diff options
| author | Fabio Huser <fabio.huser@siemens.com> | 2022-01-09 14:43:45 +0100 |
|---|---|---|
| committer | John Villalovos <john@sodarock.com> | 2022-01-09 08:44:09 -0800 |
| commit | c01b7c494192c5462ec673848287ef2a5c9bd737 (patch) | |
| tree | c99ef98aed276746763ce941c767310162e85148 /tests | |
| parent | 73ae9559dc7f4fba5c80862f0f253959e60f7a0c (diff) | |
| download | gitlab-c01b7c494192c5462ec673848287ef2a5c9bd737.tar.gz | |
feat: add support for Group Access Token API
See https://docs.gitlab.com/ee/api/group_access_tokens.html
Diffstat (limited to 'tests')
| -rw-r--r-- | tests/unit/objects/test_group_access_tokens.py | 113 |
1 files changed, 113 insertions, 0 deletions
diff --git a/tests/unit/objects/test_group_access_tokens.py b/tests/unit/objects/test_group_access_tokens.py new file mode 100644 index 0000000..d7c352c --- /dev/null +++ b/tests/unit/objects/test_group_access_tokens.py @@ -0,0 +1,113 @@ +""" +GitLab API: https://docs.gitlab.com/ee/api/group_access_tokens.html +""" + +import pytest +import responses + + +@pytest.fixture +def resp_list_group_access_token(): + content = [ + { + "user_id": 141, + "scopes": ["api"], + "name": "token", + "expires_at": "2021-01-31", + "id": 42, + "active": True, + "created_at": "2021-01-20T22:11:48.151Z", + "revoked": False, + } + ] + + with responses.RequestsMock(assert_all_requests_are_fired=False) as rsps: + rsps.add( + method=responses.GET, + url="http://localhost/api/v4/groups/1/access_tokens", + json=content, + content_type="application/json", + status=200, + ) + yield rsps + + +@pytest.fixture +def resp_create_group_access_token(): + content = { + "user_id": 141, + "scopes": ["api"], + "name": "token", + "expires_at": "2021-01-31", + "id": 42, + "active": True, + "created_at": "2021-01-20T22:11:48.151Z", + "revoked": False, + } + + with responses.RequestsMock(assert_all_requests_are_fired=False) as rsps: + rsps.add( + method=responses.POST, + url="http://localhost/api/v4/groups/1/access_tokens", + json=content, + content_type="application/json", + status=200, + ) + yield rsps + + +@pytest.fixture +def resp_revoke_group_access_token(): + content = [ + { + "user_id": 141, + "scopes": ["api"], + "name": "token", + "expires_at": "2021-01-31", + "id": 42, + "active": True, + "created_at": "2021-01-20T22:11:48.151Z", + "revoked": False, + } + ] + + with responses.RequestsMock(assert_all_requests_are_fired=False) as rsps: + rsps.add( + method=responses.DELETE, + url="http://localhost/api/v4/groups/1/access_tokens/42", + json=content, + content_type="application/json", + status=204, + ) + rsps.add( + method=responses.GET, + url="http://localhost/api/v4/groups/1/access_tokens", + json=content, + content_type="application/json", + status=200, + ) + yield rsps + + +def test_list_group_access_tokens(gl, resp_list_group_access_token): + access_tokens = gl.groups.get(1, lazy=True).access_tokens.list() + assert len(access_tokens) == 1 + assert access_tokens[0].revoked is False + assert access_tokens[0].name == "token" + + +def test_create_group_access_token(gl, resp_create_group_access_token): + access_tokens = gl.groups.get(1, lazy=True).access_tokens.create( + {"name": "test", "scopes": ["api"]} + ) + assert access_tokens.revoked is False + assert access_tokens.user_id == 141 + assert access_tokens.expires_at == "2021-01-31" + + +def test_revoke_group_access_token( + gl, resp_list_group_access_token, resp_revoke_group_access_token +): + gl.groups.get(1, lazy=True).access_tokens.delete(42) + access_token = gl.groups.get(1, lazy=True).access_tokens.list()[0] + access_token.delete() |
