stoa_plugin_controller_test.rb
3.83 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
require File.dirname(__FILE__) + '/../../../../test/test_helper'
require File.dirname(__FILE__) + '/../../controllers/stoa_plugin_controller'
# Re-raise errors caught by the controller.
class StoaPluginController; def rescue_action(e) raise e end; end
class StoaPluginControllerTest < ActionController::TestCase
SALT=YAML::load(File.open(StoaPlugin.root_path + '/config.yml'))['salt']
def setup
@controller = StoaPluginController.new
@request = ActionController::TestRequest.new
@response = ActionController::TestResponse.new
ActiveRecord::Base.configurations['stoa'] = {:adapter => 'sqlite3', :database => ':memory:', :verbosity => 'quiet'}
env = Environment.default
env.enable_plugin(StoaPlugin.name)
env.enable('skip_new_user_email_confirmation')
env.save!
@user = create_user_full('real_user', {:password => '123456', :password_confirmation => '123456'}, {:usp_id => 9999999})
end
attr_accessor :user
should 'not authenticate if method not post' do
@request.stubs(:ssl?).returns(true)
get :authenticate, :login => user.login, :password => '123456'
assert_not_nil json_response['error']
assert_match /post method/,json_response['error']
end
should 'not authenticate if request is not using ssl' do
@request.stubs(:ssl?).returns(false)
post :authenticate, :login => user.login, :password => '123456'
assert_not_nil json_response['error']
assert_match /SSL/,json_response['error']
end
should 'not authenticate if method password is wrong' do
@request.stubs(:ssl?).returns(true)
post :authenticate, :login => user.login, :password => 'wrong_password'
assert_not_nil json_response['error']
assert_match /password/,json_response['error']
end
should 'authenticate if everything is right' do
@request.stubs(:ssl?).returns(true)
post :authenticate, :login => user.login, :password => '123456'
assert_nil json_response['error']
assert_equal user.login, json_response['username']
end
should 'check valid usp id' do
usp_id = '12345678'
StoaPlugin::UspUser.stubs(:exists?).with(usp_id).returns(true)
get :check_usp_id, :usp_id => usp_id
assert json_response['exists']
end
should 'check invalid usp id' do
usp_id = '87654321'
StoaPlugin::UspUser.stubs(:exists?).with(usp_id).returns(false)
get :check_usp_id, :usp_id => usp_id
assert !json_response['exists']
end
should 'check existent cpf' do
usp_id = '12345678'
user = mock
user.stubs(:cpf).returns('12345678')
StoaPlugin::UspUser.stubs(:find_by_codpes).with(usp_id).returns(user)
get :check_cpf, :usp_id => usp_id
assert json_response['exists']
end
should 'check not existent cpf' do
usp_id_with_cpf = '12345678'
user_with_cpf = mock
user_with_cpf.stubs(:cpf).returns('12345678')
StoaPlugin::UspUser.stubs(:find_by_codpes).with(usp_id_with_cpf).returns(user_with_cpf)
get :check_cpf, :usp_id => usp_id_with_cpf
usp_id_without_cpf = '87654321'
user_without_cpf = mock
user_with_cpf.stubs(:cpf).returns(nil)
StoaPlugin::UspUser.stubs(:find_by_codpes).with(usp_id_without_cpf).returns(user_without_cpf)
get :check_cpf, :usp_id => usp_id_without_cpf
assert !json_response['exists']
end
should 'authenticate with usp_id' do
@request.stubs(:ssl?).returns(true)
post :authenticate, :usp_id => user.person.usp_id.to_s, :password => '123456'
assert_nil json_response['error']
assert_equal user.login, json_response['username']
end
should 'not crash if usp_id is invalid' do
@request.stubs(:ssl?).returns(true)
assert_nothing_raised do
post :authenticate, :usp_id => 12321123, :password => '123456'
end
assert_not_nil json_response['error']
assert_match /user/,json_response['error']
end
private
def json_response
ActiveSupport::JSON.decode @response.body
end
end