summaryrefslogtreecommitdiff
path: root/spec/services/clusters/agent_tokens/revoke_service_spec.rb
blob: 9e511de0a130c7dbab1f959b6b0a91bcc4f7f7a0 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe Clusters::AgentTokens::RevokeService, feature_category: :kubernetes_management do
  describe '#execute' do
    subject { described_class.new(token: agent_token, current_user: user).execute }

    let(:agent) { create(:cluster_agent) }
    let(:agent_token) { create(:cluster_agent_token, agent: agent) }
    let(:project) { agent.project }
    let(:user) { agent.created_by_user }

    before do
      project.add_maintainer(user)
    end

    context 'when user is authorized' do
      before do
        project.add_maintainer(user)
      end

      context 'when user revokes agent token' do
        it 'succeeds' do
          subject

          expect(agent_token.revoked?).to be true
        end

        it 'creates an activity event' do
          expect { subject }.to change { ::Clusters::Agents::ActivityEvent.count }.by(1)

          event = agent.activity_events.last

          expect(event).to have_attributes(
            kind: 'token_revoked',
            level: 'info',
            recorded_at: agent_token.reload.updated_at,
            user: user,
            agent_token: agent_token
          )
        end
      end

      context 'when there is a validation failure' do
        before do
          agent_token.name = '' # make the record invalid, as we require a name to be present
        end

        it 'fails without raising an error', :aggregate_failures do
          expect(subject[:status]).to eq(:error)
          expect(subject[:message]).to eq(["Name can't be blank"])
        end

        it 'does not create an activity event' do
          expect { subject }.not_to change { ::Clusters::Agents::ActivityEvent.count }
        end
      end
    end

    context 'when user is not authorized' do
      let(:user) { create(:user) }

      before do
        project.add_guest(user)
      end

      context 'when user attempts to revoke agent token' do
        it 'fails' do
          subject

          expect(agent_token.revoked?).to be false
        end
      end
    end
  end
end