105 lines
3.4 KiB
Ruby
105 lines
3.4 KiB
Ruby
# frozen_string_literal: true
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe Packages::Cleanup::UpdatePolicyService do
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
let_it_be_with_reload(:project) { create(:project) }
|
|
let_it_be(:current_user) { create(:user) }
|
|
|
|
let(:params) { { keep_n_duplicated_package_files: 50 } }
|
|
|
|
describe '#execute' do
|
|
subject { described_class.new(project: project, current_user: current_user, params: params).execute }
|
|
|
|
shared_examples 'creating the policy' do
|
|
it 'creates a new one' do
|
|
expect { subject }.to change { ::Packages::Cleanup::Policy.count }.from(0).to(1)
|
|
|
|
expect(subject.payload[:packages_cleanup_policy]).to be_present
|
|
expect(subject.success?).to be_truthy
|
|
expect(project.packages_cleanup_policy).to be_persisted
|
|
expect(project.packages_cleanup_policy.keep_n_duplicated_package_files).to eq('50')
|
|
end
|
|
|
|
context 'with invalid parameters' do
|
|
let(:params) { { keep_n_duplicated_package_files: 100 } }
|
|
|
|
it 'does not create one' do
|
|
expect { subject }.not_to change { ::Packages::Cleanup::Policy.count }
|
|
|
|
expect(subject.status).to eq(:error)
|
|
expect(subject.message).to eq('Keep n duplicated package files is invalid')
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'updating the policy' do
|
|
it 'updates the existing one' do
|
|
expect { subject }.not_to change { ::Packages::Cleanup::Policy.count }
|
|
|
|
expect(subject.payload[:packages_cleanup_policy]).to be_present
|
|
expect(subject.success?).to be_truthy
|
|
expect(project.packages_cleanup_policy.keep_n_duplicated_package_files).to eq('50')
|
|
end
|
|
|
|
context 'with invalid parameters' do
|
|
let(:params) { { keep_n_duplicated_package_files: 100 } }
|
|
|
|
it 'does not update one' do
|
|
expect { subject }.not_to change { policy.keep_n_duplicated_package_files }
|
|
|
|
expect(subject.status).to eq(:error)
|
|
expect(subject.message).to eq('Keep n duplicated package files is invalid')
|
|
end
|
|
end
|
|
end
|
|
|
|
shared_examples 'denying access' do
|
|
it 'returns an error' do
|
|
subject
|
|
|
|
expect(subject.message).to eq('Access denied')
|
|
expect(subject.status).to eq(:error)
|
|
end
|
|
end
|
|
|
|
context 'with existing container expiration policy' do
|
|
let_it_be(:policy) { create(:packages_cleanup_policy, project: project) }
|
|
|
|
where(:user_role, :shared_examples_name) do
|
|
:maintainer | 'updating the policy'
|
|
:developer | 'denying access'
|
|
:reporter | 'denying access'
|
|
:guest | 'denying access'
|
|
:anonymous | 'denying access'
|
|
end
|
|
|
|
with_them do
|
|
before do
|
|
project.send("add_#{user_role}", current_user) unless user_role == :anonymous
|
|
end
|
|
|
|
it_behaves_like params[:shared_examples_name]
|
|
end
|
|
end
|
|
|
|
context 'without existing container expiration policy' do
|
|
where(:user_role, :shared_examples_name) do
|
|
:maintainer | 'creating the policy'
|
|
:developer | 'denying access'
|
|
:reporter | 'denying access'
|
|
:guest | 'denying access'
|
|
:anonymous | 'denying access'
|
|
end
|
|
|
|
with_them do
|
|
before do
|
|
project.send("add_#{user_role}", current_user) unless user_role == :anonymous
|
|
end
|
|
|
|
it_behaves_like params[:shared_examples_name]
|
|
end
|
|
end
|
|
end
|
|
end
|