2024-04-29 00:17:15 +02:00
|
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
2021-07-06 12:34:23 +02:00
|
|
|
|
RSpec.describe ApplicationController::ErrorHandling, type: :controller do
|
|
|
|
|
controller(ActionController::Base) do
|
|
|
|
|
include ApplicationController::ErrorHandling
|
|
|
|
|
|
|
|
|
|
def invalid_authenticity_token
|
|
|
|
|
raise ActionController::InvalidAuthenticityToken
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
before do
|
|
|
|
|
routes.draw { post 'invalid_authenticity_token' => 'anonymous#invalid_authenticity_token' }
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
describe 'handling ActionController::InvalidAuthenticityToken' do
|
|
|
|
|
let(:request_cookies) do
|
|
|
|
|
{ 'some_cookie': true }
|
|
|
|
|
end
|
|
|
|
|
|
2024-03-11 13:25:29 +01:00
|
|
|
|
before do
|
|
|
|
|
cookies.update(request_cookies)
|
|
|
|
|
allow(controller).to receive(:rand).and_return(0)
|
|
|
|
|
end
|
2021-07-06 12:34:23 +02:00
|
|
|
|
|
|
|
|
|
it 'logs the error' do
|
|
|
|
|
allow(Sentry).to receive(:capture_message)
|
|
|
|
|
post :invalid_authenticity_token rescue nil
|
|
|
|
|
expect(Sentry).to have_received(:capture_message)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
it 'forwards the error upwards' do
|
|
|
|
|
expect { post :invalid_authenticity_token }.to raise_error(ActionController::InvalidAuthenticityToken)
|
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
context 'when Safari retries a POST request without cookies' do
|
|
|
|
|
let(:request_cookies) do
|
|
|
|
|
{}
|
|
|
|
|
end
|
|
|
|
|
|
2021-07-06 16:04:52 +02:00
|
|
|
|
it 'doesn’t log the error' do
|
|
|
|
|
allow(Sentry).to receive(:capture_message)
|
|
|
|
|
post :invalid_authenticity_token rescue nil
|
|
|
|
|
expect(Sentry).not_to have_received(:capture_message)
|
2021-07-06 12:34:23 +02:00
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|
|
|
|
|
end
|