debian-mirror-gitlab/spec/controllers/profiles/personal_access_tokens_controller_spec.rb

67 lines
2.2 KiB
Ruby
Raw Normal View History

2017-08-17 22:00:37 +05:30
require 'spec_helper'
describe Profiles::PersonalAccessTokensController do
let(:user) { create(:user) }
let(:token_attributes) { attributes_for(:personal_access_token) }
2017-09-10 17:25:29 +05:30
before do
sign_in(user)
end
2017-08-17 22:00:37 +05:30
describe '#create' do
def created_token
PersonalAccessToken.order(:created_at).last
end
it "allows creation of a token with scopes" do
name = 'My PAT'
scopes = %w[api read_user]
2019-02-13 22:33:31 +05:30
post :create, params: { personal_access_token: token_attributes.merge(scopes: scopes, name: name) }
2017-08-17 22:00:37 +05:30
expect(created_token).not_to be_nil
expect(created_token.name).to eq(name)
expect(created_token.scopes).to eq(scopes)
expect(PersonalAccessToken.active).to include(created_token)
end
it "allows creation of a token with an expiry date" do
expires_at = 5.days.from_now.to_date
2019-02-13 22:33:31 +05:30
post :create, params: { personal_access_token: token_attributes.merge(expires_at: expires_at) }
2017-08-17 22:00:37 +05:30
expect(created_token).not_to be_nil
expect(created_token.expires_at).to eq(expires_at)
end
end
describe '#index' do
let!(:active_personal_access_token) { create(:personal_access_token, user: user) }
let!(:inactive_personal_access_token) { create(:personal_access_token, :revoked, user: user) }
let!(:impersonation_personal_access_token) { create(:personal_access_token, :impersonation, user: user) }
2018-12-05 23:21:45 +05:30
let(:token_value) { 's3cr3t' }
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
before do
2018-12-05 23:21:45 +05:30
PersonalAccessToken.redis_store!(user.id, token_value)
2017-09-10 17:25:29 +05:30
get :index
end
2017-08-17 22:00:37 +05:30
it "retrieves active personal access tokens" do
expect(assigns(:active_personal_access_tokens)).to include(active_personal_access_token)
end
it "retrieves inactive personal access tokens" do
expect(assigns(:inactive_personal_access_tokens)).to include(inactive_personal_access_token)
end
it "does not retrieve impersonation personal access tokens" do
expect(assigns(:active_personal_access_tokens)).not_to include(impersonation_personal_access_token)
expect(assigns(:inactive_personal_access_tokens)).not_to include(impersonation_personal_access_token)
end
2018-12-05 23:21:45 +05:30
it "retrieves newly created personal access token value" do
expect(assigns(:new_personal_access_token)).to eql(token_value)
end
2017-08-17 22:00:37 +05:30
end
end