debian-mirror-gitlab/spec/serializers/deploy_key_entity_spec.rb

123 lines
3.3 KiB
Ruby
Raw Normal View History

2019-12-21 20:55:43 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe DeployKeyEntity do
2017-08-17 22:00:37 +05:30
include RequestAwareEntity
2017-09-10 17:25:29 +05:30
2017-08-17 22:00:37 +05:30
let(:user) { create(:user) }
2017-09-10 17:25:29 +05:30
let(:project) { create(:project, :internal)}
let(:project_private) { create(:project, :private)}
2017-08-17 22:00:37 +05:30
let(:deploy_key) { create(:deploy_key) }
2020-07-28 23:09:34 +05:30
let(:options) { { user: user } }
2017-08-17 22:00:37 +05:30
2020-07-28 23:09:34 +05:30
let(:entity) { described_class.new(deploy_key, options) }
2017-08-17 22:00:37 +05:30
2019-12-21 20:55:43 +05:30
before do
project.deploy_keys << deploy_key
project_private.deploy_keys << deploy_key
end
2017-09-10 17:25:29 +05:30
describe 'returns deploy keys with projects a user can read' do
let(:expected_result) do
{
id: deploy_key.id,
user_id: deploy_key.user_id,
title: deploy_key.title,
fingerprint: deploy_key.fingerprint,
2020-03-13 15:44:24 +05:30
fingerprint_sha256: deploy_key.fingerprint_sha256,
2017-09-10 17:25:29 +05:30
destroyed_when_orphaned: true,
almost_orphaned: false,
created_at: deploy_key.created_at,
updated_at: deploy_key.updated_at,
can_edit: false,
2018-03-17 18:26:18 +05:30
deploy_keys_projects: [
2017-09-10 17:25:29 +05:30
{
2018-03-17 18:26:18 +05:30
can_push: false,
project:
{
id: project.id,
name: project.name,
full_path: project_path(project),
full_name: project.full_name
}
2017-09-10 17:25:29 +05:30
}
]
}
end
it { expect(entity.as_json).to eq(expected_result) }
end
2019-12-21 20:55:43 +05:30
context 'user is an admin' do
let(:user) { create(:user, :admin) }
2021-03-08 18:12:59 +05:30
context 'when admin mode is enabled', :enable_admin_mode do
it { expect(entity.as_json).to include(can_edit: true) }
end
context 'when admin mode is disabled' do
it { expect(entity.as_json).not_to include(can_edit: true) }
end
2019-12-21 20:55:43 +05:30
end
context 'user is a project maintainer' do
2017-09-10 17:25:29 +05:30
before do
2018-11-18 11:00:15 +05:30
project.add_maintainer(user)
2017-09-10 17:25:29 +05:30
end
2019-12-21 20:55:43 +05:30
context 'project deploy key' do
it { expect(entity.as_json).to include(can_edit: true) }
end
2017-09-10 17:25:29 +05:30
2019-12-21 20:55:43 +05:30
context 'public deploy key' do
let(:deploy_key_public) { create(:deploy_key, public: true) }
let(:entity_public) { described_class.new(deploy_key_public, { user: user, project: project }) }
2017-09-10 17:25:29 +05:30
2019-12-21 20:55:43 +05:30
before do
project.deploy_keys << deploy_key_public
end
it { expect(entity_public.as_json).to include(can_edit: true) }
end
2017-08-17 22:00:37 +05:30
end
2020-07-28 23:09:34 +05:30
describe 'with_owner option' do
it 'does not return an owner payload when it is set to false' do
options[:with_owner] = false
payload = entity.as_json
expect(payload[:owner]).not_to be_present
end
describe 'when with_owner is set to true' do
before do
options[:with_owner] = true
end
it 'returns an owner payload' do
payload = entity.as_json
expect(payload[:owner]).to be_present
expect(payload[:owner].keys).to include(:id, :name, :username, :avatar_url)
end
it 'does not return an owner if current_user cannot read the owner' do
allow(Ability).to receive(:allowed?).and_call_original
allow(Ability).to receive(:allowed?).with(options[:user], :read_user, deploy_key.user).and_return(false)
payload = entity.as_json
expect(payload[:owner]).to be_nil
end
end
end
it 'does not return an owner payload with_owner option not passed in' do
payload = entity.as_json
expect(payload[:owner]).not_to be_present
end
2017-08-17 22:00:37 +05:30
end