debian-mirror-gitlab/spec/services/web_hooks/destroy_service_spec.rb
2023-05-27 22:25:52 +05:30

63 lines
1.8 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe WebHooks::DestroyService, feature_category: :webhooks do
let_it_be(:user) { create(:user) }
subject { described_class.new(user) }
describe '#execute' do
# Testing with a project hook only - for permission tests, see policy specs.
let!(:hook) { create(:project_hook) }
let!(:log) { create_list(:web_hook_log, 3, web_hook: hook) }
context 'when the user does not have permission' do
it 'is an error' do
expect(subject.execute(hook))
.to be_error
.and have_attributes(message: described_class::DENIED)
end
end
context 'when the user does have permission' do
before do
hook.project.add_maintainer(user)
end
it 'is successful' do
expect(subject.execute(hook)).to be_success
end
it 'destroys the hook' do
expect { subject.execute(hook) }.to change(WebHook, :count).from(1).to(0)
end
it 'does not destroy logs' do
expect { subject.execute(hook) }.not_to change(WebHookLog, :count)
end
it 'schedules the destruction of logs' do
expect(WebHooks::LogDestroyWorker).to receive(:perform_async).with({ 'hook_id' => hook.id })
expect(Gitlab::AppLogger).to receive(:info).with(match(/scheduled a deletion of logs/))
subject.execute(hook)
end
context 'when the hook fails to destroy' do
before do
allow(hook).to receive(:destroy).and_return(false)
end
it 'is not a success' do
expect(WebHooks::LogDestroyWorker).not_to receive(:perform_async)
r = subject.execute(hook)
expect(r).to be_error
expect(r[:message]).to match %r{Unable to destroy}
end
end
end
end
end