spec/googleauth/signet_spec.rb in googleauth-0.8.0 vs spec/googleauth/signet_spec.rb in googleauth-0.8.1

- old
+ new

@@ -25,78 +25,77 @@ # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. -spec_dir = File.expand_path(File.join(File.dirname(__FILE__))) -$LOAD_PATH.unshift(spec_dir) +spec_dir = File.expand_path File.join(File.dirname(__FILE__)) +$LOAD_PATH.unshift spec_dir $LOAD_PATH.uniq! -require 'apply_auth_examples' -require 'googleauth/signet' -require 'jwt' -require 'openssl' -require 'spec_helper' +require "apply_auth_examples" +require "googleauth/signet" +require "jwt" +require "openssl" +require "spec_helper" describe Signet::OAuth2::Client do - before(:example) do - @key = OpenSSL::PKey::RSA.new(2048) + before :example do + @key = OpenSSL::PKey::RSA.new 2048 @client = Signet::OAuth2::Client.new( - token_credential_uri: 'https://oauth2.googleapis.com/token', - scope: 'https://www.googleapis.com/auth/userinfo.profile', - issuer: 'app@example.com', - audience: 'https://oauth2.googleapis.com/token', - signing_key: @key + token_credential_uri: "https://oauth2.googleapis.com/token", + scope: "https://www.googleapis.com/auth/userinfo.profile", + issuer: "app@example.com", + audience: "https://oauth2.googleapis.com/token", + signing_key: @key ) end - def make_auth_stubs(opts) - access_token = opts[:access_token] || '' - body = MultiJson.dump('access_token' => access_token, - 'token_type' => 'Bearer', - 'expires_in' => 3600) + def make_auth_stubs opts + access_token = opts[:access_token] || "" + body = MultiJson.dump("access_token" => access_token, + "token_type" => "Bearer", + "expires_in" => 3600) blk = proc do |request| - params = Addressable::URI.form_unencode(request.body) - _claim, _header = JWT.decode(params.assoc('assertion').last, + params = Addressable::URI.form_unencode request.body + _claim, _header = JWT.decode(params.assoc("assertion").last, @key.public_key, true, - algorithm: 'RS256') + algorithm: "RS256") end - with_params = {body: hash_including( - "grant_type" => "urn:ietf:params:oauth:grant-type:jwt-bearer")} - if opts[:user_agent] - with_params[:headers] = {"User-Agent" => opts[:user_agent]} - end - stub_request(:post, 'https://oauth2.googleapis.com/token') + with_params = { body: hash_including( + "grant_type" => "urn:ietf:params:oauth:grant-type:jwt-bearer" + ) } + with_params[:headers] = { "User-Agent" => opts[:user_agent] } if opts[:user_agent] + stub_request(:post, "https://oauth2.googleapis.com/token") .with(with_params, &blk) - .to_return(body: body, - status: 200, - headers: { 'Content-Type' => 'application/json' }) + .to_return(body: body, + status: 200, + headers: { "Content-Type" => "application/json" }) end - it_behaves_like 'apply/apply! are OK' + it_behaves_like "apply/apply! are OK" describe "#configure_connection" do it "honors default_connection" do token = "1/abcdef1234567890" stub = make_auth_stubs access_token: token, user_agent: "RubyRocks/1.0" - conn = Faraday.new headers: {"User-Agent" => "RubyRocks/1.0"} - @client.configure_connection(default_connection: conn) + conn = Faraday.new headers: { "User-Agent" => "RubyRocks/1.0" } + @client.configure_connection default_connection: conn md = { foo: "bar" } - @client.apply!(md) + @client.apply! md want = { foo: "bar", authorization: "Bearer #{token}" } expect(md).to eq(want) expect(stub).to have_been_requested end it "honors connection_builder" do token = "1/abcdef1234567890" stub = make_auth_stubs access_token: token, user_agent: "RubyRocks/2.0" connection_builder = proc do - Faraday.new headers: {"User-Agent" => "RubyRocks/2.0"} + Faraday.new headers: { "User-Agent" => "RubyRocks/2.0" } end - @client.configure_connection(connection_builder: connection_builder) + @client.configure_connection connection_builder: connection_builder md = { foo: "bar" } - @client.apply!(md) + @client.apply! md want = { foo: "bar", authorization: "Bearer #{token}" } expect(md).to eq(want) expect(stub).to have_been_requested end end