62 lines
1.8 KiB
Ruby
62 lines
1.8 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
describe API::V2::BaseController, type: :controller do
|
|
describe 'ensure_authorized_network and token_is_not_expired' do
|
|
let(:admin) { administrateurs(:default_admin) }
|
|
let(:token_bearer_couple) { APIToken.generate(admin) }
|
|
let(:token) { token_bearer_couple[0] }
|
|
let(:bearer) { token_bearer_couple[1] }
|
|
let(:remote_ip) { '0.0.0.0' }
|
|
|
|
controller(API::V2::BaseController) { def fake_action = render(plain: 'Hello, World!') }
|
|
|
|
before do
|
|
routes.draw { get 'fake_action' => 'api/v2/base#fake_action' }
|
|
valid_headers = { 'Authorization' => "Bearer token=#{bearer}" }
|
|
request.headers.merge!(valid_headers)
|
|
request.remote_ip = remote_ip
|
|
end
|
|
|
|
describe 'GET #index' do
|
|
subject { get :fake_action }
|
|
|
|
context 'when no authorized networks are defined and the token is not expired' do
|
|
it { is_expected.to have_http_status(:ok) }
|
|
end
|
|
|
|
context 'when the token is expired' do
|
|
before do
|
|
token.update!(expires_at: 1.day.ago)
|
|
end
|
|
|
|
it { is_expected.to have_http_status(:unauthorized) }
|
|
end
|
|
|
|
context 'when this is precisely the day the token expires' do
|
|
before do
|
|
token.update!(expires_at: Time.zone.today)
|
|
end
|
|
|
|
it { is_expected.to have_http_status(:ok) }
|
|
end
|
|
|
|
context 'when a single authorized network is defined' do
|
|
before do
|
|
token.update!(authorized_networks: [IPAddr.new('192.168.1.0/24')])
|
|
end
|
|
|
|
context 'and the request comes from it' do
|
|
let(:remote_ip) { '192.168.1.23' }
|
|
|
|
it { is_expected.to have_http_status(:ok) }
|
|
end
|
|
|
|
context 'and the request does not come from it' do
|
|
let(:remote_ip) { '192.168.2.2' }
|
|
|
|
it { is_expected.to have_http_status(:forbidden) }
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|