197 lines
6.4 KiB
JavaScript
197 lines
6.4 KiB
JavaScript
import { HttpResponse, http } from 'msw'
|
|
import { setActivePinia, createPinia } from 'pinia'
|
|
import { createTestingPinia } from '@pinia/testing'
|
|
|
|
import {
|
|
authApis,
|
|
injectMswToTest,
|
|
testServer,
|
|
} from '/test/fixtures/mock_api.js'
|
|
|
|
import { useOAuthStore } from 'src/stores/oauth.js'
|
|
import { useInstanceStore } from 'src/stores/instance.js'
|
|
|
|
const test = injectMswToTest(authApis)
|
|
|
|
describe('oauth store', () => {
|
|
beforeEach(() => {
|
|
setActivePinia(createTestingPinia({ stubActions: false }))
|
|
useInstanceStore().server = testServer
|
|
})
|
|
|
|
describe('createApp', () => {
|
|
test('it should use create an app and record client id and secret', async () => {
|
|
const store = useOAuthStore()
|
|
const app = await store.createApp()
|
|
expect(store.clientId).to.eql('test-id')
|
|
expect(store.clientSecret).to.eql('test-secret')
|
|
expect(app.clientId).to.eql('test-id')
|
|
expect(app.clientSecret).to.eql('test-secret')
|
|
})
|
|
|
|
test('it should throw and not update if failed', async ({ worker }) => {
|
|
worker.use(
|
|
http.post(`${testServer}/api/v1/apps`, () => {
|
|
return HttpResponse.text('Throttled', { status: 429 })
|
|
}),
|
|
)
|
|
|
|
const store = useOAuthStore()
|
|
const res = store.createApp()
|
|
await expect(res).rejects.toThrowError('Throttled')
|
|
expect(store.clientId).to.eql(false)
|
|
expect(store.clientSecret).to.eql(false)
|
|
})
|
|
})
|
|
|
|
describe('ensureApp', () => {
|
|
test('it should create an app if it does not exist', async () => {
|
|
const store = useOAuthStore()
|
|
const app = await store.ensureApp()
|
|
expect(store.clientId).to.eql('test-id')
|
|
expect(store.clientSecret).to.eql('test-secret')
|
|
expect(app.clientId).to.eql('test-id')
|
|
expect(app.clientSecret).to.eql('test-secret')
|
|
})
|
|
|
|
test('it should not create an app if it exists', async ({ worker }) => {
|
|
worker.use(
|
|
http.post(`${testServer}/api/v1/apps`, () => {
|
|
return HttpResponse.text('Should not call this API', { status: 400 })
|
|
}),
|
|
)
|
|
|
|
|
|
const store = useOAuthStore()
|
|
store.clientId = 'another-id'
|
|
store.clientSecret = 'another-secret'
|
|
|
|
const app = await store.ensureApp()
|
|
expect(store.clientId).to.eql('another-id')
|
|
expect(store.clientSecret).to.eql('another-secret')
|
|
expect(app.clientId).to.eql('another-id')
|
|
expect(app.clientSecret).to.eql('another-secret')
|
|
})
|
|
})
|
|
|
|
describe('getAppToken', () => {
|
|
test('it should get app token and set it in state', async () => {
|
|
const store = useOAuthStore()
|
|
store.clientId = 'test-id'
|
|
store.clientSecret = 'test-secret'
|
|
|
|
const token = await store.getAppToken()
|
|
expect(token).to.eql('test-app-token')
|
|
expect(store.appToken).to.eql('test-app-token')
|
|
})
|
|
|
|
test('it should throw and not set state if it cannot get app token', async () => {
|
|
const store = useOAuthStore()
|
|
store.clientId = 'bad-id'
|
|
store.clientSecret = 'bad-secret'
|
|
|
|
await expect(store.getAppToken()).rejects.toThrowError('400')
|
|
expect(store.appToken).to.eql(false)
|
|
})
|
|
})
|
|
|
|
describe('ensureAppToken', () => {
|
|
test('it should work if the state is empty', async () => {
|
|
const store = useOAuthStore()
|
|
const token = await store.ensureAppToken()
|
|
expect(token).to.eql('test-app-token')
|
|
expect(store.appToken).to.eql('test-app-token')
|
|
})
|
|
|
|
test('it should work if we already have a working token', async () => {
|
|
const store = useOAuthStore()
|
|
store.appToken = 'also-good-app-token'
|
|
|
|
const token = await store.ensureAppToken()
|
|
expect(token).to.eql('also-good-app-token')
|
|
expect(store.appToken).to.eql('also-good-app-token')
|
|
})
|
|
|
|
test('it should work if we have a bad token but good app credentials', async ({
|
|
worker,
|
|
}) => {
|
|
worker.use(
|
|
http.post(`${testServer}/api/v1/apps`, () => {
|
|
return HttpResponse.text('Should not call this API', { status: 400 })
|
|
}),
|
|
)
|
|
const store = useOAuthStore()
|
|
store.appToken = 'bad-app-token'
|
|
store.clientId = 'test-id'
|
|
store.clientSecret = 'test-secret'
|
|
|
|
const token = await store.ensureAppToken()
|
|
expect(token).to.eql('test-app-token')
|
|
expect(store.appToken).to.eql('test-app-token')
|
|
})
|
|
|
|
test('it should work if we have no token but good app credentials', async ({
|
|
worker,
|
|
}) => {
|
|
worker.use(
|
|
http.post(`${testServer}/api/v1/apps`, () => {
|
|
return HttpResponse.text('Should not call this API', { status: 400 })
|
|
}),
|
|
)
|
|
const store = useOAuthStore()
|
|
store.clientId = 'test-id'
|
|
store.clientSecret = 'test-secret'
|
|
|
|
const token = await store.ensureAppToken()
|
|
expect(token).to.eql('test-app-token')
|
|
expect(store.appToken).to.eql('test-app-token')
|
|
})
|
|
|
|
test('it should work if we have no token and bad app credentials', async () => {
|
|
const store = useOAuthStore()
|
|
store.clientId = 'bad-id'
|
|
store.clientSecret = 'bad-secret'
|
|
|
|
const token = await store.ensureAppToken()
|
|
expect(token).to.eql('test-app-token')
|
|
expect(store.appToken).to.eql('test-app-token')
|
|
expect(store.clientId).to.eql('test-id')
|
|
expect(store.clientSecret).to.eql('test-secret')
|
|
})
|
|
|
|
test('it should work if we have bad token and bad app credentials', async () => {
|
|
const store = useOAuthStore()
|
|
store.appToken = 'bad-app-token'
|
|
store.clientId = 'bad-id'
|
|
store.clientSecret = 'bad-secret'
|
|
|
|
const token = await store.ensureAppToken()
|
|
expect(token).to.eql('test-app-token')
|
|
expect(store.appToken).to.eql('test-app-token')
|
|
expect(store.clientId).to.eql('test-id')
|
|
expect(store.clientSecret).to.eql('test-secret')
|
|
})
|
|
|
|
test('it should throw if we cannot create an app', async ({ worker }) => {
|
|
worker.use(
|
|
http.post(`${testServer}/api/v1/apps`, () => {
|
|
return HttpResponse.text('Throttled', { status: 429 })
|
|
}),
|
|
)
|
|
|
|
const store = useOAuthStore()
|
|
await expect(store.ensureAppToken()).rejects.toThrowError('Throttled')
|
|
})
|
|
|
|
test('it should throw if we cannot obtain app token', async ({ worker }) => {
|
|
worker.use(
|
|
http.post(`${testServer}/oauth/token`, () => {
|
|
return HttpResponse.text('Throttled', { status: 429 })
|
|
}),
|
|
)
|
|
|
|
const store = useOAuthStore()
|
|
await expect(store.ensureAppToken()).rejects.toThrowError('Throttled')
|
|
})
|
|
})
|
|
})
|