summaryrefslogtreecommitdiff
path: root/spec/controllers/profiles/personal_access_tokens_controller_spec.rb
diff options
context:
space:
mode:
Diffstat (limited to 'spec/controllers/profiles/personal_access_tokens_controller_spec.rb')
-rw-r--r--spec/controllers/profiles/personal_access_tokens_controller_spec.rb56
1 files changed, 56 insertions, 0 deletions
diff --git a/spec/controllers/profiles/personal_access_tokens_controller_spec.rb b/spec/controllers/profiles/personal_access_tokens_controller_spec.rb
new file mode 100644
index 00000000000..98a43e278b2
--- /dev/null
+++ b/spec/controllers/profiles/personal_access_tokens_controller_spec.rb
@@ -0,0 +1,56 @@
+require 'spec_helper'
+
+describe Profiles::PersonalAccessTokensController do
+ let(:user) { create(:user) }
+ let(:token_attributes) { attributes_for(:personal_access_token) }
+
+ before { sign_in(user) }
+
+ describe '#create' do
+ def created_token
+ PersonalAccessToken.order(:created_at).last
+ end
+
+ it "allows creation of a token with scopes" do
+ name = 'My PAT'
+ scopes = %w[api read_user]
+
+ post :create, personal_access_token: token_attributes.merge(scopes: scopes, name: name)
+
+ expect(created_token).not_to be_nil
+ expect(created_token.name).to eq(name)
+ expect(created_token.scopes).to eq(scopes)
+ expect(PersonalAccessToken.active).to include(created_token)
+ end
+
+ it "allows creation of a token with an expiry date" do
+ expires_at = 5.days.from_now.to_date
+
+ post :create, personal_access_token: token_attributes.merge(expires_at: expires_at)
+
+ expect(created_token).not_to be_nil
+ expect(created_token.expires_at).to eq(expires_at)
+ end
+ end
+
+ describe '#index' do
+ let!(:active_personal_access_token) { create(:personal_access_token, user: user) }
+ let!(:inactive_personal_access_token) { create(:personal_access_token, :revoked, user: user) }
+ let!(:impersonation_personal_access_token) { create(:personal_access_token, :impersonation, user: user) }
+
+ before { get :index }
+
+ it "retrieves active personal access tokens" do
+ expect(assigns(:active_personal_access_tokens)).to include(active_personal_access_token)
+ end
+
+ it "retrieves inactive personal access tokens" do
+ expect(assigns(:inactive_personal_access_tokens)).to include(inactive_personal_access_token)
+ end
+
+ it "does not retrieve impersonation personal access tokens" do
+ expect(assigns(:active_personal_access_tokens)).not_to include(impersonation_personal_access_token)
+ expect(assigns(:inactive_personal_access_tokens)).not_to include(impersonation_personal_access_token)
+ end
+ end
+end