forked from glitch-soc/mastodon
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Disable administrative doorkeeper routes (29187)
- Loading branch information
1 parent
6ce7e97
commit 2210149
Showing
2 changed files
with
90 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,83 @@ | ||
# frozen_string_literal: true | ||
|
||
require 'rails_helper' | ||
|
||
describe 'Disabled OAuth routes' do | ||
# These routes are disabled via the doorkeeper configuration for | ||
# `admin_authenticator`, as these routes should only be accessible by server | ||
# administrators. For now, these routes are not properly designed and | ||
# integrated into Mastodon, so we're disabling them completely | ||
describe 'GET /oauth/applications' do | ||
it 'returns 403 forbidden' do | ||
get oauth_applications_path | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
|
||
describe 'POST /oauth/applications' do | ||
it 'returns 403 forbidden' do | ||
post oauth_applications_path | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
|
||
describe 'GET /oauth/applications/new' do | ||
it 'returns 403 forbidden' do | ||
get new_oauth_application_path | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
|
||
describe 'GET /oauth/applications/:id' do | ||
let(:application) { Fabricate(:application, scopes: 'read') } | ||
|
||
it 'returns 403 forbidden' do | ||
get oauth_application_path(application) | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
|
||
describe 'PATCH /oauth/applications/:id' do | ||
let(:application) { Fabricate(:application, scopes: 'read') } | ||
|
||
it 'returns 403 forbidden' do | ||
patch oauth_application_path(application) | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
|
||
describe 'PUT /oauth/applications/:id' do | ||
let(:application) { Fabricate(:application, scopes: 'read') } | ||
|
||
it 'returns 403 forbidden' do | ||
put oauth_application_path(application) | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
|
||
describe 'DELETE /oauth/applications/:id' do | ||
let(:application) { Fabricate(:application, scopes: 'read') } | ||
|
||
it 'returns 403 forbidden' do | ||
delete oauth_application_path(application) | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
|
||
describe 'GET /oauth/applications/:id/edit' do | ||
let(:application) { Fabricate(:application, scopes: 'read') } | ||
|
||
it 'returns 403 forbidden' do | ||
get edit_oauth_application_path(application) | ||
|
||
expect(response).to have_http_status(403) | ||
end | ||
end | ||
end |