summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorFabio Huser <fabio.huser@siemens.com>2022-01-09 14:43:45 +0100
committerJohn Villalovos <john@sodarock.com>2022-01-09 08:44:09 -0800
commitc01b7c494192c5462ec673848287ef2a5c9bd737 (patch)
treec99ef98aed276746763ce941c767310162e85148 /tests
parent73ae9559dc7f4fba5c80862f0f253959e60f7a0c (diff)
downloadgitlab-c01b7c494192c5462ec673848287ef2a5c9bd737.tar.gz
feat: add support for Group Access Token API
See https://docs.gitlab.com/ee/api/group_access_tokens.html
Diffstat (limited to 'tests')
-rw-r--r--tests/unit/objects/test_group_access_tokens.py113
1 files changed, 113 insertions, 0 deletions
diff --git a/tests/unit/objects/test_group_access_tokens.py b/tests/unit/objects/test_group_access_tokens.py
new file mode 100644
index 0000000..d7c352c
--- /dev/null
+++ b/tests/unit/objects/test_group_access_tokens.py
@@ -0,0 +1,113 @@
+"""
+GitLab API: https://docs.gitlab.com/ee/api/group_access_tokens.html
+"""
+
+import pytest
+import responses
+
+
+@pytest.fixture
+def resp_list_group_access_token():
+ content = [
+ {
+ "user_id": 141,
+ "scopes": ["api"],
+ "name": "token",
+ "expires_at": "2021-01-31",
+ "id": 42,
+ "active": True,
+ "created_at": "2021-01-20T22:11:48.151Z",
+ "revoked": False,
+ }
+ ]
+
+ with responses.RequestsMock(assert_all_requests_are_fired=False) as rsps:
+ rsps.add(
+ method=responses.GET,
+ url="http://localhost/api/v4/groups/1/access_tokens",
+ json=content,
+ content_type="application/json",
+ status=200,
+ )
+ yield rsps
+
+
+@pytest.fixture
+def resp_create_group_access_token():
+ content = {
+ "user_id": 141,
+ "scopes": ["api"],
+ "name": "token",
+ "expires_at": "2021-01-31",
+ "id": 42,
+ "active": True,
+ "created_at": "2021-01-20T22:11:48.151Z",
+ "revoked": False,
+ }
+
+ with responses.RequestsMock(assert_all_requests_are_fired=False) as rsps:
+ rsps.add(
+ method=responses.POST,
+ url="http://localhost/api/v4/groups/1/access_tokens",
+ json=content,
+ content_type="application/json",
+ status=200,
+ )
+ yield rsps
+
+
+@pytest.fixture
+def resp_revoke_group_access_token():
+ content = [
+ {
+ "user_id": 141,
+ "scopes": ["api"],
+ "name": "token",
+ "expires_at": "2021-01-31",
+ "id": 42,
+ "active": True,
+ "created_at": "2021-01-20T22:11:48.151Z",
+ "revoked": False,
+ }
+ ]
+
+ with responses.RequestsMock(assert_all_requests_are_fired=False) as rsps:
+ rsps.add(
+ method=responses.DELETE,
+ url="http://localhost/api/v4/groups/1/access_tokens/42",
+ json=content,
+ content_type="application/json",
+ status=204,
+ )
+ rsps.add(
+ method=responses.GET,
+ url="http://localhost/api/v4/groups/1/access_tokens",
+ json=content,
+ content_type="application/json",
+ status=200,
+ )
+ yield rsps
+
+
+def test_list_group_access_tokens(gl, resp_list_group_access_token):
+ access_tokens = gl.groups.get(1, lazy=True).access_tokens.list()
+ assert len(access_tokens) == 1
+ assert access_tokens[0].revoked is False
+ assert access_tokens[0].name == "token"
+
+
+def test_create_group_access_token(gl, resp_create_group_access_token):
+ access_tokens = gl.groups.get(1, lazy=True).access_tokens.create(
+ {"name": "test", "scopes": ["api"]}
+ )
+ assert access_tokens.revoked is False
+ assert access_tokens.user_id == 141
+ assert access_tokens.expires_at == "2021-01-31"
+
+
+def test_revoke_group_access_token(
+ gl, resp_list_group_access_token, resp_revoke_group_access_token
+):
+ gl.groups.get(1, lazy=True).access_tokens.delete(42)
+ access_token = gl.groups.get(1, lazy=True).access_tokens.list()[0]
+ access_token.delete()