Skip to content

Commit 93b2d41

Browse files
committed
Fix broken tests due to them using query string instead of form body
1 parent c1e95e9 commit 93b2d41

File tree

8 files changed

+93
-85
lines changed

8 files changed

+93
-85
lines changed

spec/requests/endpoints/token_spec.rb

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
end
1414

1515
it "respond with correct headers" do
16-
post token_endpoint_url(code: @authorization.token, client: @client)
16+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client)
1717

1818
expect(headers["Cache-Control"]).to be_in(["no-store", "no-cache, no-store", "private, no-store"])
1919
expect(headers["Content-Type"]).to eq("application/json; charset=utf-8")
@@ -22,10 +22,10 @@
2222

2323
it "accepts client credentials with basic auth header" do
2424
post token_endpoint_url,
25-
params: {
25+
params: token_endpoint_params(
2626
code: @authorization.token,
2727
redirect_uri: @client.redirect_uri,
28-
},
28+
),
2929
headers: { "HTTP_AUTHORIZATION" => basic_auth_header_for_client(@client) }
3030

3131
expect(json_response).to include("access_token" => Doorkeeper::AccessToken.first.token)
@@ -34,14 +34,14 @@
3434
it "returns null for expires_in when a permanent token is set" do
3535
config_is_set(:access_token_expires_in, nil)
3636

37-
post token_endpoint_url(code: @authorization.token, client: @client)
37+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client)
3838

3939
expect(json_response).to include("access_token" => Doorkeeper::AccessToken.first.token)
4040
expect(json_response).not_to include("expires_in")
4141
end
4242

4343
it "returns unsupported_grant_type for invalid grant_type param" do
44-
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: "nothing")
44+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client, grant_type: "nothing")
4545

4646
expect(json_response).to match(
4747
"error" => "unsupported_grant_type",
@@ -51,7 +51,7 @@
5151

5252
it "returns unsupported_grant_type for disabled grant flows" do
5353
config_is_set(:grant_flows, ["implicit"])
54-
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: "authorization_code")
54+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client, grant_type: "authorization_code")
5555

5656
expect(json_response).to match(
5757
"error" => "unsupported_grant_type",
@@ -60,7 +60,7 @@
6060
end
6161

6262
it "returns unsupported_grant_type when refresh_token is not in use" do
63-
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: "refresh_token")
63+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client, grant_type: "refresh_token")
6464

6565
expect(json_response).to match(
6666
"error" => "unsupported_grant_type",
@@ -69,7 +69,7 @@
6969
end
7070

7171
it "returns invalid_request if grant_type is missing" do
72-
post token_endpoint_url(code: @authorization.token, client: @client, grant_type: "")
72+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client, grant_type: "")
7373

7474
expect(json_response).to match(
7575
"error" => "invalid_request",

spec/requests/flows/authorization_code_errors_spec.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,11 @@
6060

6161
it "returns :invalid_grant error when posting an already revoked grant code" do
6262
# First successful request
63-
post token_endpoint_url(code: @authorization.token, client: @client)
63+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client)
6464

6565
# Second attempt with same token
6666
expect do
67-
post token_endpoint_url(code: @authorization.token, client: @client)
67+
post token_endpoint_url, params: token_endpoint_params(code: @authorization.token, client: @client)
6868
end.not_to(change { Doorkeeper::AccessToken.count })
6969

7070
expect(json_response).to match(
@@ -74,7 +74,7 @@
7474
end
7575

7676
it "returns :invalid_grant error for invalid grant code" do
77-
post token_endpoint_url(code: "invalid", client: @client)
77+
post token_endpoint_url, params: token_endpoint_params(code: "invalid", client: @client)
7878

7979
access_token_should_not_exist
8080

spec/requests/flows/authorization_code_spec.rb

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ def authorize(redirect_url)
155155
click_on "Authorize"
156156

157157
authorization_code = Doorkeeper::AccessGrant.first.token
158-
page.driver.post token_endpoint_url(
158+
page.driver.post token_endpoint_url, token_endpoint_params(
159159
code: authorization_code,
160160
client_id: @client.uid,
161161
redirect_uri: @client.redirect_uri,
@@ -174,7 +174,7 @@ def authorize(redirect_url)
174174
click_on "Authorize"
175175

176176
authorization_code = Doorkeeper::AccessGrant.first.token
177-
page.driver.post token_endpoint_url(
177+
page.driver.post token_endpoint_url, token_endpoint_params(
178178
code: authorization_code,
179179
client_secret: @client.secret,
180180
redirect_uri: @client.redirect_uri,
@@ -334,7 +334,7 @@ def authorize(redirect_url)
334334
click_on "Authorize"
335335

336336
authorization_code = current_params["code"]
337-
page.driver.post token_endpoint_url(
337+
page.driver.post token_endpoint_url, token_endpoint_params(
338338
code: authorization_code,
339339
client_id: @client.uid,
340340
redirect_uri: @client.redirect_uri,
@@ -353,7 +353,7 @@ def authorize(redirect_url)
353353
click_on "Authorize"
354354

355355
authorization_code = current_params["code"]
356-
page.driver.post token_endpoint_url(
356+
page.driver.post token_endpoint_url, token_endpoint_params(
357357
code: authorization_code,
358358
client_id: @client.uid,
359359
redirect_uri: @client.redirect_uri,
@@ -413,7 +413,7 @@ def authorize(redirect_url)
413413
click_on "Authorize"
414414

415415
authorization_code = current_params["code"]
416-
page.driver.post token_endpoint_url(
416+
page.driver.post token_endpoint_url, token_endpoint_params(
417417
code: authorization_code,
418418
client: @client,
419419
code_verifier: code_challenge,
@@ -543,7 +543,7 @@ def authorize(redirect_url)
543543
allow_any_instance_of(Doorkeeper::AccessGrant)
544544
.to receive(:revoked?).and_return(false, true)
545545

546-
page.driver.post token_endpoint_url(code: authorization_code, client: @client)
546+
page.driver.post token_endpoint_url, token_endpoint_params(code: authorization_code, client: @client)
547547

548548
expect(json_response).to match(
549549
"error" => "invalid_grant",
@@ -573,7 +573,7 @@ def authorize(redirect_url)
573573
end
574574

575575
it "copies custom attributes from the grant into the token" do
576-
page.driver.post token_endpoint_url(code: grant.token, client: client)
576+
page.driver.post token_endpoint_url, token_endpoint_params(code: grant.token, client: client)
577577

578578
access_token = Doorkeeper::AccessToken.find_by(token: json_response["access_token"])
579579
expect(access_token.tenant_name).to eq("Tenant 1")

spec/requests/flows/client_credentials_spec.rb

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
headers = authorization client.uid, client.secret
1111
params = { grant_type: "client_credentials" }
1212

13-
post "/oauth/token", params: params, headers: headers
13+
post token_endpoint_url, params: params, headers: headers
1414

1515
expect(json_response).to match(
1616
"access_token" => Doorkeeper::AccessToken.first.token,
@@ -30,7 +30,7 @@
3030
headers = authorization client.uid, client.secret
3131
params = { grant_type: "client_credentials", scope: "write" }
3232

33-
post "/oauth/token", params: params, headers: headers
33+
post token_endpoint_url, params: params, headers: headers
3434

3535
expect(json_response).to include(
3636
"access_token" => Doorkeeper::AccessToken.first.token,
@@ -43,7 +43,7 @@
4343
headers = authorization client.uid, client.secret
4444
params = { grant_type: "client_credentials", scope: "public" }
4545

46-
post "/oauth/token", params: params, headers: headers
46+
post token_endpoint_url, params: params, headers: headers
4747

4848
expect(json_response).to include(
4949
"access_token" => Doorkeeper::AccessToken.first.token,
@@ -57,7 +57,7 @@
5757
headers = authorization client.uid, client.secret
5858
params = { grant_type: "client_credentials", scope: "random" }
5959

60-
post "/oauth/token", params: params, headers: headers
60+
post token_endpoint_url, params: params, headers: headers
6161

6262
expect(response.status).to eq(400)
6363
expect(json_response).to match(
@@ -83,7 +83,7 @@
8383
headers = authorization client.uid, client.secret
8484
params = { grant_type: "client_credentials" }
8585

86-
post "/oauth/token", params: params, headers: headers
86+
post token_endpoint_url, params: params, headers: headers
8787

8888
expect(json_response).to match(
8989
"error" => "unauthorized_client",
@@ -97,7 +97,7 @@
9797
headers = authorization client.uid, client.secret
9898
params = { grant_type: "client_credentials" }
9999

100-
post "/oauth/token", params: params, headers: headers
100+
post token_endpoint_url, params: params, headers: headers
101101

102102
expect(json_response).to match(
103103
"access_token" => Doorkeeper::AccessToken.first.token,
@@ -120,7 +120,7 @@
120120
params = { grant_type: "client_credentials" }
121121

122122
expect do
123-
post "/oauth/token", params: params, headers: headers
123+
post token_endpoint_url, params: params, headers: headers
124124
end.to change { Doorkeeper::AccessToken.count }.by(1)
125125

126126
token = Doorkeeper::AccessToken.first
@@ -139,7 +139,7 @@
139139
params = { grant_type: "client_credentials" }
140140

141141
expect do
142-
post "/oauth/token", params: params, headers: headers
142+
post token_endpoint_url, params: params, headers: headers
143143
end.to change { Doorkeeper::AccessToken.count }.by(1)
144144

145145
token = Doorkeeper::AccessToken.first
@@ -157,7 +157,7 @@
157157
headers = authorization client.uid, client.secret
158158
params = { grant_type: "client_credentials" }
159159

160-
post "/oauth/token", params: params, headers: headers
160+
post token_endpoint_url, params: params, headers: headers
161161

162162
expect(json_response).to match(
163163
"error" => "invalid_scope",
@@ -171,7 +171,7 @@
171171
headers = {}
172172
params = { grant_type: "client_credentials" }
173173

174-
post "/oauth/token", params: params, headers: headers
174+
post token_endpoint_url, params: params, headers: headers
175175

176176
expect(response.status).to eq(401)
177177

@@ -192,12 +192,12 @@
192192
headers = authorization client.uid, client.secret
193193
params = { grant_type: "client_credentials" }
194194

195-
post "/oauth/token", params: params, headers: headers
195+
post token_endpoint_url, params: params, headers: headers
196196
expect(json_response).to include("access_token" => Doorkeeper::AccessToken.first.token)
197197

198198
token = Doorkeeper::AccessToken.first
199199

200-
post "/oauth/token", params: params, headers: headers
200+
post token_endpoint_url, params: params, headers: headers
201201
expect(json_response).to include("access_token" => Doorkeeper::AccessToken.last.token)
202202

203203
expect(token.reload).to be_revoked
@@ -216,7 +216,7 @@
216216
headers = authorization client.uid, client.secret
217217
params = { grant_type: "client_credentials" }
218218

219-
post "/oauth/token", params: params, headers: headers
219+
post token_endpoint_url, params: params, headers: headers
220220

221221
expect(json_response).to match(
222222
"error" => "invalid_token_reuse",

0 commit comments

Comments
 (0)