debian-mirror-gitlab/spec/requests/api/graphql/mutations/snippets/create_spec.rb

181 lines
5.5 KiB
Ruby
Raw Normal View History

2020-01-01 13:55:28 +05:30
# frozen_string_literal: true
require 'spec_helper'
describe 'Creating a Snippet' do
include GraphqlHelpers
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project) }
let(:content) { 'Initial content' }
let(:description) { 'Initial description' }
let(:title) { 'Initial title' }
let(:file_name) { 'Initial file_name' }
let(:visibility_level) { 'public' }
let(:project_path) { nil }
2020-05-24 23:13:21 +05:30
let(:uploaded_files) { nil }
2020-01-01 13:55:28 +05:30
let(:mutation) do
variables = {
content: content,
description: description,
visibility_level: visibility_level,
file_name: file_name,
title: title,
2020-05-24 23:13:21 +05:30
project_path: project_path,
uploaded_files: uploaded_files
2020-01-01 13:55:28 +05:30
}
graphql_mutation(:create_snippet, variables)
end
def mutation_response
graphql_mutation_response(:create_snippet)
end
2020-05-24 23:13:21 +05:30
subject { post_graphql_mutation(mutation, current_user: current_user) }
2020-01-01 13:55:28 +05:30
context 'when the user does not have permission' do
let(:current_user) { nil }
it_behaves_like 'a mutation that returns top-level errors',
errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
it 'does not create the Snippet' do
expect do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
end.not_to change { Snippet.count }
end
context 'when user is not authorized in the project' do
let(:project_path) { project.full_path }
it 'does not create the snippet when the user is not authorized' do
expect do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
end.not_to change { Snippet.count }
end
end
end
context 'when the user has permission' do
let(:current_user) { user }
context 'with PersonalSnippet' do
it 'creates the Snippet' do
expect do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
end.to change { Snippet.count }.by(1)
end
it 'returns the created Snippet' do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
expect(mutation_response['snippet']['blob']['richData']).to be_nil
2020-03-13 15:44:24 +05:30
expect(mutation_response['snippet']['blob']['plainData']).to match(content)
2020-01-01 13:55:28 +05:30
expect(mutation_response['snippet']['title']).to eq(title)
expect(mutation_response['snippet']['description']).to eq(description)
expect(mutation_response['snippet']['fileName']).to eq(file_name)
expect(mutation_response['snippet']['visibilityLevel']).to eq(visibility_level)
expect(mutation_response['snippet']['project']).to be_nil
end
end
context 'with ProjectSnippet' do
let(:project_path) { project.full_path }
before do
project.add_developer(current_user)
end
it 'creates the Snippet' do
expect do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
end.to change { Snippet.count }.by(1)
end
it 'returns the created Snippet' do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
expect(mutation_response['snippet']['blob']['richData']).to be_nil
2020-03-13 15:44:24 +05:30
expect(mutation_response['snippet']['blob']['plainData']).to match(content)
2020-01-01 13:55:28 +05:30
expect(mutation_response['snippet']['title']).to eq(title)
expect(mutation_response['snippet']['description']).to eq(description)
expect(mutation_response['snippet']['fileName']).to eq(file_name)
expect(mutation_response['snippet']['visibilityLevel']).to eq(visibility_level)
expect(mutation_response['snippet']['project']['fullPath']).to eq(project_path)
end
context 'when the project path is invalid' do
let(:project_path) { 'foobar' }
2020-06-23 00:09:42 +05:30
it_behaves_like 'a mutation that returns top-level errors',
errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
2020-01-01 13:55:28 +05:30
end
context 'when the feature is disabled' do
2020-06-23 00:09:42 +05:30
before do
2020-01-01 13:55:28 +05:30
project.project_feature.update_attribute(:snippets_access_level, ProjectFeature::DISABLED)
end
2020-06-23 00:09:42 +05:30
it_behaves_like 'a mutation that returns top-level errors',
errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
2020-01-01 13:55:28 +05:30
end
end
2020-06-23 00:09:42 +05:30
shared_examples 'does not create snippet' do
2020-01-01 13:55:28 +05:30
it 'does not create the Snippet' do
expect do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
end.not_to change { Snippet.count }
end
it 'does not return Snippet' do
2020-05-24 23:13:21 +05:30
subject
2020-01-01 13:55:28 +05:30
expect(mutation_response['snippet']).to be_nil
end
end
2020-05-24 23:13:21 +05:30
2020-06-23 00:09:42 +05:30
context 'when there are ActiveRecord validation errors' do
let(:title) { '' }
it_behaves_like 'a mutation that returns errors in the response', errors: ["Title can't be blank"]
it_behaves_like 'does not create snippet'
end
context 'when there non ActiveRecord errors' do
let(:file_name) { 'invalid://file/path' }
it_behaves_like 'a mutation that returns errors in the response', errors: ['Repository Error creating the snippet - Invalid file name']
it_behaves_like 'does not create snippet'
end
context 'when there are uploaded files' do
2020-05-24 23:13:21 +05:30
shared_examples 'expected files argument' do |file_value, expected_value|
let(:uploaded_files) { file_value }
it do
expect(::Snippets::CreateService).to receive(:new).with(nil, user, hash_including(files: expected_value))
subject
end
end
it_behaves_like 'expected files argument', nil, nil
it_behaves_like 'expected files argument', %w(foo bar), %w(foo bar)
it_behaves_like 'expected files argument', 'foo', %w(foo)
context 'when files has an invalid value' do
let(:uploaded_files) { [1] }
it 'returns an error' do
subject
expect(json_response['errors']).to be
end
end
end
2020-01-01 13:55:28 +05:30
end
end