debian-mirror-gitlab/spec/services/issues/reopen_service_spec.rb

59 lines
1.7 KiB
Ruby
Raw Normal View History

2016-09-13 17:45:13 +05:30
require 'spec_helper'
2017-09-10 17:25:29 +05:30
describe Issues::ReopenService do
let(:project) { create(:project) }
2016-09-29 09:46:39 +05:30
let(:issue) { create(:issue, :closed, project: project) }
2016-09-13 17:45:13 +05:30
describe '#execute' do
2016-09-29 09:46:39 +05:30
context 'when user is not authorized to reopen issue' do
2016-09-13 17:45:13 +05:30
before do
2016-09-29 09:46:39 +05:30
guest = create(:user)
project.team << [guest, :guest]
2016-09-13 17:45:13 +05:30
perform_enqueued_jobs do
2016-09-29 09:46:39 +05:30
described_class.new(project, guest).execute(issue)
2016-09-13 17:45:13 +05:30
end
end
it 'does not reopen the issue' do
2016-09-29 09:46:39 +05:30
expect(issue).to be_closed
end
end
context 'when user is authrized to reopen issue' do
let(:user) { create(:user) }
before do
project.team << [user, :master]
end
2017-08-17 22:00:37 +05:30
it 'invalidates counter cache for assignees' do
issue.assignees << user
expect_any_instance_of(User).to receive(:invalidate_issue_cache_counts)
described_class.new(project, user).execute(issue)
end
2016-09-29 09:46:39 +05:30
context 'when issue is not confidential' do
it 'executes issue hooks' do
expect(project).to receive(:execute_hooks).with(an_instance_of(Hash), :issue_hooks)
expect(project).to receive(:execute_services).with(an_instance_of(Hash), :issue_hooks)
described_class.new(project, user).execute(issue)
end
end
context 'when issue is confidential' do
it 'executes confidential issue hooks' do
issue = create(:issue, :confidential, :closed, project: project)
expect(project).to receive(:execute_hooks).with(an_instance_of(Hash), :confidential_issue_hooks)
expect(project).to receive(:execute_services).with(an_instance_of(Hash), :confidential_issue_hooks)
described_class.new(project, user).execute(issue)
end
2016-09-13 17:45:13 +05:30
end
end
end
end