# frozen_string_literal: true require 'spec_helper' RSpec.describe Groups::Settings::AccessTokensController, feature_category: :system_access do let_it_be(:user) { create(:user) } let_it_be(:resource) { create(:group) } let_it_be(:access_token_user) { create(:user, :project_bot) } before_all do resource.add_owner(user) resource.add_maintainer(access_token_user) end before do sign_in(user) end shared_examples 'feature unavailable' do context 'user is not a owner' do before do resource.add_maintainer(user) end it { expect(subject).to have_gitlab_http_status(:not_found) } end end describe 'GET /:namespace/-/settings/access_tokens' do let(:get_access_tokens) do get group_settings_access_tokens_path(resource) response end let(:get_access_tokens_json) do get group_settings_access_tokens_path(resource), params: { format: :json } response end subject(:get_access_tokens_with_page) do get group_settings_access_tokens_path(resource), params: { page: 1 } response end it_behaves_like 'feature unavailable' it_behaves_like 'GET resource access tokens available' it_behaves_like 'GET access tokens are paginated and ordered' end describe 'POST /:namespace/-/settings/access_tokens' do let(:access_token_params) { { name: 'Nerd bot', scopes: ["api"], expires_at: Date.today + 1.month } } subject do post group_settings_access_tokens_path(resource), params: { resource_access_token: access_token_params } response end it_behaves_like 'feature unavailable' it_behaves_like 'POST resource access tokens available' context 'when group access token creation is disabled' do before do resource.namespace_settings.update_column(:resource_access_token_creation_allowed, false) end it { expect(subject).to have_gitlab_http_status(:not_found) } it 'does not create the token' do expect { subject }.not_to change { PersonalAccessToken.count } end it 'does not add the project bot as a member' do expect { subject }.not_to change { Member.count } end it 'does not create the project bot user' do expect { subject }.not_to change { User.count } end end context 'with custom access level' do let(:access_token_params) { { name: 'Nerd bot', scopes: ["api"], expires_at: Date.today + 1.month, access_level: 20 } } subject { post group_settings_access_tokens_path(resource), params: { resource_access_token: access_token_params } } it_behaves_like 'POST resource access tokens available' end end describe 'PUT /:namespace/-/settings/access_tokens/:id', :sidekiq_inline do let(:resource_access_token) { create(:personal_access_token, user: access_token_user) } subject do put revoke_group_settings_access_token_path(resource, resource_access_token) response end it_behaves_like 'feature unavailable' it_behaves_like 'PUT resource access tokens available' end describe '#index' do let_it_be(:resource_access_tokens) { create_list(:personal_access_token, 3, user: access_token_user) } before do get group_settings_access_tokens_path(resource) end it 'includes details of the active group access tokens' do active_access_tokens = ::GroupAccessTokenSerializer.new.represent(resource_access_tokens.reverse, group: resource) expect(assigns(:active_access_tokens).to_json).to eq(active_access_tokens.to_json) end end end