2019-07-31 22:56:46 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe Branches::DeleteService do
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:project) { create(:project, :repository) }
|
|
|
|
let(:repository) { project.repository }
|
|
|
|
let(:user) { create(:user) }
|
2020-01-01 13:55:28 +05:30
|
|
|
|
|
|
|
subject(:service) { described_class.new(project, user) }
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
shared_examples 'a deleted branch' do |branch_name|
|
2020-07-28 23:09:34 +05:30
|
|
|
before do
|
|
|
|
allow(Ci::RefDeleteUnlockArtifactsWorker).to receive(:perform_async)
|
|
|
|
end
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
it 'removes the branch' do
|
|
|
|
expect(branch_exists?(branch_name)).to be true
|
|
|
|
|
|
|
|
result = service.execute(branch_name)
|
|
|
|
|
|
|
|
expect(result.status).to eq :success
|
|
|
|
expect(branch_exists?(branch_name)).to be false
|
|
|
|
end
|
2020-07-28 23:09:34 +05:30
|
|
|
|
|
|
|
it 'calls the RefDeleteUnlockArtifactsWorker' do
|
|
|
|
expect(Ci::RefDeleteUnlockArtifactsWorker).to receive(:perform_async).with(project.id, user.id, "refs/heads/#{branch_name}")
|
|
|
|
|
|
|
|
service.execute(branch_name)
|
|
|
|
end
|
2019-07-31 22:56:46 +05:30
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
describe '#execute' do
|
|
|
|
context 'when user has access to push to repository' do
|
|
|
|
before do
|
2018-03-17 18:26:18 +05:30
|
|
|
project.add_developer(user)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
it_behaves_like 'a deleted branch', 'feature'
|
2020-11-24 15:15:51 +05:30
|
|
|
|
|
|
|
context 'when Gitlab::Git::CommandError is raised' do
|
|
|
|
before do
|
|
|
|
allow(repository).to receive(:rm_branch) do
|
2021-06-08 01:23:25 +05:30
|
|
|
raise Gitlab::Git::CommandError, 'Could not update patch'
|
2020-11-24 15:15:51 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'handles and returns error' do
|
|
|
|
result = service.execute('feature')
|
|
|
|
|
|
|
|
expect(result.status).to eq(:error)
|
|
|
|
expect(result.message).to eq('Could not update patch')
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user does not have access to push to repository' do
|
|
|
|
it 'does not remove branch' do
|
|
|
|
expect(branch_exists?('feature')).to be true
|
|
|
|
|
|
|
|
result = service.execute('feature')
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
expect(result.status).to eq :error
|
|
|
|
expect(result.message).to eq 'You dont have push access to repo'
|
2017-08-17 22:00:37 +05:30
|
|
|
expect(branch_exists?('feature')).to be true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def branch_exists?(branch_name)
|
|
|
|
repository.ref_exists?("refs/heads/#{branch_name}")
|
|
|
|
end
|
|
|
|
end
|