debian-mirror-gitlab/spec/lib/gitlab/legacy_github_import/project_creator_spec.rb

124 lines
3.7 KiB
Ruby
Raw Normal View History

2020-01-01 13:55:28 +05:30
# frozen_string_literal: true
2015-04-26 12:48:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Gitlab::LegacyGithubImport::ProjectCreator do
2015-09-25 12:07:36 +05:30
let(:user) { create(:user) }
2018-10-15 14:42:47 +05:30
let(:namespace) { create(:group) }
2016-09-29 09:46:39 +05:30
2015-09-11 14:41:01 +05:30
let(:repo) do
OpenStruct.new(
login: 'vim',
name: 'vim',
full_name: 'asd/vim',
2016-09-29 09:46:39 +05:30
clone_url: 'https://gitlab.com/asd/vim.git'
2015-09-11 14:41:01 +05:30
)
end
2016-09-29 09:46:39 +05:30
subject(:service) { described_class.new(repo, repo.name, namespace, user, github_access_token: 'asdffg') }
2015-04-26 12:48:37 +05:30
before do
namespace.add_owner(user)
2018-11-08 19:23:39 +05:30
expect_next_instance_of(Project) do |project|
expect(project).to receive(:add_import_job)
end
2015-04-26 12:48:37 +05:30
end
2016-09-29 09:46:39 +05:30
describe '#execute' do
it 'creates a project' do
expect { service.execute }.to change(Project, :count).by(1)
end
it 'handle GitHub credentials' do
project = service.execute
expect(project.import_url).to eq('https://asdffg@gitlab.com/asd/vim.git')
expect(project.safe_import_url).to eq('https://*****@gitlab.com/asd/vim.git')
expect(project.import_data.credentials).to eq(user: 'asdffg', password: nil)
end
2016-11-03 12:29:30 +05:30
context 'when GitHub project is private' do
2016-09-29 09:46:39 +05:30
it 'sets project visibility to private' do
repo.private = true
project = service.execute
expect(project.visibility_level).to eq(Gitlab::VisibilityLevel::PRIVATE)
end
end
2016-11-03 12:29:30 +05:30
context 'when GitHub project is public' do
2019-07-31 22:56:46 +05:30
it 'sets project visibility to namespace visibility level' do
2016-09-29 09:46:39 +05:30
repo.private = false
project = service.execute
2015-09-11 14:41:01 +05:30
2019-07-31 22:56:46 +05:30
expect(project.visibility_level).to eq(namespace.visibility_level)
end
context 'when importing into a user namespace' do
subject(:service) { described_class.new(repo, repo.name, user.namespace, user, github_access_token: 'asdffg') }
it 'sets project visibility to user namespace visibility level' do
repo.private = false
project = service.execute
expect(project.visibility_level).to eq(user.namespace.visibility_level)
end
2018-11-08 19:23:39 +05:30
end
end
context 'when visibility level is restricted' do
context 'when GitHub project is private' do
before do
stub_application_setting(restricted_visibility_levels: [Gitlab::VisibilityLevel::PRIVATE])
allow_any_instance_of(ApplicationSetting).to receive(:default_project_visibility).and_return(Gitlab::VisibilityLevel::INTERNAL)
end
it 'sets project visibility to the default project visibility' do
repo.private = true
project = service.execute
expect(project.visibility_level).to eq(Gitlab::VisibilityLevel::INTERNAL)
end
end
context 'when GitHub project is public' do
before do
stub_application_setting(restricted_visibility_levels: [Gitlab::VisibilityLevel::PUBLIC])
allow_any_instance_of(ApplicationSetting).to receive(:default_project_visibility).and_return(Gitlab::VisibilityLevel::INTERNAL)
end
it 'sets project visibility to the default project visibility' do
repo.private = false
project = service.execute
expect(project.visibility_level).to eq(Gitlab::VisibilityLevel::INTERNAL)
end
2016-09-29 09:46:39 +05:30
end
end
2016-11-03 12:29:30 +05:30
context 'when GitHub project has wiki' do
it 'does not create the wiki repository' do
allow(repo).to receive(:has_wiki?).and_return(true)
project = service.execute
expect(project.wiki.repository_exists?).to eq false
end
end
context 'when GitHub project does not have wiki' do
it 'creates the wiki repository' do
allow(repo).to receive(:has_wiki?).and_return(false)
project = service.execute
expect(project.wiki.repository_exists?).to eq true
end
end
2015-04-26 12:48:37 +05:30
end
end