2020-02-19 22:08:57 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe API::DeployTokens do
|
2020-03-08 20:08:14 -04:00
|
|
|
let_it_be(:user) { create(:user) }
|
|
|
|
let_it_be(:creator) { create(:user) }
|
|
|
|
let_it_be(:project) { create(:project, creator_id: creator.id) }
|
|
|
|
let_it_be(:group) { create(:group) }
|
2020-02-19 22:08:57 -05:00
|
|
|
let!(:deploy_token) { create(:deploy_token, projects: [project]) }
|
2020-03-08 20:08:14 -04:00
|
|
|
let!(:group_deploy_token) { create(:deploy_token, :group, groups: [group]) }
|
2020-02-19 22:08:57 -05:00
|
|
|
|
2020-03-11 02:10:11 -04:00
|
|
|
shared_examples 'with feature flag disabled' do
|
|
|
|
context 'disabled feature flag' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(deploy_tokens_api: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:service_unavailable) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-02-19 22:08:57 -05:00
|
|
|
describe 'GET /deploy_tokens' do
|
2020-02-28 07:09:05 -05:00
|
|
|
subject do
|
|
|
|
get api('/deploy_tokens', user)
|
|
|
|
response
|
|
|
|
end
|
2020-02-19 22:08:57 -05:00
|
|
|
|
2020-03-11 02:10:11 -04:00
|
|
|
it_behaves_like 'with feature flag disabled'
|
|
|
|
|
2020-02-19 22:08:57 -05:00
|
|
|
context 'when unauthenticated' do
|
|
|
|
let(:user) { nil }
|
|
|
|
|
2020-02-28 07:09:05 -05:00
|
|
|
it { is_expected.to have_gitlab_http_status(:unauthorized) }
|
2020-02-19 22:08:57 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as non-admin user' do
|
|
|
|
let(:user) { creator }
|
|
|
|
|
2020-02-28 07:09:05 -05:00
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
2020-02-19 22:08:57 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as admin' do
|
|
|
|
let(:user) { create(:admin) }
|
|
|
|
|
2020-02-28 07:09:05 -05:00
|
|
|
it { is_expected.to have_gitlab_http_status(:ok) }
|
|
|
|
|
2020-02-19 22:08:57 -05:00
|
|
|
it 'returns all deploy tokens' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(response).to include_pagination_headers
|
2020-02-28 07:09:05 -05:00
|
|
|
expect(response).to match_response_schema('public_api/v4/deploy_tokens')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /projects/:id/deploy_tokens' do
|
|
|
|
subject do
|
|
|
|
get api("/projects/#{project.id}/deploy_tokens", user)
|
|
|
|
response
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when unauthenticated' do
|
|
|
|
let(:user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:not_found) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as non-admin user' do
|
|
|
|
before do
|
|
|
|
project.add_developer(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as maintainer' do
|
|
|
|
let!(:other_deploy_token) { create(:deploy_token) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.add_maintainer(user)
|
|
|
|
end
|
|
|
|
|
2020-03-11 02:10:11 -04:00
|
|
|
it_behaves_like 'with feature flag disabled'
|
|
|
|
|
2020-02-28 07:09:05 -05:00
|
|
|
it { is_expected.to have_gitlab_http_status(:ok) }
|
|
|
|
|
|
|
|
it 'returns all deploy tokens for the project' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(response).to include_pagination_headers
|
|
|
|
expect(response).to match_response_schema('public_api/v4/deploy_tokens')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not return deploy tokens for other projects' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
token_ids = json_response.map { |token| token['id'] }
|
|
|
|
expect(token_ids).not_to include(other_deploy_token.id)
|
2020-02-19 22:08:57 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-03-08 20:08:14 -04:00
|
|
|
|
2020-03-11 02:10:11 -04:00
|
|
|
describe 'GET /groups/:id/deploy_tokens' do
|
|
|
|
subject do
|
|
|
|
get api("/groups/#{group.id}/deploy_tokens", user)
|
|
|
|
response
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when unauthenticated' do
|
|
|
|
let(:user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as non-admin user' do
|
|
|
|
before do
|
|
|
|
group.add_developer(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as maintainer' do
|
|
|
|
let!(:other_deploy_token) { create(:deploy_token, :group) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.add_maintainer(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'with feature flag disabled'
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:ok) }
|
|
|
|
|
|
|
|
it 'returns all deploy tokens for the group' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(response).to include_pagination_headers
|
|
|
|
expect(response).to match_response_schema('public_api/v4/deploy_tokens')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not return deploy tokens for other groups' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
token_ids = json_response.map { |token| token['id'] }
|
|
|
|
expect(token_ids).not_to include(other_deploy_token.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-03-12 08:09:17 -04:00
|
|
|
describe 'DELETE /projects/:id/deploy_tokens/:token_id' do
|
2020-03-08 20:08:14 -04:00
|
|
|
subject do
|
2020-03-12 08:09:17 -04:00
|
|
|
delete api("/projects/#{project.id}/deploy_tokens/#{deploy_token.id}", user)
|
2020-03-08 20:08:14 -04:00
|
|
|
response
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when unauthenticated' do
|
|
|
|
let(:user) { nil }
|
|
|
|
|
2020-03-12 08:09:17 -04:00
|
|
|
it { is_expected.to have_gitlab_http_status(:not_found) }
|
2020-03-08 20:08:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as non-admin user' do
|
|
|
|
before do
|
2020-03-12 08:09:17 -04:00
|
|
|
project.add_developer(user)
|
2020-03-08 20:08:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as maintainer' do
|
|
|
|
before do
|
2020-03-12 08:09:17 -04:00
|
|
|
project.add_maintainer(user)
|
2020-03-08 20:08:14 -04:00
|
|
|
end
|
|
|
|
|
2020-03-12 08:09:17 -04:00
|
|
|
it { is_expected.to have_gitlab_http_status(:no_content) }
|
2020-03-08 20:08:14 -04:00
|
|
|
|
2020-04-02 08:08:18 -04:00
|
|
|
it 'calls the deploy token destroy service' do
|
|
|
|
expect(::Projects::DeployTokens::DestroyService).to receive(:new)
|
|
|
|
.with(project, user, token_id: deploy_token.id)
|
|
|
|
.and_return(true)
|
|
|
|
|
|
|
|
subject
|
2020-03-08 20:08:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'invalid request' do
|
2020-03-11 02:10:11 -04:00
|
|
|
it 'returns not found with invalid group id' do
|
2020-03-12 08:09:17 -04:00
|
|
|
delete api("/projects/bad_id/deploy_tokens/#{group_deploy_token.id}", user)
|
2020-03-08 20:08:14 -04:00
|
|
|
|
2020-03-11 02:10:11 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
2020-03-08 20:08:14 -04:00
|
|
|
end
|
|
|
|
|
2020-03-12 08:09:17 -04:00
|
|
|
it 'returns bad_request with invalid token id' do
|
2020-04-02 08:08:18 -04:00
|
|
|
expect(::Projects::DeployTokens::DestroyService).to receive(:new)
|
|
|
|
.with(project, user, token_id: 999)
|
|
|
|
.and_raise(ActiveRecord::RecordNotFound)
|
|
|
|
|
|
|
|
delete api("/projects/#{project.id}/deploy_tokens/999", user)
|
2020-03-08 20:08:14 -04:00
|
|
|
|
2020-04-02 08:08:18 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
2020-03-08 20:08:14 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
context 'deploy token creation' do
|
|
|
|
shared_examples 'creating a deploy token' do |entity, unauthenticated_response|
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
name: 'Foo',
|
|
|
|
expires_at: 1.year.from_now,
|
|
|
|
scopes: [
|
|
|
|
'read_repository'
|
|
|
|
],
|
|
|
|
username: 'Bar'
|
|
|
|
}
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
context 'when unauthenticated' do
|
|
|
|
let(:user) { nil }
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
it { is_expected.to have_gitlab_http_status(unauthenticated_response) }
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
context 'when authenticated as non-admin user' do
|
|
|
|
before do
|
|
|
|
send(entity).add_developer(user)
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
2020-03-10 05:08:10 -04:00
|
|
|
end
|
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
context 'when authenticated as maintainer' do
|
|
|
|
before do
|
|
|
|
send(entity).add_maintainer(user)
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
it 'creates the deploy token' do
|
|
|
|
expect { subject }.to change { DeployToken.count }.by(1)
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:created)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/deploy_token')
|
|
|
|
end
|
2020-03-26 14:08:03 -04:00
|
|
|
|
|
|
|
context 'with no optional params given' do
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
name: 'Foo',
|
|
|
|
scopes: [
|
|
|
|
'read_repository'
|
|
|
|
]
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates the deploy token with default values' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:created)
|
|
|
|
expect(json_response['username']).to match(/gitlab\+deploy-token-\d+/)
|
|
|
|
expect(json_response['expires_at']).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
context 'with an invalid scope' do
|
|
|
|
before do
|
|
|
|
params[:scopes] = %w[read_repository all_access]
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
it { is_expected.to have_gitlab_http_status(:bad_request) }
|
2020-03-10 05:08:10 -04:00
|
|
|
end
|
2020-03-11 17:09:19 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'POST /projects/:id/deploy_tokens' do
|
|
|
|
subject do
|
|
|
|
post api("/projects/#{project.id}/deploy_tokens", user), params: params
|
|
|
|
response
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'creating a deploy token', :project, :not_found
|
|
|
|
end
|
2020-03-10 05:08:10 -04:00
|
|
|
|
2020-03-11 17:09:19 -04:00
|
|
|
describe 'POST /groups/:id/deploy_tokens' do
|
|
|
|
subject do
|
|
|
|
post api("/groups/#{group.id}/deploy_tokens", user), params: params
|
|
|
|
response
|
2020-03-10 05:08:10 -04:00
|
|
|
end
|
2020-03-11 17:09:19 -04:00
|
|
|
|
|
|
|
it_behaves_like 'creating a deploy token', :group, :forbidden
|
2020-03-10 05:08:10 -04:00
|
|
|
end
|
|
|
|
end
|
2020-03-12 08:09:17 -04:00
|
|
|
|
|
|
|
describe 'DELETE /groups/:id/deploy_tokens/:token_id' do
|
|
|
|
subject do
|
|
|
|
delete api("/groups/#{group.id}/deploy_tokens/#{group_deploy_token.id}", user)
|
|
|
|
response
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when unauthenticated' do
|
|
|
|
let(:user) { nil }
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as non-admin user' do
|
|
|
|
before do
|
|
|
|
group.add_developer(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { is_expected.to have_gitlab_http_status(:forbidden) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated as maintainer' do
|
|
|
|
before do
|
|
|
|
group.add_maintainer(user)
|
|
|
|
end
|
|
|
|
|
2020-04-02 08:08:18 -04:00
|
|
|
it 'calls the deploy token destroy service' do
|
|
|
|
expect(::Groups::DeployTokens::DestroyService).to receive(:new)
|
|
|
|
.with(group, user, token_id: group_deploy_token.id)
|
|
|
|
.and_return(true)
|
2020-03-12 08:09:17 -04:00
|
|
|
|
2020-04-02 08:08:18 -04:00
|
|
|
subject
|
2020-03-12 08:09:17 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'invalid request' do
|
|
|
|
it 'returns bad request with invalid group id' do
|
|
|
|
delete api("/groups/bad_id/deploy_tokens/#{group_deploy_token.id}", user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns not found with invalid deploy token id' do
|
2020-04-02 08:08:18 -04:00
|
|
|
expect(::Groups::DeployTokens::DestroyService).to receive(:new)
|
|
|
|
.with(group, user, token_id: 999)
|
|
|
|
.and_raise(ActiveRecord::RecordNotFound)
|
|
|
|
|
|
|
|
delete api("/groups/#{group.id}/deploy_tokens/999", user)
|
2020-03-12 08:09:17 -04:00
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-02-19 22:08:57 -05:00
|
|
|
end
|