debian-mirror-gitlab/spec/support_specs/stub_member_access_level_spec.rb
2023-06-20 00:43:36 +05:30

70 lines
2.1 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
require_relative '../support/stub_member_access_level'
RSpec.describe StubMemberAccessLevel, feature_category: :system_access do
include described_class
describe 'stub_member_access_level' do
shared_examples 'access level stubs' do
let(:guests) { build_stubbed_list(:user, 2) }
let(:maintainer) { build_stubbed(:user) }
let(:no_access) { build_stubbed(:user) }
it 'stubs max member access level per user' do
stub_member_access_level(object, maintainer: maintainer, guest: guests)
# Ensure that multple calls are allowed
2.times do
expect(access_level_for(maintainer)).to eq(Gitlab::Access::MAINTAINER)
expect(access_level_for(guests.first)).to eq(Gitlab::Access::GUEST)
expect(access_level_for(guests.last)).to eq(Gitlab::Access::GUEST)
# Partially stub so we expect a mock error.
expect { access_level_for(no_access) }.to raise_error(RSpec::Mocks::MockExpectationError)
end
end
it 'fails for unstubbed access' do
expect(access_level_for(no_access)).to eq(Gitlab::Access::NO_ACCESS)
end
it 'fails for invalid access level' do
expect { stub_member_access_level(object, unknown: :anything) }
.to raise_error(ArgumentError, "Invalid access level :unknown")
end
end
context 'with project' do
let(:object) { build_stubbed(:project) }
it_behaves_like 'access level stubs' do
def access_level_for(user)
object.team.max_member_access(user.id)
end
end
end
context 'with group' do
let(:object) { build_stubbed(:group) }
it_behaves_like 'access level stubs' do
def access_level_for(user)
object.max_member_access_for_user(user)
end
end
end
context 'with unsupported object' do
let(:object) { :a_symbol }
it 'raises an error' do
expect { stub_member_access_level(object) }
.to raise_error(ArgumentError, "Stubbing member access level unsupported for :a_symbol (Symbol)")
end
end
end
end