Extract shared examples from api specs (#25387)
parent
ae2790d84f
commit
4c5f62de99
|
@ -13,14 +13,6 @@ RSpec.describe Api::V1::AccountsController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'POST #create' do
|
describe 'POST #create' do
|
||||||
let(:app) { Fabricate(:application) }
|
let(:app) { Fabricate(:application) }
|
||||||
let(:token) { Doorkeeper::AccessToken.find_or_create_for(application: app, resource_owner: nil, scopes: 'read write', use_refresh_token: false) }
|
let(:token) { Doorkeeper::AccessToken.find_or_create_for(application: app, resource_owner: nil, scopes: 'read write', use_refresh_token: false) }
|
||||||
|
|
|
@ -15,22 +15,6 @@ RSpec.describe Api::V1::Admin::AccountActionsController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'POST #create' do
|
describe 'POST #create' do
|
||||||
context 'with type of disable' do
|
context 'with type of disable' do
|
||||||
before do
|
before do
|
||||||
|
|
|
@ -15,22 +15,6 @@ RSpec.describe Api::V1::Admin::AccountsController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET #index' do
|
describe 'GET #index' do
|
||||||
let!(:remote_account) { Fabricate(:account, domain: 'example.org') }
|
let!(:remote_account) { Fabricate(:account, domain: 'example.org') }
|
||||||
let!(:other_remote_account) { Fabricate(:account, domain: 'foo.bar') }
|
let!(:other_remote_account) { Fabricate(:account, domain: 'foo.bar') }
|
||||||
|
|
|
@ -16,22 +16,6 @@ describe Api::V1::Admin::Trends::Links::PreviewCardProvidersController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET #index' do
|
describe 'GET #index' do
|
||||||
it 'returns http success' do
|
it 'returns http success' do
|
||||||
get :index, params: { account_id: account.id, limit: 2 }
|
get :index, params: { account_id: account.id, limit: 2 }
|
||||||
|
|
|
@ -16,22 +16,6 @@ describe Api::V1::Admin::Trends::LinksController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET #index' do
|
describe 'GET #index' do
|
||||||
it 'returns http success' do
|
it 'returns http success' do
|
||||||
get :index, params: { account_id: account.id, limit: 2 }
|
get :index, params: { account_id: account.id, limit: 2 }
|
||||||
|
|
|
@ -16,22 +16,6 @@ describe Api::V1::Admin::Trends::StatusesController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET #index' do
|
describe 'GET #index' do
|
||||||
it 'returns http success' do
|
it 'returns http success' do
|
||||||
get :index, params: { account_id: account.id, limit: 2 }
|
get :index, params: { account_id: account.id, limit: 2 }
|
||||||
|
|
|
@ -16,22 +16,6 @@ describe Api::V1::Admin::Trends::TagsController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET #index' do
|
describe 'GET #index' do
|
||||||
it 'returns http success' do
|
it 'returns http success' do
|
||||||
get :index, params: { account_id: account.id, limit: 2 }
|
get :index, params: { account_id: account.id, limit: 2 }
|
||||||
|
|
|
@ -13,14 +13,6 @@ RSpec.describe Api::V1::DomainBlocksController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET #show' do
|
describe 'GET #show' do
|
||||||
let(:scopes) { 'read:blocks' }
|
let(:scopes) { 'read:blocks' }
|
||||||
|
|
||||||
|
|
|
@ -15,22 +15,6 @@ RSpec.describe Api::V2::Admin::AccountsController do
|
||||||
allow(controller).to receive(:doorkeeper_token) { token }
|
allow(controller).to receive(:doorkeeper_token) { token }
|
||||||
end
|
end
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET #index' do
|
describe 'GET #index' do
|
||||||
let!(:remote_account) { Fabricate(:account, domain: 'example.org') }
|
let!(:remote_account) { Fabricate(:account, domain: 'example.org') }
|
||||||
let!(:other_remote_account) { Fabricate(:account, domain: 'foo.bar') }
|
let!(:other_remote_account) { Fabricate(:account, domain: 'foo.bar') }
|
||||||
|
|
|
@ -9,26 +9,6 @@ RSpec.describe 'Canonical Email Blocks' do
|
||||||
let(:scopes) { 'admin:read:canonical_email_blocks admin:write:canonical_email_blocks' }
|
let(:scopes) { 'admin:read:canonical_email_blocks admin:write:canonical_email_blocks' }
|
||||||
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET /api/v1/admin/canonical_email_blocks' do
|
describe 'GET /api/v1/admin/canonical_email_blocks' do
|
||||||
subject do
|
subject do
|
||||||
get '/api/v1/admin/canonical_email_blocks', headers: headers, params: params
|
get '/api/v1/admin/canonical_email_blocks', headers: headers, params: params
|
||||||
|
|
|
@ -9,26 +9,6 @@ RSpec.describe 'Domain Allows' do
|
||||||
let(:token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, scopes: scopes) }
|
let(:token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, scopes: scopes) }
|
||||||
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET /api/v1/admin/domain_allows' do
|
describe 'GET /api/v1/admin/domain_allows' do
|
||||||
subject do
|
subject do
|
||||||
get '/api/v1/admin/domain_allows', headers: headers, params: params
|
get '/api/v1/admin/domain_allows', headers: headers, params: params
|
||||||
|
|
|
@ -9,26 +9,6 @@ RSpec.describe 'Domain Blocks' do
|
||||||
let(:token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, scopes: scopes) }
|
let(:token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, scopes: scopes) }
|
||||||
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET /api/v1/admin/domain_blocks' do
|
describe 'GET /api/v1/admin/domain_blocks' do
|
||||||
subject do
|
subject do
|
||||||
get '/api/v1/admin/domain_blocks', headers: headers, params: params
|
get '/api/v1/admin/domain_blocks', headers: headers, params: params
|
||||||
|
|
|
@ -10,26 +10,6 @@ RSpec.describe 'Email Domain Blocks' do
|
||||||
let(:scopes) { 'admin:read:email_domain_blocks admin:write:email_domain_blocks' }
|
let(:scopes) { 'admin:read:email_domain_blocks admin:write:email_domain_blocks' }
|
||||||
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET /api/v1/admin/email_domain_blocks' do
|
describe 'GET /api/v1/admin/email_domain_blocks' do
|
||||||
subject do
|
subject do
|
||||||
get '/api/v1/admin/email_domain_blocks', headers: headers, params: params
|
get '/api/v1/admin/email_domain_blocks', headers: headers, params: params
|
||||||
|
|
|
@ -9,26 +9,6 @@ RSpec.describe 'IP Blocks' do
|
||||||
let(:scopes) { 'admin:read:ip_blocks admin:write:ip_blocks' }
|
let(:scopes) { 'admin:read:ip_blocks admin:write:ip_blocks' }
|
||||||
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET /api/v1/admin/ip_blocks' do
|
describe 'GET /api/v1/admin/ip_blocks' do
|
||||||
subject do
|
subject do
|
||||||
get '/api/v1/admin/ip_blocks', headers: headers, params: params
|
get '/api/v1/admin/ip_blocks', headers: headers, params: params
|
||||||
|
|
|
@ -9,26 +9,6 @@ RSpec.describe 'Reports' do
|
||||||
let(:token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, scopes: scopes) }
|
let(:token) { Fabricate(:accessible_access_token, resource_owner_id: user.id, scopes: scopes) }
|
||||||
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong role' do |wrong_role|
|
|
||||||
let(:role) { UserRole.find_by(name: wrong_role) }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
subject
|
|
||||||
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET /api/v1/admin/reports' do
|
describe 'GET /api/v1/admin/reports' do
|
||||||
subject do
|
subject do
|
||||||
get '/api/v1/admin/reports', headers: headers, params: params
|
get '/api/v1/admin/reports', headers: headers, params: params
|
||||||
|
|
|
@ -8,14 +8,6 @@ RSpec.describe 'FeaturedTags' do
|
||||||
let(:scopes) { 'read:accounts write:accounts' }
|
let(:scopes) { 'read:accounts write:accounts' }
|
||||||
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
let(:headers) { { 'Authorization' => "Bearer #{token.token}" } }
|
||||||
|
|
||||||
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
|
||||||
let(:scopes) { wrong_scope }
|
|
||||||
|
|
||||||
it 'returns http forbidden' do
|
|
||||||
expect(response).to have_http_status(403)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
|
|
||||||
describe 'GET /api/v1/featured_tags' do
|
describe 'GET /api/v1/featured_tags' do
|
||||||
context 'with wrong scope' do
|
context 'with wrong scope' do
|
||||||
before do
|
before do
|
||||||
|
|
|
@ -0,0 +1,23 @@
|
||||||
|
# frozen_string_literal: true
|
||||||
|
|
||||||
|
shared_examples 'forbidden for wrong scope' do |wrong_scope|
|
||||||
|
let(:scopes) { wrong_scope }
|
||||||
|
|
||||||
|
it 'returns http forbidden' do
|
||||||
|
# Some examples have a subject which needs to be called to make a request
|
||||||
|
subject if request.nil?
|
||||||
|
|
||||||
|
expect(response).to have_http_status(403)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
shared_examples 'forbidden for wrong role' do |wrong_role|
|
||||||
|
let(:role) { UserRole.find_by(name: wrong_role) }
|
||||||
|
|
||||||
|
it 'returns http forbidden' do
|
||||||
|
# Some examples have a subject which needs to be called to make a request
|
||||||
|
subject if request.nil?
|
||||||
|
|
||||||
|
expect(response).to have_http_status(403)
|
||||||
|
end
|
||||||
|
end
|
Reference in New Issue