debian-mirror-gitlab/spec/models/members/project_member_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

274 lines
9.2 KiB
Ruby
Raw Permalink Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2015-04-26 12:48:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe ProjectMember do
describe 'associations' do
2017-08-17 22:00:37 +05:30
it { is_expected.to belong_to(:project).with_foreign_key(:source_id) }
end
describe 'validations' do
it { is_expected.to allow_value('Project').for(:source_type) }
2023-05-27 22:25:52 +05:30
it { is_expected.not_to allow_value('Group').for(:source_type) }
2016-09-13 17:45:13 +05:30
it { is_expected.to validate_inclusion_of(:access_level).in_array(Gitlab::Access.values) }
end
2023-01-13 00:05:48 +05:30
describe 'default values' do
it { expect(described_class.new.source_type).to eq('Project') }
end
2021-04-29 21:17:54 +05:30
describe 'delegations' do
it { is_expected.to delegate_method(:namespace_id).to(:project) }
end
2016-11-03 12:29:30 +05:30
describe '.access_level_roles' do
it 'returns Gitlab::Access.options' do
expect(described_class.access_level_roles).to eq(Gitlab::Access.options)
end
end
2022-07-23 23:45:48 +05:30
describe '#permissible_access_level_roles' do
let_it_be(:owner) { create(:user) }
let_it_be(:maintainer) { create(:user) }
let_it_be(:group) { create(:group) }
let_it_be(:project) { create(:project, group: group) }
before do
project.add_owner(owner)
project.add_maintainer(maintainer)
end
context 'when member can manage owners' do
it 'returns Gitlab::Access.options_with_owner' do
expect(described_class.permissible_access_level_roles(owner, project)).to eq(Gitlab::Access.options_with_owner)
end
end
context 'when member cannot manage owners' do
it 'returns Gitlab::Access.options' do
expect(described_class.permissible_access_level_roles(maintainer, project)).to eq(Gitlab::Access.options)
end
end
end
describe '#real_source_type' do
subject { create(:project_member).real_source_type }
it { is_expected.to eq 'Project' }
end
describe "#destroy" do
2018-11-18 11:00:15 +05:30
let(:owner) { create(:project_member, access_level: ProjectMember::MAINTAINER) }
let(:project) { owner.project }
2019-03-02 22:35:43 +05:30
let(:maintainer) { create(:project_member, project: project) }
2017-08-17 22:00:37 +05:30
it "creates an expired event when left due to expiry" do
2020-10-04 03:57:07 +05:30
expired = create(:project_member, project: project, expires_at: 1.day.from_now)
2021-06-08 01:23:25 +05:30
travel_to(2.days.from_now) { expired.destroy! }
2020-10-04 03:57:07 +05:30
2020-06-23 00:09:42 +05:30
expect(Event.recent.first).to be_expired_action
2017-08-17 22:00:37 +05:30
end
it "creates a left event when left due to leave" do
2021-06-08 01:23:25 +05:30
maintainer.destroy!
2020-06-23 00:09:42 +05:30
expect(Event.recent.first).to be_left_action
2017-08-17 22:00:37 +05:30
end
2021-09-04 01:27:46 +05:30
context 'for an orphaned member' do
let!(:orphaned_project_member) do
owner.tap { |member| member.update_column(:user_id, nil) }
end
it 'does not raise an error' do
expect { orphaned_project_member.destroy! }.not_to raise_error
end
end
end
2023-03-04 22:38:38 +05:30
describe '#holder_of_the_personal_namespace?' do
let_it_be(:project_member) { build(:project_member) }
using RSpec::Parameterized::TableSyntax
where(:personal_namespace_holder?, :expected) do
false | false
true | true
end
with_them do
it "returns expected" do
allow(project_member.project).to receive(:personal_namespace_holder?)
.with(project_member.user)
.and_return(personal_namespace_holder?)
expect(project_member.holder_of_the_personal_namespace?).to be(expected)
end
end
end
2016-08-24 12:49:21 +05:30
describe '.truncate_teams' do
2015-04-26 12:48:37 +05:30
before do
2017-09-10 17:25:29 +05:30
@project_1 = create(:project)
@project_2 = create(:project)
2015-04-26 12:48:37 +05:30
@user_1 = create :user
@user_2 = create :user
2018-03-17 18:26:18 +05:30
@project_1.add_developer(@user_1)
@project_2.add_reporter(@user_2)
2015-04-26 12:48:37 +05:30
2017-09-10 17:25:29 +05:30
described_class.truncate_teams([@project_1.id, @project_2.id])
2015-04-26 12:48:37 +05:30
end
it { expect(@project_1.users).to be_empty }
it { expect(@project_2.users).to be_empty }
end
2018-10-15 14:42:47 +05:30
it_behaves_like 'members notifications', :project
2019-02-15 15:39:39 +05:30
context 'access levels' do
context 'with parent group' do
it_behaves_like 'inherited access level as a member of entity' do
let(:entity) { create(:project, group: parent_entity) }
end
end
2019-10-12 21:52:04 +05:30
context 'with parent group and a subgroup' do
2019-02-15 15:39:39 +05:30
it_behaves_like 'inherited access level as a member of entity' do
let(:subgroup) { create(:group, parent: parent_entity) }
let(:entity) { create(:project, group: subgroup) }
end
end
end
2021-10-27 15:23:28 +05:30
context 'refreshing project_authorizations' do
let_it_be_with_refind(:project) { create(:project) }
let_it_be_with_refind(:user) { create(:user) }
let_it_be(:project_member) { create(:project_member, :guest, project: project, user: user) }
context 'when the source project of the project member is destroyed' do
it 'refreshes the authorization of user to the project in the group' do
expect { project.destroy! }.to change { user.can?(:guest_access, project) }.from(true).to(false)
end
2022-08-13 15:12:31 +05:30
it 'refreshes the authorization without calling AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker' do
2023-04-23 21:23:45 +05:30
# this is inline with the overridden behaviour in stubbed_member.rb
expect(AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker).not_to receive(:new)
2021-10-27 15:23:28 +05:30
project.destroy!
end
end
context 'when the user of the project member is destroyed' do
it 'refreshes the authorization of user to the project in the group' do
expect(project.authorized_users).to include(user)
user.destroy!
expect(project.authorized_users).not_to include(user)
end
2023-04-23 21:23:45 +05:30
it 'refreshes the authorization without calling `AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker`' do
# this is inline with the overridden behaviour in stubbed_member.rb
expect(AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker).not_to receive(:new)
2021-10-27 15:23:28 +05:30
user.destroy!
end
end
context 'when importing' do
it 'does not refresh' do
2023-04-23 21:23:45 +05:30
# this is inline with the overridden behaviour in stubbed_member.rb
expect(AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker).not_to receive(:new)
2021-10-27 15:23:28 +05:30
2022-10-11 01:57:18 +05:30
member = build(:project_member, project: project)
2021-10-27 15:23:28 +05:30
member.importing = true
member.save!
end
end
end
context 'authorization refresh on addition/updation/deletion' do
let_it_be(:project) { create(:project) }
let_it_be(:user) { create(:user) }
2022-08-13 15:12:31 +05:30
shared_examples_for 'calls AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker inline to recalculate authorizations' do
2022-08-27 11:52:29 +05:30
# this is inline with the overridden behaviour in stubbed_member.rb
it 'calls AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker inline' do
worker_instance = AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker.new
expect(AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker).to receive(:new).and_return(worker_instance)
expect(worker_instance).to receive(:perform).with(project.id, user.id)
2021-10-27 15:23:28 +05:30
action
end
end
shared_examples_for 'calls AuthorizedProjectUpdate::UserRefreshFromReplicaWorker with a delay to update project authorizations' do
it 'calls AuthorizedProjectUpdate::UserRefreshFromReplicaWorker' do
2023-04-23 21:23:45 +05:30
stub_feature_flags(do_not_run_safety_net_auth_refresh_jobs: false)
2021-10-27 15:23:28 +05:30
expect(AuthorizedProjectUpdate::UserRefreshFromReplicaWorker).to(
receive(:bulk_perform_in)
.with(1.hour,
[[user.id]],
batch_delay: 30.seconds, batch_size: 100)
)
action
end
end
context 'on create' do
2022-08-13 15:12:31 +05:30
let(:action) { project.add_member(user, Gitlab::Access::GUEST) }
2021-10-27 15:23:28 +05:30
it 'changes access level' do
expect { action }.to change { user.can?(:guest_access, project) }.from(false).to(true)
end
2022-08-13 15:12:31 +05:30
it_behaves_like 'calls AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker inline to recalculate authorizations'
2021-10-27 15:23:28 +05:30
it_behaves_like 'calls AuthorizedProjectUpdate::UserRefreshFromReplicaWorker with a delay to update project authorizations'
end
context 'on update' do
let(:action) { project.members.find_by(user: user).update!(access_level: Gitlab::Access::DEVELOPER) }
before do
2022-08-13 15:12:31 +05:30
project.add_member(user, Gitlab::Access::GUEST)
2021-10-27 15:23:28 +05:30
end
it 'changes access level' do
expect { action }.to change { user.can?(:developer_access, project) }.from(false).to(true)
end
2022-08-13 15:12:31 +05:30
it_behaves_like 'calls AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker inline to recalculate authorizations'
2021-10-27 15:23:28 +05:30
it_behaves_like 'calls AuthorizedProjectUpdate::UserRefreshFromReplicaWorker with a delay to update project authorizations'
end
context 'on destroy' do
let(:action) { project.members.find_by(user: user).destroy! }
before do
2022-08-13 15:12:31 +05:30
project.add_member(user, Gitlab::Access::GUEST)
2021-10-27 15:23:28 +05:30
end
2023-04-23 21:23:45 +05:30
it 'changes access level' do
2021-10-27 15:23:28 +05:30
expect { action }.to change { user.can?(:guest_access, project) }.from(true).to(false)
end
2023-04-23 21:23:45 +05:30
it_behaves_like 'calls AuthorizedProjectUpdate::ProjectRecalculatePerUserWorker inline to recalculate authorizations'
2021-10-27 15:23:28 +05:30
it_behaves_like 'calls AuthorizedProjectUpdate::UserRefreshFromReplicaWorker with a delay to update project authorizations'
end
end
2022-04-04 11:22:00 +05:30
describe '#set_member_namespace_id' do
let(:project) { create(:project) }
let(:member) { create(:project_member, project: project) }
context 'on create' do
it 'sets the member_namespace_id' do
expect(member.member_namespace_id).to eq project.project_namespace_id
end
end
end
2015-04-26 12:48:37 +05:30
end