1
0
Fork 0
mirror of https://github.com/sinatra/sinatra synced 2023-03-27 23:18:01 -04:00
sinatra/rack-protection/spec/lib/rack/protection/form_token_spec.rb
2016-08-16 21:22:49 -04:00

45 lines
1.6 KiB
Ruby

describe Rack::Protection::FormToken do
let(:token) { described_class.random_token }
let(:bad_token) { described_class.random_token }
let(:session) { {:csrf => token} }
it_behaves_like "any rack application"
it "denies post requests without any token" do
expect(post('/')).not_to be_ok
end
it "accepts post requests with correct X-CSRF-Token header" do
post('/', {}, 'rack.session' => session, 'HTTP_X_CSRF_TOKEN' => token)
expect(last_response).to be_ok
end
it "accepts post requests with masked X-CSRF-Token header" do
post('/', {}, 'rack.session' => session, 'HTTP_X_CSRF_TOKEN' => Rack::Protection::FormToken.token(session))
expect(last_response).to be_ok
end
it "denies post requests with wrong X-CSRF-Token header" do
post('/', {}, 'rack.session' => session, 'HTTP_X_CSRF_TOKEN' => bad_token)
expect(last_response).not_to be_ok
end
it "accepts post form requests with correct authenticity_token field" do
post('/', {"authenticity_token" => token}, 'rack.session' => session)
expect(last_response).to be_ok
end
it "accepts post form requests with masked authenticity_token field" do
post('/', {"authenticity_token" => Rack::Protection::FormToken.token(session)}, 'rack.session' => session)
expect(last_response).to be_ok
end
it "denies post form requests with wrong authenticity_token field" do
post('/', {"authenticity_token" => bad_token}, 'rack.session' => session)
expect(last_response).not_to be_ok
end
it "accepts ajax requests without a valid token" do
expect(post('/', {}, "HTTP_X_REQUESTED_WITH" => "XMLHttpRequest")).to be_ok
end
end