Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
G
Gitlab-External-Templates
Manage
Activity
Members
Labels
Plan
Issues
0
Issue boards
Milestones
Wiki
Code
Merge requests
0
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package Registry
Container Registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Adri
Gitlab-External-Templates
Commits
93e65d8e
Commit
93e65d8e
authored
5 years ago
by
Steve Abrams
Browse files
Options
Downloads
Patches
Plain Diff
Remove code in other MR
parent
85865824
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
ee/spec/requests/api/conan_packages_spec.rb
+5
-6
5 additions, 6 deletions
ee/spec/requests/api/conan_packages_spec.rb
with
5 additions
and
6 deletions
ee/spec/requests/api/conan_packages_spec.rb
+
5
−
6
View file @
93e65d8e
...
...
@@ -12,6 +12,11 @@
)
end
let
(
:personal_access_token
)
{
create
(
:personal_access_token
)
}
let
(
:headers
)
do
{
'HTTP_AUTHORIZATION'
=>
ActionController
::
HttpAuthentication
::
Basic
.
encode_credentials
(
'foo'
,
personal_access_token
.
token
)
}
end
before
do
stub_licensed_features
(
packages:
true
)
allow
(
Settings
).
to
receive
(
:attr_encrypted_db_key_base
).
and_return
(
base_secret
)
...
...
@@ -45,7 +50,6 @@ def build_jwt(personal_access_token, secret: jwt_secret, user_id: nil)
end
it
'responds with 200 OK when valid token is provided'
do
personal_access_token
=
create
(
:personal_access_token
)
jwt
=
build_jwt
(
personal_access_token
)
headers
=
{
'HTTP_AUTHORIZATION'
=>
"Bearer
#{
jwt
.
encoded
}
"
}
...
...
@@ -56,7 +60,6 @@ def build_jwt(personal_access_token, secret: jwt_secret, user_id: nil)
end
it
'responds with 401 Unauthorized when invalid access token ID is provided'
do
personal_access_token
=
create
(
:personal_access_token
)
jwt
=
build_jwt
(
double
(
id:
12345
),
user_id:
personal_access_token
.
user_id
)
headers
=
{
'HTTP_AUTHORIZATION'
=>
"Bearer
#{
jwt
.
encoded
}
"
}
get
api
(
'/packages/conan/v1/ping'
),
headers:
headers
...
...
@@ -65,7 +68,6 @@ def build_jwt(personal_access_token, secret: jwt_secret, user_id: nil)
end
it
'responds with 401 Unauthorized when invalid user is provided'
do
personal_access_token
=
create
(
:personal_access_token
)
jwt
=
build_jwt
(
personal_access_token
,
user_id:
12345
)
headers
=
{
'HTTP_AUTHORIZATION'
=>
"Bearer
#{
jwt
.
encoded
}
"
}
get
api
(
'/packages/conan/v1/ping'
),
headers:
headers
...
...
@@ -74,7 +76,6 @@ def build_jwt(personal_access_token, secret: jwt_secret, user_id: nil)
end
it
'responds with 401 Unauthorized when the provided JWT is signed with different secret'
do
personal_access_token
=
create
(
:personal_access_token
)
jwt
=
build_jwt
(
personal_access_token
,
secret:
SecureRandom
.
base64
(
32
))
headers
=
{
'HTTP_AUTHORIZATION'
=>
"Bearer
#{
jwt
.
encoded
}
"
}
get
api
(
'/packages/conan/v1/ping'
),
headers:
headers
...
...
@@ -109,8 +110,6 @@ def build_jwt(personal_access_token, secret: jwt_secret, user_id: nil)
end
it
'responds with 200 OK and JWT when valid access token is provided'
do
personal_access_token
=
create
(
:personal_access_token
)
headers
=
{
'HTTP_AUTHORIZATION'
=>
ActionController
::
HttpAuthentication
::
Basic
.
encode_credentials
(
'foo'
,
personal_access_token
.
token
)
}
get
api
(
'/packages/conan/v1/users/authenticate'
),
headers:
headers
expect
(
response
).
to
have_gitlab_http_status
(
200
)
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment