mirror of
https://github.com/lingble/chatwoot.git
synced 2025-12-28 00:25:15 +00:00
- Added a trait called microsoft_email for the Channel::Email factory. - Rewrote the logic to make it simple to understand - Rewrote the specs for readability
90 lines
3.7 KiB
Ruby
90 lines
3.7 KiB
Ruby
require 'rails_helper'
|
|
|
|
RSpec.describe Microsoft::RefreshOauthTokenService do
|
|
let!(:microsoft_channel) { create(:channel_email, :microsoft_email) }
|
|
let!(:microsoft_channel_with_expired_token) do
|
|
create(
|
|
:channel_email, :microsoft_email, provider_config: {
|
|
expires_on: Time.zone.now - 3600,
|
|
access_token: SecureRandom.hex,
|
|
refresh_token: SecureRandom.hex
|
|
}
|
|
)
|
|
end
|
|
|
|
let(:new_tokens) do
|
|
{
|
|
access_token: SecureRandom.hex,
|
|
refresh_token: SecureRandom.hex,
|
|
expires_at: (Time.zone.now + 3600).to_i,
|
|
token_type: 'bearer'
|
|
}
|
|
end
|
|
|
|
context 'when token is not expired' do
|
|
it 'returns the existing access token' do
|
|
service = described_class.new(channel: microsoft_channel)
|
|
|
|
expect(service.access_token).to eq(microsoft_channel.provider_config['access_token'])
|
|
expect(microsoft_channel.reload.provider_config['refresh_token']).to eq(microsoft_channel.provider_config['refresh_token'])
|
|
end
|
|
end
|
|
|
|
describe 'on expired token or invalid expiry' do
|
|
before do
|
|
stub_request(:post, 'https://login.microsoftonline.com/common/oauth2/v2.0/token').with(
|
|
body: { 'grant_type' => 'refresh_token', 'refresh_token' => microsoft_channel_with_expired_token.provider_config['refresh_token'] }
|
|
).to_return(status: 200, body: new_tokens.to_json, headers: { 'Content-Type' => 'application/json' })
|
|
end
|
|
|
|
context 'when token is invalid' do
|
|
it 'fetches new access token and refresh tokens' do
|
|
with_modified_env AZURE_APP_ID: SecureRandom.uuid, AZURE_APP_SECRET: SecureRandom.hex do
|
|
provider_config = microsoft_channel_with_expired_token.provider_config
|
|
service = described_class.new(channel: microsoft_channel_with_expired_token)
|
|
expect(service.access_token).not_to eq(provider_config['access_token'])
|
|
|
|
new_provider_config = microsoft_channel_with_expired_token.reload.provider_config
|
|
expect(new_provider_config['access_token']).to eq(new_tokens[:access_token])
|
|
expect(new_provider_config['refresh_token']).to eq(new_tokens[:refresh_token])
|
|
expect(new_provider_config['expires_on']).to eq(Time.at(new_tokens[:expires_at]).utc.to_s)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when expiry time is missing' do
|
|
it 'fetches new access token and refresh tokens' do
|
|
with_modified_env AZURE_APP_ID: SecureRandom.uuid, AZURE_APP_SECRET: SecureRandom.hex do
|
|
microsoft_channel_with_expired_token.provider_config['expires_on'] = nil
|
|
microsoft_channel_with_expired_token.save!
|
|
provider_config = microsoft_channel_with_expired_token.provider_config
|
|
service = described_class.new(channel: microsoft_channel_with_expired_token)
|
|
expect(service.access_token).not_to eq(provider_config['access_token'])
|
|
|
|
new_provider_config = microsoft_channel_with_expired_token.reload.provider_config
|
|
expect(new_provider_config['access_token']).to eq(new_tokens[:access_token])
|
|
expect(new_provider_config['refresh_token']).to eq(new_tokens[:refresh_token])
|
|
expect(new_provider_config['expires_on']).to eq(Time.at(new_tokens[:expires_at]).utc.to_s)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when refresh token is not present in provider config and access token is expired' do
|
|
it 'throws an error' do
|
|
with_modified_env AZURE_APP_ID: SecureRandom.uuid, AZURE_APP_SECRET: SecureRandom.hex do
|
|
microsoft_channel.update(
|
|
provider_config: {
|
|
access_token: SecureRandom.hex,
|
|
expires_on: Time.zone.now - 3600
|
|
}
|
|
)
|
|
|
|
expect do
|
|
described_class.new(channel: microsoft_channel).access_token
|
|
end.to raise_error(RuntimeError, 'A refresh_token is not available')
|
|
end
|
|
end
|
|
end
|
|
end
|