debian-mirror-gitlab/spec/lib/gitlab/checks/diff_check_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

81 lines
2.3 KiB
Ruby
Raw Normal View History

2019-02-15 15:39:39 +05:30
# frozen_string_literal: true
require 'spec_helper'
2023-05-27 22:25:52 +05:30
RSpec.describe Gitlab::Checks::DiffCheck, feature_category: :source_code_management do
2019-02-15 15:39:39 +05:30
include_context 'change access checks context'
describe '#validate!' do
2023-05-27 22:25:52 +05:30
context 'when ref is not tag or branch ref' do
let(:ref) { 'refs/notes/commit' }
it 'does not call find_changed_paths' do
expect(project.repository).not_to receive(:find_changed_paths)
subject.validate!
end
end
2021-03-08 18:12:59 +05:30
context 'when commits is empty' do
it 'does not call find_changed_paths' do
expect(project.repository).not_to receive(:find_changed_paths)
2019-02-15 15:39:39 +05:30
subject.validate!
end
end
2021-03-08 18:12:59 +05:30
context 'when commits is not empty' do
2019-02-15 15:39:39 +05:30
before do
2021-03-08 18:12:59 +05:30
allow(project.repository).to receive(:new_commits).and_return(
project.repository.commits_between('be93687618e4b132087f430a4d8fc3a609c9b77c', '54fcc214b94e78d7a41a9a8fe6d87a5e59500e51')
)
2019-02-15 15:39:39 +05:30
end
2021-03-08 18:12:59 +05:30
context 'when deletion is true' do
let(:newrev) { Gitlab::Git::BLANK_SHA }
2021-02-22 17:27:13 +05:30
2021-03-08 18:12:59 +05:30
it 'does not call find_changed_paths' do
expect(project.repository).not_to receive(:find_changed_paths)
2021-02-22 17:27:13 +05:30
2021-03-08 18:12:59 +05:30
subject.validate!
2019-02-15 15:39:39 +05:30
end
end
2021-03-08 18:12:59 +05:30
context 'with LFS not enabled' do
before do
allow(project).to receive(:lfs_enabled?).and_return(false)
2019-02-15 15:39:39 +05:30
end
2021-03-08 18:12:59 +05:30
it 'does not invoke :lfs_file_locks_validation' do
expect(subject).not_to receive(:lfs_file_locks_validation)
2019-02-15 15:39:39 +05:30
subject.validate!
end
end
2021-03-08 18:12:59 +05:30
context 'with LFS enabled' do
let(:owner) { create(:user) }
let!(:lock) { create(:lfs_file_lock, user: owner, project: project, path: 'README') }
2019-02-15 15:39:39 +05:30
2021-03-08 18:12:59 +05:30
before do
allow(project).to receive(:lfs_enabled?).and_return(true)
2019-02-15 15:39:39 +05:30
end
2021-03-08 18:12:59 +05:30
context 'when change is sent by a different user' do
it 'raises an error if the user is not allowed to update the file' do
expect { subject.validate! }.to raise_error(Gitlab::GitAccess::ForbiddenError, "The path 'README' is locked in Git LFS by #{lock.user.name}")
end
end
2019-02-15 15:39:39 +05:30
2021-03-08 18:12:59 +05:30
context 'when change is sent by the author of the lock' do
let(:user) { owner }
2019-02-15 15:39:39 +05:30
2021-03-08 18:12:59 +05:30
it "doesn't raise any error" do
expect { subject.validate! }.not_to raise_error
end
2019-02-15 15:39:39 +05:30
end
end
end
end
end