Skip to content

Commit 0e731ca

Browse files
committed
Also update Session#get_logout_url
1 parent 0dc8514 commit 0e731ca

File tree

2 files changed

+33
-16
lines changed

2 files changed

+33
-16
lines changed

lib/workos/session.rb

+3-4
Original file line numberDiff line numberDiff line change
@@ -101,18 +101,17 @@ def refresh(options = nil)
101101
# rubocop:enable Metrics/PerceivedComplexity
102102

103103
# Returns a URL to redirect the user to for logging out
104+
# @param return_to [String] The URL to redirect the user to after logging out
104105
# @return [String] The URL to redirect the user to for logging out
105-
# rubocop:disable Naming/AccessorMethodName
106-
def get_logout_url
106+
def get_logout_url(return_to: nil)
107107
auth_response = authenticate
108108

109109
unless auth_response[:authenticated]
110110
raise "Failed to extract session ID for logout URL: #{auth_response[:reason]}"
111111
end
112112

113-
@user_management.get_logout_url(session_id: auth_response[:session_id])
113+
@user_management.get_logout_url(session_id: auth_response[:session_id], return_to: return_to)
114114
end
115-
# rubocop:enable Naming/AccessorMethodName
116115

117116
# Encrypts and seals data using AES-256-GCM
118117
# @param data [Hash] The data to seal

spec/lib/workos/session_spec.rb

+30-12
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
# frozen_string_literal: true
22

33
describe WorkOS::Session do
4-
let(:user_management) { instance_double('UserManagement') }
54
let(:client_id) { 'test_client_id' }
65
let(:cookie_password) { 'test_very_long_cookie_password__' }
76
let(:session_data) { 'test_session_data' }
@@ -10,11 +9,16 @@
109
let(:jwk) { JWT::JWK.new(OpenSSL::PKey::RSA.new(2048), { kid: 'sso_oidc_key_pair_123', use: 'sig', alg: 'RS256' }) }
1110

1211
before do
13-
allow(user_management).to receive(:get_jwks_url).with(client_id).and_return(jwks_url)
1412
allow(Net::HTTP).to receive(:get).and_return(jwks_hash)
1513
end
1614

1715
describe 'initialize' do
16+
let(:user_management) { instance_double('UserManagement') }
17+
18+
before do
19+
allow(user_management).to receive(:get_jwks_url).with(client_id).and_return(jwks_url)
20+
end
21+
1822
it 'raises an error if cookie_password is nil or empty' do
1923
expect do
2024
WorkOS::Session.new(
@@ -52,6 +56,7 @@
5256
end
5357

5458
describe '.authenticate' do
59+
let(:user_management) { instance_double('UserManagement') }
5560
let(:valid_access_token) do
5661
payload = {
5762
sid: 'session_id',
@@ -71,6 +76,10 @@
7176
}, cookie_password,)
7277
end
7378

79+
before do
80+
allow(user_management).to receive(:get_jwks_url).with(client_id).and_return(jwks_url)
81+
end
82+
7483
it 'returns NO_SESSION_COOKIE_PROVIDED if session_data is nil' do
7584
session = WorkOS::Session.new(
7685
user_management: user_management,
@@ -135,11 +144,13 @@
135144
end
136145

137146
describe '.refresh' do
147+
let(:user_management) { instance_double('UserManagement') }
138148
let(:refresh_token) { 'test_refresh_token' }
139149
let(:session_data) { WorkOS::Session.seal_data({ refresh_token: refresh_token, user: 'user' }, cookie_password) }
140150
let(:auth_response) { double('AuthResponse', sealed_session: 'new_sealed_session') }
141151

142152
before do
153+
allow(user_management).to receive(:get_jwks_url).with(client_id).and_return(jwks_url)
143154
allow(user_management).to receive(:authenticate_with_refresh_token).and_return(auth_response)
144155
end
145156

@@ -173,26 +184,33 @@
173184

174185
describe '.get_logout_url' do
175186
let(:session) do
176-
WorkOS::Session.new(
177-
user_management: user_management,
178-
client_id: client_id,
179-
session_data: session_data,
180-
cookie_password: cookie_password,
181-
)
182-
end
187+
WorkOS::Session.new(
188+
user_management: WorkOS::UserManagement,
189+
client_id: client_id,
190+
session_data: session_data,
191+
cookie_password: cookie_password,
192+
)
193+
end
183194

184195
context 'when authentication is successful' do
185196
before do
186197
allow(session).to receive(:authenticate).and_return({
187198
authenticated: true,
188-
session_id: 'session_id',
199+
session_id: 'session_123abc',
189200
reason: nil,
190201
})
191-
allow(user_management).to receive(:get_logout_url).with(session_id: 'session_id').and_return('https://example.com/logout')
192202
end
193203

194204
it 'returns the logout URL' do
195-
expect(session.get_logout_url).to eq('https://example.com/logout')
205+
expect(session.get_logout_url).to eq('https://api.workos.com/user_management/sessions/logout?session_id=session_123abc')
206+
end
207+
208+
context 'when given a return_to URL' do
209+
it 'returns the logout URL with the return_to parameter' do
210+
expect(session.get_logout_url(return_to: 'https://example.com/signed-out')).to eq(
211+
'https://api.workos.com/user_management/sessions/logout?session_id=session_123abc&return_to=https%3A%2F%2Fexample.com%2Fsigned-out',
212+
)
213+
end
196214
end
197215
end
198216

0 commit comments

Comments
 (0)