debian-mirror-gitlab/spec/serializers/group_child_entity_spec.rb

173 lines
4.2 KiB
Ruby
Raw Normal View History

2019-12-21 20:55:43 +05:30
# frozen_string_literal: true
2018-03-17 18:26:18 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe GroupChildEntity do
2019-07-07 11:18:12 +05:30
include ExternalAuthorizationServiceHelpers
2018-03-17 18:26:18 +05:30
include Gitlab::Routing.url_helpers
let(:user) { create(:user) }
let(:request) { double('request') }
let(:entity) { described_class.new(object, request: request) }
2020-01-01 13:55:28 +05:30
2018-03-17 18:26:18 +05:30
subject(:json) { entity.as_json }
before do
allow(request).to receive(:current_user).and_return(user)
2019-03-02 22:35:43 +05:30
stub_commonmark_sourcepos_disabled
2018-03-17 18:26:18 +05:30
end
shared_examples 'group child json' do
it 'renders json' do
is_expected.not_to be_nil
end
%w[id
full_name
avatar_url
name
description
markdown_description
visibility
type
can_edit
visibility
permission
relative_path].each do |attribute|
it "includes #{attribute}" do
expect(json[attribute.to_sym]).to be_present
end
end
end
describe 'for a project' do
let(:object) do
create(:project, :with_avatar,
description: 'Awesomeness')
end
before do
2018-11-18 11:00:15 +05:30
object.add_maintainer(user)
2018-03-17 18:26:18 +05:30
end
it 'has the correct type' do
expect(json[:type]).to eq('project')
end
it 'includes the star count' do
expect(json[:star_count]).to be_present
end
it 'has the correct edit path' do
expect(json[:edit_path]).to eq(edit_project_path(object))
end
2022-03-02 08:16:31 +05:30
it 'includes the last activity at' do
expect(json[:last_activity_at]).to be_present
end
2018-03-17 18:26:18 +05:30
it_behaves_like 'group child json'
end
2019-10-12 21:52:04 +05:30
describe 'for a group' do
2018-03-17 18:26:18 +05:30
let(:description) { 'Awesomeness' }
let(:object) do
create(:group, :nested, :with_avatar,
description: description)
end
before do
object.add_owner(user)
end
it 'has the correct type' do
expect(json[:type]).to eq('group')
end
it 'counts projects and subgroups as children' do
create(:project, namespace: object)
create(:group, parent: object)
expect(json[:children_count]).to eq(2)
end
2021-11-11 11:23:49 +05:30
%w[children_count leave_path parent_id number_users_with_delimiter project_count subgroup_count].each do |attribute|
2018-03-17 18:26:18 +05:30
it "includes #{attribute}" do
expect(json[attribute.to_sym]).to be_present
end
end
it 'allows an owner to leave when there is another one' do
object.add_owner(create(:user))
expect(json[:can_leave]).to be_truthy
end
it 'has the correct edit path' do
expect(json[:edit_path]).to eq(edit_group_path(object))
end
context 'emoji in description' do
let(:description) { ':smile:' }
it 'has the correct markdown_description' do
expect(json[:markdown_description]).to eq('<p dir="auto"><gl-emoji title="smiling face with open mouth and smiling eyes" data-name="smile" data-unicode-version="6.0">😄</gl-emoji></p>')
end
end
it_behaves_like 'group child json'
end
2019-07-07 11:18:12 +05:30
2021-11-11 11:23:49 +05:30
describe 'for a private group' do
let(:object) do
create(:group, :private)
end
describe 'user is member of the group' do
before do
object.add_owner(user)
end
it 'includes the counts' do
expect(json.keys).to include(*%i(project_count subgroup_count))
end
end
describe 'user is not a member of the group' do
it 'does not include the counts' do
expect(json.keys).not_to include(*%i(project_count subgroup_count))
end
end
describe 'user is only a member of a project in the group' do
let(:project) { create(:project, namespace: object) }
before do
project.add_guest(user)
end
it 'does not include the counts' do
expect(json.keys).not_to include(*%i(project_count subgroup_count))
end
end
end
2019-07-07 11:18:12 +05:30
describe 'for a project with external authorization enabled' do
let(:object) do
create(:project, :with_avatar,
description: 'Awesomeness')
end
before do
enable_external_authorization_service_check
object.add_maintainer(user)
end
it 'does not hit the external authorization service' do
expect(::Gitlab::ExternalAuthorization).not_to receive(:access_allowed?)
expect(json[:can_edit]).to eq(false)
end
end
2018-03-17 18:26:18 +05:30
end