diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2022-09-20 02:18:09 +0300 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2022-09-20 02:18:09 +0300 |
commit | 6ed4ec3e0b1340f96b7c043ef51d1b33bbe85fde (patch) | |
tree | dc4d20fe6064752c0bd323187252c77e0a89144b /spec/requests/api/graphql/project/branch_rules/branch_protection_spec.rb | |
parent | 9868dae7fc0655bd7ce4a6887d4e6d487690eeed (diff) |
Add latest changes from gitlab-org/gitlab@15-4-stable-eev15.4.0-rc42
Diffstat (limited to 'spec/requests/api/graphql/project/branch_rules/branch_protection_spec.rb')
-rw-r--r-- | spec/requests/api/graphql/project/branch_rules/branch_protection_spec.rb | 60 |
1 files changed, 60 insertions, 0 deletions
diff --git a/spec/requests/api/graphql/project/branch_rules/branch_protection_spec.rb b/spec/requests/api/graphql/project/branch_rules/branch_protection_spec.rb new file mode 100644 index 00000000000..8a3f546ef95 --- /dev/null +++ b/spec/requests/api/graphql/project/branch_rules/branch_protection_spec.rb @@ -0,0 +1,60 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe 'getting branch protection for a branch rule' do + include GraphqlHelpers + + let_it_be(:current_user) { create(:user) } + let_it_be(:branch_rule) { create(:protected_branch) } + let_it_be(:project) { branch_rule.project } + + let(:branch_protection_data) do + graphql_data_at('project', 'branchRules', 'nodes', 0, 'branchProtection') + end + + let(:variables) { { path: project.full_path } } + + let(:fields) { all_graphql_fields_for('BranchProtection') } + + let(:query) do + <<~GQL + query($path: ID!) { + project(fullPath: $path) { + branchRules(first: 1) { + nodes { + branchProtection { + #{fields} + } + } + } + } + } + GQL + end + + context 'when the user does not have read_protected_branch abilities' do + before do + project.add_guest(current_user) + post_graphql(query, current_user: current_user, variables: variables) + end + + it_behaves_like 'a working graphql query' + + it { expect(branch_protection_data).not_to be_present } + end + + context 'when the user does have read_protected_branch abilities' do + before do + project.add_maintainer(current_user) + post_graphql(query, current_user: current_user, variables: variables) + end + + it_behaves_like 'a working graphql query' + + it 'includes allow_force_push' do + expect(branch_protection_data['allowForcePush']).to be_in([true, false]) + expect(branch_protection_data['allowForcePush']).to eq(branch_rule.allow_force_push) + end + end +end |