1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe API::Admin::Token, :aggregate_failures, feature_category: :system_access do
let_it_be(:admin) { create(:admin) }
let_it_be(:user) { create(:user) }
let_it_be(:url) { '/admin/token' }
let(:api_user) { admin }
let_it_be(:personal_access_token) { create(:personal_access_token, user: user) }
let_it_be(:deploy_token) { create(:deploy_token) }
let(:plaintext) { nil }
let(:params) { { token: plaintext } }
subject(:post_token) { post(api(url, api_user, admin_mode: true), params: params) }
describe 'POST /admin/token' do
context 'when the user is an admin' do
context 'with a valid token' do
where(:token, :plaintext) do
[
[ref(:personal_access_token), lazy { personal_access_token.token }],
[ref(:deploy_token), lazy { deploy_token.token }],
[ref(:user), lazy { user.feed_token }]
]
end
with_them do
it 'returns info about the token' do
post_token
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['id']).to eq(token.id)
end
end
end
context 'with non-existing token' do
let(:plaintext) { "#{personal_access_token.token}-non-existing" }
it_behaves_like 'returning response status', :not_found
end
context 'with unsupported token type' do
let(:plaintext) { 'unsupported' }
it_behaves_like 'returning response status', :unprocessable_entity
end
context 'when the feature is disabled' do
before do
stub_feature_flags(admin_agnostic_token_finder: false)
end
it_behaves_like 'returning response status', :not_found
end
end
context 'when the user is not an admin' do
let(:api_user) { user }
it_behaves_like 'returning response status', :forbidden
end
context 'without a user' do
let(:api_user) { nil }
it_behaves_like 'returning response status', :unauthorized
end
end
end
|