debian-mirror-gitlab/spec/services/personal_access_tokens/create_service_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

87 lines
3 KiB
Ruby
Raw Normal View History

2020-04-22 19:07:51 +05:30
# frozen_string_literal: true
require 'spec_helper'
2023-05-27 22:25:52 +05:30
RSpec.describe PersonalAccessTokens::CreateService, feature_category: :system_access do
2021-01-29 00:20:46 +05:30
shared_examples_for 'a successfully created token' do
it 'creates personal access token record' do
expect(subject.success?).to be true
expect(token.name).to eq(params[:name])
expect(token.impersonation).to eq(params[:impersonation])
expect(token.scopes).to eq(params[:scopes])
expect(token.expires_at).to eq(params[:expires_at])
expect(token.user).to eq(user)
end
it 'logs the event' do
expect(Gitlab::AppLogger).to receive(:info).with(/PAT CREATION: created_by: '#{current_user.username}', created_for: '#{user.username}', token_id: '\d+'/)
subject
end
2022-05-07 20:08:51 +05:30
it 'notifies the user' do
expect_next_instance_of(NotificationService) do |notification_service|
expect(notification_service).to receive(:access_token_created).with(user, params[:name])
end
subject
end
2021-01-29 00:20:46 +05:30
end
shared_examples_for 'an unsuccessfully created token' do
it { expect(subject.success?).to be false }
it { expect(subject.message).to eq('Not permitted to create') }
it { expect(token).to be_nil }
end
2020-04-22 19:07:51 +05:30
describe '#execute' do
2021-01-29 00:20:46 +05:30
subject { service.execute }
let(:current_user) { create(:user) }
let(:user) { create(:user) }
let(:params) { { name: 'Test token', impersonation: false, scopes: [:api], expires_at: Date.today + 1.month } }
2023-05-27 22:25:52 +05:30
let(:service) { described_class.new(current_user: current_user, target_user: user, params: params, concatenate_errors: false) }
2021-01-29 00:20:46 +05:30
let(:token) { subject.payload[:personal_access_token] }
context 'when current_user is an administrator' do
let(:current_user) { create(:admin) }
context 'when admin mode is enabled', :enable_admin_mode do
it_behaves_like 'a successfully created token'
end
context 'when admin mode is disabled' do
it_behaves_like 'an unsuccessfully created token'
end
end
context 'when current_user is not an administrator' do
context 'target_user is not the same as current_user' do
it_behaves_like 'an unsuccessfully created token'
end
context 'target_user is same as current_user' do
let(:current_user) { user }
it_behaves_like 'a successfully created token'
2020-04-22 19:07:51 +05:30
end
end
2023-05-27 22:25:52 +05:30
context 'when invalid scope' do
let(:params) { { name: 'Test token', impersonation: false, scopes: [:no_valid], expires_at: Date.today + 1.month } }
context 'when concatenate_errors: true' do
let(:service) { described_class.new(current_user: user, target_user: user, params: params) }
it { expect(subject.message).to be_an_instance_of(String) }
end
context 'when concatenate_errors: false' do
let(:service) { described_class.new(current_user: user, target_user: user, params: params, concatenate_errors: false) }
it { expect(subject.message).to be_an_instance_of(Array) }
end
end
2020-04-22 19:07:51 +05:30
end
end