Revert r16046.
DO NOT COMMIT MAJOR ENHANCEMENTS TO TRUNK WITHOUT TALKING TO ME FIRST.
This commit is contained in:
parent
7551e8a0c1
commit
f4571eeb7c
85 changed files with 9 additions and 3278 deletions
|
@ -1,17 +0,0 @@
|
|||
require File.dirname(__FILE__) + '/../test_helper'
|
||||
|
||||
class ClientApplicationTest < ActiveSupport::TestCase
|
||||
api_fixtures
|
||||
|
||||
##
|
||||
# test that tokens can't be found unless they're authorised
|
||||
def test_find_token
|
||||
tok = client_applications(:oauth_web_app).create_request_token
|
||||
assert_equal false, tok.authorized?, "Token should be created unauthorised."
|
||||
assert_equal nil, ClientApplication.find_token(tok.token), "Shouldn't be able to find unauthorised token"
|
||||
tok.authorize!(users(:public_user))
|
||||
assert_equal true, tok.authorized?, "Token should now be authorised."
|
||||
assert_not_equal nil, ClientApplication.find_token(tok.token), "Should be able to find authorised token"
|
||||
end
|
||||
|
||||
end
|
|
@ -1,20 +0,0 @@
|
|||
require File.dirname(__FILE__) + '/../test_helper'
|
||||
|
||||
class OauthNonceTest < ActiveSupport::TestCase
|
||||
api_fixtures
|
||||
|
||||
##
|
||||
# the nonce has only one property, that it is a unique pair of
|
||||
# string and timestamp.
|
||||
def test_nonce_uniqueness
|
||||
string = "0123456789ABCDEF"
|
||||
timestamp = Time.now
|
||||
|
||||
nonce1 = OauthNonce.remember(string, timestamp)
|
||||
assert_not_equal false, nonce1, "First nonce should be unique. Check your test database is empty."
|
||||
|
||||
nonce2 = OauthNonce.remember(string, timestamp)
|
||||
assert_equal false, nonce2, "Shouldn't be able to remember the same nonce twice."
|
||||
end
|
||||
|
||||
end
|
|
@ -1,26 +0,0 @@
|
|||
require File.dirname(__FILE__) + '/../test_helper'
|
||||
|
||||
class OauthTokenTest < ActiveSupport::TestCase
|
||||
api_fixtures
|
||||
|
||||
##
|
||||
# check that after calling invalidate! on a token, it is invalid.
|
||||
def test_token_invalidation
|
||||
tok = OauthToken.new
|
||||
assert_equal false, tok.invalidated?, "Token should be created valid."
|
||||
tok.invalidate!
|
||||
assert_equal true, tok.invalidated?, "Token should now be invalid."
|
||||
end
|
||||
|
||||
##
|
||||
# check that an authorized token is authorised and can be invalidated
|
||||
def test_token_authorisation
|
||||
tok = RequestToken.create :client_application => client_applications(:oauth_web_app)
|
||||
assert_equal false, tok.authorized?, "Token should be created unauthorised."
|
||||
tok.authorize!(users(:public_user))
|
||||
assert_equal true, tok.authorized?, "Token should now be authorised."
|
||||
tok.invalidate!
|
||||
assert_equal false, tok.authorized?, "Token should now be invalid."
|
||||
end
|
||||
|
||||
end
|
Loading…
Add table
Add a link
Reference in a new issue