Skip to content

Commit 79d377c

Browse files
committed
DEV: Use mocha instead of rspec-mocks for omniauth spec
1 parent f44a2cd commit 79d377c

File tree

1 file changed

+10
-17
lines changed

1 file changed

+10
-17
lines changed

spec/lib/omniauth_open_id_connect_spec.rb

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
11
# frozen_string_literal: true
22

33
require_relative '../../lib/omniauth_open_id_connect'
4-
5-
require 'webmock/rspec'
6-
WebMock.disable_net_connect!
4+
require 'rails_helper'
75

86
describe OmniAuth::Strategies::OpenIDConnect do
97
# let(:request) { double('Request', params: {}, cookies: {}, env: {}) }
@@ -30,9 +28,6 @@
3028
}
3129

3230
).tap do |strategy|
33-
# allow(strategy).to receive(:request) do
34-
# request
35-
# end
3631
end
3732
end
3833

@@ -73,9 +68,8 @@
7368
"userinfo_endpoint": "https://id.example.com/userinfo",
7469
}.to_json)
7570

76-
allow(subject).to receive(:request) do
77-
double("Request", params: { "p" => "someallowedvalue", "somethingelse" => "notallowed" })
78-
end
71+
subject.stubs(:request).returns(mock('object'))
72+
subject.request.stubs(:params).returns("p" => "someallowedvalue", "somethingelse" => "notallowed")
7973

8074
subject.discover!
8175
end
@@ -104,7 +98,8 @@
10498
describe "token parameters" do
10599
it "passes through parameters from authorize phase" do
106100
expect(subject.authorize_params[:p]).to eq("someallowedvalue")
107-
allow(subject).to receive(:request) { double("Request", params: {}) }
101+
subject.stubs(:request).returns(mock())
102+
subject.request.stubs(:params).returns({})
108103
expect(subject.token_params[:p]).to eq("someallowedvalue")
109104
end
110105
end
@@ -113,11 +108,10 @@
113108
before do
114109
auth_params = subject.authorize_params
115110

116-
allow(subject).to receive(:full_host).and_return("https://example.com")
111+
subject.stubs(:full_host).returns("https://example.com")
117112

118-
allow(subject).to receive(:request) do
119-
double("Request", params: { "state" => auth_params[:state], "code" => "supersecretcode" })
120-
end
113+
subject.stubs(:request).returns(mock())
114+
subject.request.stubs(:params).returns("state" => auth_params[:state], "code" => "supersecretcode")
121115

122116
payload = {
123117
iss: "https://id.example.com/",
@@ -133,9 +127,8 @@
133127
end
134128

135129
it "handles error redirects correctly" do
136-
allow(subject).to receive(:request) do
137-
double("Request", params: { "error" => true, "error_description" => "User forgot password" })
138-
end
130+
subject.stubs(:request).returns(mock())
131+
subject.request.stubs(:params).returns("error" => true, "error_description" => "User forgot password")
139132
subject.options.error_handler = lambda { |error, message| return "https://example.com/error_redirect" if message.include?("forgot password") }
140133
expect(subject.callback_phase[0]).to eq(302)
141134
expect(subject.callback_phase[1]["Location"]).to eq("https://example.com/error_redirect")

0 commit comments

Comments
 (0)