2024-04-29 00:17:15 +02:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2021-11-19 15:24:54 +01:00
|
|
|
describe AgentConnect::AgentController, type: :controller do
|
2022-04-11 13:11:04 +02:00
|
|
|
describe '#login' do
|
2022-04-11 14:33:40 +02:00
|
|
|
let(:uri) { 'https://agent-connect.fr' }
|
|
|
|
let(:state) { 'state' }
|
|
|
|
let(:nonce) { 'nonce' }
|
|
|
|
|
|
|
|
before do
|
|
|
|
expect(AgentConnectService).to receive(:authorization_uri).and_return([uri, state, nonce])
|
|
|
|
get :login
|
|
|
|
end
|
2022-04-11 13:11:04 +02:00
|
|
|
|
2022-04-11 13:11:54 +02:00
|
|
|
it do
|
2022-04-11 14:33:40 +02:00
|
|
|
expect(state_cookie).to eq(state)
|
|
|
|
expect(nonce_cookie).to eq(nonce)
|
|
|
|
expect(response).to redirect_to(uri)
|
2022-04-11 13:11:54 +02:00
|
|
|
end
|
2022-04-11 13:11:04 +02:00
|
|
|
end
|
|
|
|
|
2021-11-19 15:24:54 +01:00
|
|
|
describe '#callback' do
|
|
|
|
let(:email) { 'i@email.com' }
|
2022-04-11 13:11:04 +02:00
|
|
|
let(:original_state) { 'original_state' }
|
2022-04-11 13:11:54 +02:00
|
|
|
let(:nonce) { 'nonce' }
|
2024-03-18 10:35:41 +01:00
|
|
|
let(:id_token) { 'id_token' }
|
2022-04-11 13:11:04 +02:00
|
|
|
subject { get :callback, params: { code: code, state: state } }
|
|
|
|
|
2022-04-11 13:11:54 +02:00
|
|
|
before do
|
|
|
|
cookies.encrypted[controller.class::STATE_COOKIE_NAME] = original_state
|
|
|
|
cookies.encrypted[controller.class::NONCE_COOKIE_NAME] = nonce
|
|
|
|
end
|
2021-11-19 15:24:54 +01:00
|
|
|
|
|
|
|
context 'when the callback code is correct' do
|
|
|
|
let(:code) { 'correct' }
|
2022-04-11 13:11:04 +02:00
|
|
|
let(:state) { original_state }
|
2023-12-12 14:23:42 +01:00
|
|
|
let(:user_info) { { 'sub' => 'sub', 'email' => ' I@email.com', 'given_name' => 'given', 'usual_name' => 'usual' } }
|
2021-11-19 15:24:54 +01:00
|
|
|
|
|
|
|
context 'and user_info returns some info' do
|
|
|
|
before do
|
2024-03-18 10:35:41 +01:00
|
|
|
expect(AgentConnectService).to receive(:user_info).with(code, nonce).and_return([user_info, id_token])
|
2021-11-19 15:24:54 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'and the instructeur does not have an account yet' do
|
|
|
|
before do
|
|
|
|
expect(controller).to receive(:sign_in)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates the user, signs in and redirects to procedure_path' do
|
|
|
|
expect { subject }.to change { User.count }.by(1).and change { Instructeur.count }.by(1)
|
|
|
|
|
|
|
|
last_user = User.last
|
|
|
|
|
|
|
|
expect(last_user.email).to eq(email)
|
|
|
|
expect(last_user.confirmed_at).to be_present
|
2024-03-18 10:35:41 +01:00
|
|
|
expect(last_user.instructeur.agent_connect_id_token).to eq('id_token')
|
2021-11-19 15:24:54 +01:00
|
|
|
expect(response).to redirect_to(instructeur_procedures_path)
|
2022-04-11 13:11:04 +02:00
|
|
|
expect(state_cookie).to be_nil
|
2022-04-11 13:11:54 +02:00
|
|
|
expect(nonce_cookie).to be_nil
|
2021-11-19 15:24:54 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'and the instructeur already has an account' do
|
|
|
|
let!(:instructeur) { create(:instructeur, email: email) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
expect(controller).to receive(:sign_in)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'reuses the account, signs in and redirects to procedure_path' do
|
|
|
|
expect { subject }.to change { User.count }.by(0).and change { Instructeur.count }.by(0)
|
|
|
|
|
|
|
|
instructeur.reload
|
|
|
|
|
2024-03-18 10:35:41 +01:00
|
|
|
expect(instructeur.agent_connect_id_token).to eq('id_token')
|
2021-11-19 15:24:54 +01:00
|
|
|
expect(response).to redirect_to(instructeur_procedures_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'and the instructeur already has an account as a user' do
|
|
|
|
let!(:user) { create(:user, email: email) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
expect(controller).to receive(:sign_in)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'reuses the account, signs in and redirects to procedure_path' do
|
|
|
|
expect { subject }.to change { User.count }.by(0).and change { Instructeur.count }.by(1)
|
|
|
|
|
|
|
|
instructeur = user.reload.instructeur
|
|
|
|
|
2024-03-18 10:35:41 +01:00
|
|
|
expect(instructeur.agent_connect_id_token).to eq('id_token')
|
2021-11-19 15:24:54 +01:00
|
|
|
expect(response).to redirect_to(instructeur_procedures_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2024-03-19 14:57:19 +01:00
|
|
|
context 'when the instructeur connects two times with the same domain' do
|
|
|
|
before do
|
|
|
|
expect(AgentConnectService).to receive(:user_info).with(code, nonce).and_return([user_info, id_token]).twice
|
|
|
|
expect(controller).to receive(:sign_in).twice
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates another agent_connect_information' do
|
|
|
|
get :callback, params: { code: code, state: state }
|
|
|
|
get :callback, params: { code: code, state: state }
|
|
|
|
|
|
|
|
expect(Instructeur.last.agent_connect_information.count).to eq(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the instructeur connects two times with different domains' do
|
|
|
|
before do
|
|
|
|
expect(controller).to receive(:sign_in).twice
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates another agent_connect_information' do
|
|
|
|
expect(AgentConnectService).to receive(:user_info).with(code, nonce).and_return([user_info, id_token])
|
|
|
|
get :callback, params: { code: code, state: state }
|
|
|
|
|
|
|
|
expect(AgentConnectService).to receive(:user_info).with(code, nonce).and_return([user_info.merge('sub' => 'sub2'), id_token])
|
|
|
|
get :callback, params: { code: code, state: state }
|
|
|
|
|
|
|
|
expect(Instructeur.last.agent_connect_information.pluck(:sub)).to match_array(['sub', 'sub2'])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-11-19 15:24:54 +01:00
|
|
|
context 'but user_info raises and error' do
|
|
|
|
before do
|
|
|
|
expect(AgentConnectService).to receive(:user_info).and_raise(Rack::OAuth2::Client::Error.new(500, error: 'Unknown'))
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'aborts the processus' do
|
|
|
|
expect { subject }.to change { User.count }.by(0).and change { Instructeur.count }.by(0)
|
|
|
|
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-04-11 13:11:04 +02:00
|
|
|
context 'when the callback state is not the original' do
|
|
|
|
let(:code) { 'correct' }
|
|
|
|
let(:state) { 'another state' }
|
|
|
|
|
|
|
|
before { subject }
|
|
|
|
|
|
|
|
it 'aborts the processus' do
|
|
|
|
expect { subject }.to change { User.count }.by(0).and change { Instructeur.count }.by(0)
|
|
|
|
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-11-19 15:24:54 +01:00
|
|
|
context 'when the callback code is blank' do
|
|
|
|
let(:code) { '' }
|
2022-04-11 13:11:04 +02:00
|
|
|
let(:state) { original_state }
|
2021-11-19 15:24:54 +01:00
|
|
|
|
|
|
|
it 'aborts the processus' do
|
|
|
|
expect { subject }.to change { User.count }.by(0).and change { Instructeur.count }.by(0)
|
|
|
|
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2022-04-11 13:11:04 +02:00
|
|
|
|
|
|
|
def state_cookie
|
|
|
|
cookies.encrypted[controller.class::STATE_COOKIE_NAME]
|
|
|
|
end
|
2022-04-11 13:11:54 +02:00
|
|
|
|
|
|
|
def nonce_cookie
|
|
|
|
cookies.encrypted[controller.class::NONCE_COOKIE_NAME]
|
|
|
|
end
|
2021-11-19 15:24:54 +01:00
|
|
|
end
|