diff options
Diffstat (limited to 'spec/controllers/profiles/personal_access_tokens_spec.rb')
-rw-r--r-- | spec/controllers/profiles/personal_access_tokens_spec.rb | 56 |
1 files changed, 0 insertions, 56 deletions
diff --git a/spec/controllers/profiles/personal_access_tokens_spec.rb b/spec/controllers/profiles/personal_access_tokens_spec.rb deleted file mode 100644 index dfed1de2046..00000000000 --- a/spec/controllers/profiles/personal_access_tokens_spec.rb +++ /dev/null @@ -1,56 +0,0 @@ -require 'spec_helper' - -describe Profiles::PersonalAccessTokensController do - let(:user) { create(:user) } - let(:token_attributes) { attributes_for(:personal_access_token) } - - before { sign_in(user) } - - describe '#create' do - def created_token - PersonalAccessToken.order(:created_at).last - end - - it "allows creation of a token with scopes" do - name = FFaker::Product.brand - scopes = %w[api read_user] - - post :create, personal_access_token: token_attributes.merge(scopes: scopes, name: name) - - expect(created_token).not_to be_nil - expect(created_token.name).to eq(name) - expect(created_token.scopes).to eq(scopes) - expect(PersonalAccessToken.active).to include(created_token) - end - - it "allows creation of a token with an expiry date" do - expires_at = 5.days.from_now.to_date - - post :create, personal_access_token: token_attributes.merge(expires_at: expires_at) - - expect(created_token).not_to be_nil - expect(created_token.expires_at).to eq(expires_at) - end - end - - describe '#index' do - let!(:active_personal_access_token) { create(:personal_access_token, user: user) } - let!(:inactive_personal_access_token) { create(:personal_access_token, :revoked, user: user) } - let!(:impersonation_personal_access_token) { create(:personal_access_token, :impersonation, user: user) } - - before { get :index } - - it "retrieves active personal access tokens" do - expect(assigns(:active_personal_access_tokens)).to include(active_personal_access_token) - end - - it "retrieves inactive personal access tokens" do - expect(assigns(:inactive_personal_access_tokens)).to include(inactive_personal_access_token) - end - - it "does not retrieve impersonation personal access tokens" do - expect(assigns(:active_personal_access_tokens)).not_to include(impersonation_personal_access_token) - expect(assigns(:inactive_personal_access_tokens)).not_to include(impersonation_personal_access_token) - end - end -end |