Sha256: 1e54150b67ca99da39602502b7b98f7199269ab08f9a03e6998fd75575a550db
Contents?: true
Size: 1.73 KB
Versions: 4
Compression:
Stored size: 1.73 KB
Contents
RSpec.describe Qa::Configuration do subject { described_class.new } it { is_expected.to respond_to(:cors_headers?) } it { is_expected.to respond_to(:enable_cors_headers) } it { is_expected.to respond_to(:disable_cors_headers) } it { is_expected.to respond_to(:authorized_reload_token=) } it { is_expected.to respond_to(:authorized_reload_token) } it { is_expected.to respond_to(:valid_authority_reload_token?) } describe '#enable_cors_headers' do it 'turns on cors headers support' do subject.enable_cors_headers expect(subject.cors_headers?).to be true end end describe '#disable_cors_headers' do it 'turns off cors headers support' do subject.disable_cors_headers expect(subject.cors_headers?).to be false end end describe '#valid_authority_reload_token?' do it 'defaults to invalid' do expect(subject.valid_authority_reload_token?('any value')).to be false end context 'when token is set to blank' do before do subject.authorized_reload_token = '' end it 'returns false if token matches' do expect(subject.valid_authority_reload_token?('')).to be false end it "returns false if token doesn't match" do expect(subject.valid_authority_reload_token?('any value')).to be false end end context 'when token has a value' do before do subject.authorized_reload_token = 'A_TOKEN' end it 'returns true if the passed in token matches' do expect(subject.valid_authority_reload_token?('A_TOKEN')).to be true end it 'returns false if the passed in token does not match' do expect(subject.valid_authority_reload_token?('BAD TOKEN')).to be false end end end end
Version data entries
4 entries across 4 versions & 1 rubygems
Version | Path |
---|---|
qa-3.1.0 | spec/lib/configuration_spec.rb |
qa-2.3.0 | spec/lib/configuration_spec.rb |
qa-3.0.0 | spec/lib/configuration_spec.rb |
qa-2.2.0 | spec/lib/configuration_spec.rb |