debian-mirror-gitlab/spec/services/branches/delete_service_spec.rb

59 lines
1.6 KiB
Ruby
Raw Normal View History

2019-07-31 22:56:46 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Branches::DeleteService do
2017-08-17 22:00:37 +05:30
let(:project) { create(:project, :repository) }
let(:repository) { project.repository }
let(:user) { create(:user) }
2020-01-01 13:55:28 +05:30
subject(:service) { described_class.new(project, user) }
2017-08-17 22:00:37 +05:30
2019-07-31 22:56:46 +05:30
shared_examples 'a deleted branch' do |branch_name|
2020-07-28 23:09:34 +05:30
before do
allow(Ci::RefDeleteUnlockArtifactsWorker).to receive(:perform_async)
end
2019-07-31 22:56:46 +05:30
it 'removes the branch' do
expect(branch_exists?(branch_name)).to be true
result = service.execute(branch_name)
expect(result.status).to eq :success
expect(branch_exists?(branch_name)).to be false
end
2020-07-28 23:09:34 +05:30
it 'calls the RefDeleteUnlockArtifactsWorker' do
expect(Ci::RefDeleteUnlockArtifactsWorker).to receive(:perform_async).with(project.id, user.id, "refs/heads/#{branch_name}")
service.execute(branch_name)
end
2019-07-31 22:56:46 +05:30
end
2017-08-17 22:00:37 +05:30
describe '#execute' do
context 'when user has access to push to repository' do
before do
2018-03-17 18:26:18 +05:30
project.add_developer(user)
2017-08-17 22:00:37 +05:30
end
2019-07-31 22:56:46 +05:30
it_behaves_like 'a deleted branch', 'feature'
2017-08-17 22:00:37 +05:30
end
context 'when user does not have access to push to repository' do
it 'does not remove branch' do
expect(branch_exists?('feature')).to be true
result = service.execute('feature')
2019-07-31 22:56:46 +05:30
expect(result.status).to eq :error
expect(result.message).to eq 'You dont have push access to repo'
2017-08-17 22:00:37 +05:30
expect(branch_exists?('feature')).to be true
end
end
end
def branch_exists?(branch_name)
repository.ref_exists?("refs/heads/#{branch_name}")
end
end