test-secret')
expect(app.clientId).to.eql('test-id')
expect(app.clientSecret).to.eql('test-secret')
})
test('it should not create an app if it exists', async ({ worker }) => {
worker.use(
http.post(`${testServer}/api/v1/apps`, () => {
return HttpResponse.text('Should not call this API', { status: 400 })
}),
)
const store = useOAuthStore()
store.clientId = 'another-id'
store.clientSecret = 'another-secret'
const app = await store.ensureApp()
expect(store.clientId).to.eql('another-id')
expect(store.clientSecret).to.eql('another-secret')
expect(app.clientId).to.eql('another-id')
expect(app.clientSecret).to.eql('another-secret')
2025-03-09 15:06:19 -04:00
})
})
2026-02-10 21:29:48 +02:00
describe('getAppToken', () => {
test('it should get app token and set it in state', async () => {
const store = useOAuthStore()
store.clientId = 'test-id'
store.clientSecret = 'test-secret'
const token = await store.getAppToken()
expect(token).to.eql('test-app-token')
expect(store.appToken).to.eql('test-app-token')
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
test('it should throw and not set state if it cannot get app token', async () => {
const store = useOAuthStore()
store.clientId = 'bad-id'
store.clientSecret = 'bad-secret'
await expect(store.getAppToken()).rejects.toThrowError('400')
expect(store.appToken).to.eql(false)
2025-03-09 15:06:19 -04:00
})
})
2026-02-10 21:29:48 +02:00
describe('ensureAppToken', () => {
test('it should work if the state is empty', async () => {
const store = useOAuthStore()
const token = await store.ensureAppToken()
expect(token).to.eql('test-app-token')
expect(store.appToken).to.eql('test-app-token')
})
test('it should work if we already have a working token', async () => {
const store = useOAuthStore()
store.appToken = 'also-good-app-token'
2025-03-09 15:06:19 -04:00
2026-02-10 21:29:48 +02:00
const token = await store.ensureAppToken()
expect(token).to.eql('also-good-app-token')
expect(store.appToken).to.eql('also-good-app-token')
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
test('it should work if we have a bad token but good app credentials', async ({
worker,
}) => {
worker.use(
http.post(`${testServer}/api/v1/apps`, () => {
return HttpResponse.text('Should not call this API', { status: 400 })
}),
)
const store = useOAuthStore()
store.appToken = 'bad-app-token'
store.clientId = 'test-id'
store.clientSecret = 'test-secret'
const token = await store.ensureAppToken()
expect(token).to.eql('test-app-token')
expect(store.appToken).to.eql('test-app-token')
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
test('it should work if we have no token but good app credentials', async ({
worker,
}) => {
worker.use(
http.post(`${testServer}/api/v1/apps`, () => {
return HttpResponse.text('Should not call this API', { status: 400 })
}),
)
const store = useOAuthStore()
store.clientId = 'test-id'
store.clientSecret = 'test-secret'
const token = await store.ensureAppToken()
expect(token).to.eql('test-app-token')
expect(store.appToken).to.eql('test-app-token')
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
test('it should work if we have no token and bad app credentials', async () => {
const store = useOAuthStore()
store.clientId = 'bad-id'
store.clientSecret = 'bad-secret'
const token = await store.ensureAppToken()
expect(token).to.eql('test-app-token')
expect(store.appToken).to.eql('test-app-token')
expect(store.clientId).to.eql('test-id')
expect(store.clientSecret).to.eql('test-secret')
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
test('it should work if we have bad token and bad app credentials', async () => {
const store = useOAuthStore()
store.appToken = 'bad-app-token'
store.clientId = 'bad-id'
store.clientSecret = 'bad-secret'
const token = await store.ensureAppToken()
expect(token).to.eql('test-app-token')
expect(store.appToken).to.eql('test-app-token')
expect(store.clientId).to.eql('test-id')
expect(store.clientSecret).to.eql('test-secret')
2025-03-09 15:06:19 -04:00
})
2026-02-10 21:29:48 +02:00
test('it should throw if we cannot create an app', async ({ worker }) => {
worker.use(
http.post(`${testServer}/api/v1/apps`, () => {
return HttpResponse.text('Throttled', { status: 429 })
}),
)
2025-03-09 15:06:19 -04:00
2026-02-10 21:29:48 +02:00
const store = useOAuthStore()
await expect(store.ensureAppToken()).rejects.toThrowError('Throttled')
})
2025-03-09 15:06:19 -04:00
2026-02-11 20:42:31 +02:00
test('it should throw if we cannot obtain app token', async ({
worker,
}) => {
2026-02-10 21:29:48 +02:00
worker.use(
http.post(`${testServer}/oauth/token`, () => {
return HttpResponse.text('Throttled', { status: 429 })
}),
)
2025-03-09 15:06:19 -04:00
2026-02-10 21:29:48 +02:00
const store = useOAuthStore()
await expect(store.ensureAppToken()).rejects.toThrowError('Throttled')
})
2025-03-09 15:06:19 -04:00
})
})