41 lines
1.3 KiB
Ruby
41 lines
1.3 KiB
Ruby
o_auth_query_params = %i(
|
|
redirect_uri=http://localhost:3000
|
|
response_type=id_token%20token
|
|
scope=openid%20read
|
|
nonce=hello
|
|
state=hi
|
|
).join("&")
|
|
|
|
Given /^I send a post request from that client to the implicit flow authorization endpoint$/ do
|
|
client_json = JSON.parse(last_response.body)
|
|
visit new_api_openid_connect_authorization_path +
|
|
"?client_id=#{client_json['client_id']}&#{o_auth_query_params}"
|
|
end
|
|
|
|
Given /^I send a post request from that client to the implicit flow authorization endpoint using a invalid client id/ do
|
|
visit new_api_openid_connect_authorization_path + "?client_id=randomid&#{o_auth_query_params}"
|
|
end
|
|
|
|
When /^I give my consent and authorize the client$/ do
|
|
click_button "Approve"
|
|
end
|
|
|
|
When /^I deny authorization to the client$/ do
|
|
click_button "Deny"
|
|
end
|
|
|
|
Then /^I should not see any tokens in the redirect url$/ do
|
|
access_token = current_url[/(?<=access_token=)[^&]+/]
|
|
id_token = current_url[/(?<=access_token=)[^&]+/]
|
|
expect(access_token).to eq(nil)
|
|
expect(id_token).to eq(nil)
|
|
end
|
|
|
|
When /^I parse the bearer tokens and use it to access user info$/ do
|
|
access_token = current_url[/(?<=access_token=)[^&]+/]
|
|
get api_openid_connect_user_info_path, access_token: access_token
|
|
end
|
|
|
|
Then /^I should see an "([^\"]*)" error$/ do |error_message|
|
|
expect(page).to have_content(error_message)
|
|
end
|