debian-mirror-gitlab/spec/services/groups/open_issues_count_service_spec.rb

110 lines
3.6 KiB
Ruby
Raw Normal View History

2021-03-11 19:13:27 +05:30
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Groups::OpenIssuesCountService, :use_clean_rails_memory_store_caching do
2021-11-11 11:23:49 +05:30
let_it_be(:group) { create(:group, :public) }
2021-03-11 19:13:27 +05:30
let_it_be(:project) { create(:project, :public, namespace: group) }
2021-11-11 11:23:49 +05:30
let_it_be(:admin) { create(:user, :admin) }
2021-03-11 19:13:27 +05:30
let_it_be(:user) { create(:user) }
2021-11-11 11:23:49 +05:30
let_it_be(:banned_user) { create(:user, :banned) }
before do
create(:issue, :opened, project: project)
create(:issue, :opened, confidential: true, project: project)
create(:issue, :opened, author: banned_user, project: project)
create(:issue, :closed, project: project)
end
2021-03-11 19:13:27 +05:30
subject { described_class.new(group, user) }
describe '#relation_for_count' do
before do
allow(IssuesFinder).to receive(:new).and_call_original
end
it 'uses the IssuesFinder to scope issues' do
expect(IssuesFinder)
.to receive(:new)
2021-11-11 11:23:49 +05:30
.with(user, group_id: group.id, state: 'opened', non_archived: true, include_subgroups: true, public_only: true, include_hidden: false)
2021-03-11 19:13:27 +05:30
subject.count
end
end
describe '#count' do
2021-11-11 11:23:49 +05:30
shared_examples 'counts public issues, does not count hidden or confidential' do
it 'counts only public issues' do
expect(subject.count).to eq(1)
end
it 'uses PUBLIC_COUNT_WITHOUT_HIDDEN_KEY cache key' do
expect(subject.cache_key).to include('group_open_public_issues_without_hidden_count')
2021-03-11 19:13:27 +05:30
end
end
2021-11-11 11:23:49 +05:30
context 'when user is nil' do
let(:user) { nil }
it_behaves_like 'counts public issues, does not count hidden or confidential'
end
2021-03-11 19:13:27 +05:30
context 'when user is provided' do
context 'when user can read confidential issues' do
before do
group.add_reporter(user)
end
2021-11-11 11:23:49 +05:30
it 'includes confidential issues and does not include hidden issues in count' do
2021-03-11 19:13:27 +05:30
expect(subject.count).to eq(2)
end
2021-11-11 11:23:49 +05:30
it 'uses TOTAL_COUNT_WITHOUT_HIDDEN_KEY cache key' do
expect(subject.cache_key).to include('group_open_issues_without_hidden_count')
end
2021-03-11 19:13:27 +05:30
end
context 'when user cannot read confidential issues' do
before do
group.add_guest(user)
end
2021-11-11 11:23:49 +05:30
it_behaves_like 'counts public issues, does not count hidden or confidential'
end
context 'when user is an admin' do
let(:user) { admin }
context 'when admin mode is enabled', :enable_admin_mode do
it 'includes confidential and hidden issues in count' do
expect(subject.count).to eq(3)
end
it 'uses TOTAL_COUNT_KEY cache key' do
expect(subject.cache_key).to include('group_open_issues_including_hidden_count')
end
end
context 'when admin mode is disabled' do
it_behaves_like 'counts public issues, does not count hidden or confidential'
2021-03-11 19:13:27 +05:30
end
end
2021-04-29 21:17:54 +05:30
it_behaves_like 'a counter caching service with threshold'
2021-03-11 19:13:27 +05:30
end
end
2021-06-08 01:23:25 +05:30
describe '#clear_all_cache_keys' do
it 'calls `Rails.cache.delete` with the correct keys' do
expect(Rails.cache).to receive(:delete)
2021-11-11 11:23:49 +05:30
.with(['groups', 'open_issues_count_service', 1, group.id, described_class::PUBLIC_COUNT_WITHOUT_HIDDEN_KEY])
2021-06-08 01:23:25 +05:30
expect(Rails.cache).to receive(:delete)
.with(['groups', 'open_issues_count_service', 1, group.id, described_class::TOTAL_COUNT_KEY])
2021-11-11 11:23:49 +05:30
expect(Rails.cache).to receive(:delete)
.with(['groups', 'open_issues_count_service', 1, group.id, described_class::TOTAL_COUNT_WITHOUT_HIDDEN_KEY])
2021-06-08 01:23:25 +05:30
2021-11-11 11:23:49 +05:30
described_class.new(group).clear_all_cache_keys
2021-06-08 01:23:25 +05:30
end
end
2021-03-11 19:13:27 +05:30
end