Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'spec/requests/api/project_job_token_scope_spec.rb')
-rw-r--r--spec/requests/api/project_job_token_scope_spec.rb76
1 files changed, 76 insertions, 0 deletions
diff --git a/spec/requests/api/project_job_token_scope_spec.rb b/spec/requests/api/project_job_token_scope_spec.rb
new file mode 100644
index 00000000000..df210a00012
--- /dev/null
+++ b/spec/requests/api/project_job_token_scope_spec.rb
@@ -0,0 +1,76 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe API::ProjectJobTokenScope, feature_category: :secrets_management do
+ describe 'GET /projects/:id/job_token_scope' do
+ let_it_be(:project) { create(:project, :public) }
+ let_it_be(:user) { create(:user) }
+
+ let(:get_job_token_scope_path) { "/projects/#{project.id}/job_token_scope" }
+
+ subject { get api(get_job_token_scope_path, user) }
+
+ context 'when unauthenticated user (missing user)' do
+ context 'for public project' do
+ it 'does not return ci cd settings of job token' do
+ project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
+
+ get api(get_job_token_scope_path)
+
+ expect(response).to have_gitlab_http_status(:unauthorized)
+ end
+ end
+ end
+
+ context 'when authenticated user as maintainer' do
+ before_all { project.add_maintainer(user) }
+
+ it 'returns ci cd settings for job token scope' do
+ subject
+
+ expect(response).to have_gitlab_http_status(:ok)
+ expect(json_response).to include(
+ "inbound_enabled" => true,
+ "outbound_enabled" => false
+ )
+ end
+
+ it 'returns the correct ci cd settings for job token scope after change' do
+ project.update!(ci_inbound_job_token_scope_enabled: false)
+
+ subject
+
+ expect(response).to have_gitlab_http_status(:ok)
+ expect(json_response).to include(
+ "inbound_enabled" => false,
+ "outbound_enabled" => false
+ )
+ end
+
+ it 'returns unauthorized and blank response when invalid auth credentials are given' do
+ invalid_personal_access_token = build(:personal_access_token, user: user)
+
+ get api(get_job_token_scope_path, user, personal_access_token: invalid_personal_access_token)
+
+ expect(response).to have_gitlab_http_status(:unauthorized)
+ expect(json_response).not_to include("inbound_enabled", "outbound_enabled")
+ end
+ end
+
+ context 'when authenticated user as developer' do
+ before do
+ project.add_developer(user)
+ end
+
+ it 'returns forbidden and no ci cd settings for public project' do
+ project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
+
+ subject
+
+ expect(response).to have_gitlab_http_status(:forbidden)
+ expect(json_response).not_to include("inbound_enabled", "outbound_enabled")
+ end
+ end
+ end
+end