1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe ProjectAuthorization, feature_category: :groups_and_projects do
describe 'create' do
let_it_be(:user) { create(:user) }
let_it_be(:project_1) { create(:project) }
let(:project_auth) do
build(
:project_authorization,
user: user,
project: project_1
)
end
it 'sets is_unique' do
expect { project_auth.save! }.to change { project_auth.is_unique }.to(true)
end
end
describe 'unique user, project authorizations' do
let_it_be(:user) { create(:user) }
let_it_be(:project_1) { create(:project) }
let!(:project_auth) do
create(
:project_authorization,
user: user,
project: project_1,
access_level: Gitlab::Access::DEVELOPER
)
end
context 'with duplicate user and project authorization' do
subject do
project_auth.dup.tap do |auth|
auth.project = project_1
auth.user = user
end
end
it { is_expected.to be_invalid }
context 'after validation' do
before do
subject.valid?
end
it 'contains duplicate error' do
expect(subject.errors[:user]).to include('has already been taken')
end
end
end
context 'with multiple access levels for the same user and project' do
subject do
project_auth.dup.tap do |auth|
auth.project = project_1
auth.user = user
auth.access_level = Gitlab::Access::MAINTAINER
end
end
it { is_expected.to be_invalid }
context 'after validation' do
before do
subject.valid?
end
it 'contains duplicate error' do
expect(subject.errors[:user]).to include('has already been taken')
end
end
end
end
describe 'relations' do
it { is_expected.to belong_to(:user) }
it { is_expected.to belong_to(:project) }
end
describe 'validations' do
it { is_expected.to validate_presence_of(:project) }
it { is_expected.to validate_presence_of(:user) }
it { is_expected.to validate_presence_of(:access_level) }
it { is_expected.to validate_inclusion_of(:access_level).in_array(Gitlab::Access.all_values) }
end
describe 'scopes' do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project, namespace: user.namespace) }
describe '.non_guests' do
let_it_be(:project_original_owner_authorization) { project.owner.project_authorizations.first }
let_it_be(:project_authorization_guest) { create(:project_authorization, :guest, project: project) }
let_it_be(:project_authorization_reporter) { create(:project_authorization, :reporter, project: project) }
let_it_be(:project_authorization_developer) { create(:project_authorization, :developer, project: project) }
let_it_be(:project_authorization_maintainer) { create(:project_authorization, :maintainer, project: project) }
let_it_be(:project_authorization_owner) { create(:project_authorization, :owner, project: project) }
it 'returns all records which are greater than Guests access' do
expect(described_class.non_guests.map(&:attributes)).to match_array([
project_authorization_reporter, project_authorization_developer,
project_authorization_maintainer, project_authorization_owner,
project_original_owner_authorization
].map(&:attributes))
end
end
describe '.owners' do
let_it_be(:project_original_owner_authorization) { project.owner.project_authorizations.first }
let_it_be(:project_authorization_owner) { create(:project_authorization, :owner, project: project) }
before_all do
create(:project_authorization, :guest, project: project)
create(:project_authorization, :developer, project: project)
end
it 'returns all records which only have Owners access' do
expect(described_class.owners.map(&:attributes)).to match_array([
project_original_owner_authorization,
project_authorization_owner
].map(&:attributes))
end
end
describe '.for_project' do
let_it_be(:project_2) { create(:project, namespace: user.namespace) }
let_it_be(:project_3) { create(:project, namespace: user.namespace) }
let_it_be(:project_authorization_3) { project_3.project_authorizations.first }
let_it_be(:project_authorization_2) { project_2.project_authorizations.first }
let_it_be(:project_authorization) { project.project_authorizations.first }
it 'returns all records for the project' do
expect(described_class.for_project(project).map(&:attributes)).to match_array([
project_authorization
].map(&:attributes))
end
it 'returns all records for multiple projects' do
expect(described_class.for_project([project, project_3]).map(&:attributes)).to match_array([
project_authorization,
project_authorization_3
].map(&:attributes))
end
end
end
describe '.insert_all' do
let_it_be(:user) { create(:user) }
let_it_be(:project_1) { create(:project) }
let_it_be(:project_2) { create(:project) }
let_it_be(:project_3) { create(:project) }
it 'skips duplicates and inserts the remaining rows without error' do
create(:project_authorization, user: user, project: project_1, access_level: Gitlab::Access::MAINTAINER)
attributes = [
{ user_id: user.id, project_id: project_1.id, access_level: Gitlab::Access::MAINTAINER },
{ user_id: user.id, project_id: project_2.id, access_level: Gitlab::Access::MAINTAINER },
{ user_id: user.id, project_id: project_3.id, access_level: Gitlab::Access::MAINTAINER }
]
described_class.insert_all(attributes)
expect(user.project_authorizations.pluck(:user_id, :project_id, :access_level)).to match_array(attributes.map(&:values))
end
end
context 'with loose foreign key on project_authorizations.user_id' do
it_behaves_like 'cleanup by a loose foreign key' do
let_it_be(:parent) { create(:user) }
let_it_be(:model) { create(:project_authorization, user: parent) }
end
end
end
|