personal_access_tokens_spec.rb 3.3 KB
Newer Older
1 2
require 'spec_helper'

3
describe 'Profile > Personal Access Tokens', feature: true, js: true do
4 5
  let(:user) { create(:user) }

6
  def active_personal_access_tokens
7
    find(".table.active-personal-access-tokens")
8 9 10
  end

  def inactive_personal_access_tokens
11
    find(".table.inactive-personal-access-tokens")
12 13 14
  end

  def created_personal_access_token
15
    find("#created-personal-access-token").value
16 17
  end

18 19 20 21 22 23
  def disallow_personal_access_token_saves!
    allow_any_instance_of(PersonalAccessToken).to receive(:save).and_return(false)
    errors = ActiveModel::Errors.new(PersonalAccessToken.new).tap { |e| e.add(:name, "cannot be nil") }
    allow_any_instance_of(PersonalAccessToken).to receive(:errors).and_return(errors)
  end

24 25 26 27 28
  before do
    login_as(user)
  end

  describe "token creation" do
29
    it "allows creation of a non impersonation token" do
30
      name = FFaker::Product.brand
31

32
      visit profile_personal_access_tokens_path
33
      fill_in "Name", with: name
34 35

      # Set date to 1st of next month
T
Timothy Andrew 已提交
36
      find_field("Expires at").trigger('focus')
P
Phil Hughes 已提交
37
      find(".pika-next").click
38 39
      click_on "1"

40 41 42
      # Scopes
      check "api"
      check "read_user"
43

44 45
      click_on "Create Personal Access Token"
      expect(active_personal_access_tokens).to have_text(name)
46
      expect(active_personal_access_tokens).to have_text('In')
47 48
      expect(active_personal_access_tokens).to have_text('api')
      expect(active_personal_access_tokens).to have_text('read_user')
49 50
    end

51 52 53 54 55 56
    context "when creation fails" do
      it "displays an error message" do
        disallow_personal_access_token_saves!
        visit profile_personal_access_tokens_path
        fill_in "Name", with: FFaker::Product.brand

T
Timothy Andrew 已提交
57
        expect { click_on "Create Personal Access Token" }.not_to change { PersonalAccessToken.count }
58 59 60
        expect(page).to have_content("Name cannot be nil")
      end
    end
61 62
  end

63 64 65 66 67 68 69 70 71 72 73 74
  describe 'active tokens' do
    let!(:impersonation_token) { create(:impersonation_personal_access_token, user: user) }
    let!(:personal_access_token) { create(:personal_access_token, user: user) }

    it 'only shows non impersonated tokens' do
      visit profile_personal_access_tokens_path

      expect(active_personal_access_tokens).to have_text(personal_access_token.name)
      expect(active_personal_access_tokens).not_to have_text(impersonation_token.name)
    end
  end

75
  describe "inactive tokens" do
76 77
    let!(:personal_access_token) { create(:personal_access_token, user: user) }

78 79 80 81
    it "allows revocation of an active token" do
      visit profile_personal_access_tokens_path
      click_on "Revoke"

82
      expect(inactive_personal_access_tokens).to have_text(personal_access_token.name)
83 84 85
    end

    it "moves expired tokens to the 'inactive' section" do
86
      personal_access_token.update(expires_at: 5.days.ago)
87 88
      visit profile_personal_access_tokens_path

89
      expect(inactive_personal_access_tokens).to have_text(personal_access_token.name)
90
    end
91 92 93 94 95 96

    context "when revocation fails" do
      it "displays an error message" do
        disallow_personal_access_token_saves!
        visit profile_personal_access_tokens_path

97
        click_on "Revoke"
98 99 100 101
        expect(active_personal_access_tokens).to have_text(personal_access_token.name)
        expect(page).to have_content("Could not revoke")
      end
    end
102 103
  end
end