spec/integrations/webhook_spec.rb in onfido-1.1.1 vs spec/integrations/webhook_spec.rb in onfido-2.0.0

- old
+ new

@@ -1,30 +1,34 @@ +# frozen_string_literal: true + describe Onfido::Webhook do - subject(:webhook) { described_class.new } + include_context 'fake onfido api' - describe "#create" do + subject(:webhook) { onfido.webhook } + + describe '#create' do let(:params) do { - url: "https://webhookendpoint.url", + url: 'https://webhookendpoint.url', enabled: true, events: [ - "report.completed", - "check.completed" + 'report.completed', + 'check.completed' ] } end - it "creates the webhook" do + it 'creates the webhook' do response = webhook.create(**params) expect(response['id']).to_not be_nil end - it "responds with the right url" do + it 'responds with the right url' do response = webhook.create(**params) - expect(response["url"]).to eq params[:url] + expect(response['url']).to eq params[:url] end end describe '#find' do it 'returns the webhook' do @@ -34,33 +38,33 @@ expect(response['id']).to eq(webhook_id) end end - describe "#destroy" do - it "removes the webhook" do + describe '#destroy' do + it 'removes the webhook' do webhook_id = 'fcb73186-0733-4f6f-9c57-d9d5ef979443' expect { webhook.destroy(webhook_id) }.not_to raise_error end end - describe "#all" do - it "returns all the registered webhooks" do + describe '#all' do + it 'returns all the registered webhooks' do response = webhook.all - expect(response["webhooks"].count).to eq 2 + expect(response['webhooks'].count).to eq 2 end - it "returns with id" do + it 'returns with id' do response = webhook.all - expect(response["webhooks"][0]["id"]).to_not be_nil - expect(response["webhooks"][1]["id"]).to_not be_nil + expect(response['webhooks'][0]['id']).to_not be_nil + expect(response['webhooks'][1]['id']).to_not be_nil end end - describe ".valid?" do + describe '.valid?' do subject(:valid?) do described_class.valid?(request_body, request_signature, token) end let(:request_body) { '{"foo":"bar"}' } @@ -69,37 +73,37 @@ end let(:token) { 'very_secret_token' } it { is_expected.to be(true) } - context "with an invalid signature" do + context 'with an invalid signature' do let(:request_signature) do 's21fd54ew2w1f5d15642132f3d7727ff9a32a7c87072ce514df1f6d3228bec' end it { is_expected.to be(false) } end - context "with a nil request signature" do + context 'with a nil request signature' do let(:request_signature) { nil } specify { expect { valid? }.to raise_error(ArgumentError) } end - context "with a token other than the one used to sign the request" do - let(:token) { "quite_secret_token" } + context 'with a token other than the one used to sign the request' do + let(:token) { 'quite_secret_token' } it { is_expected.to be(false) } end - context "with a nil token" do + context 'with a nil token' do let(:token) { nil } specify { expect { valid? }.to raise_error(ArgumentError) } end - context "with a modified request body" do + context 'with a modified request body' do let(:request_body) { '{"bar":"baz"}' } it { is_expected.to be(false) } end - context "with a nil request body" do + context 'with a nil request body' do let(:request_body) { nil } specify { expect { valid? }.to raise_error(ArgumentError) } end end end