Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2019-11-08 12:06:07 +0300
committerGitLab Bot <gitlab-bot@gitlab.com>2019-11-08 12:06:07 +0300
commitd23b2a0871f3ca507aafa949e0314625f1f0c6a7 (patch)
treeb1e26c7460bdae25f19103e14978a3aaeef52037 /spec/services/groups
parent1ef4b65f55f4fc6524a47050b4f6d686beb81d3a (diff)
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/services/groups')
-rw-r--r--spec/services/groups/transfer_service_spec.rb30
-rw-r--r--spec/services/groups/update_service_spec.rb61
2 files changed, 59 insertions, 32 deletions
diff --git a/spec/services/groups/transfer_service_spec.rb b/spec/services/groups/transfer_service_spec.rb
index 5ef1fb1932f..9a490dfd779 100644
--- a/spec/services/groups/transfer_service_spec.rb
+++ b/spec/services/groups/transfer_service_spec.rb
@@ -427,20 +427,34 @@ describe Groups::TransferService do
end
end
- context 'when a project in group has container images' do
+ context 'when a project has container images' do
let(:group) { create(:group, :public, :nested) }
- let!(:project) { create(:project, :repository, :public, namespace: group) }
+ let!(:container_repository) { create(:container_repository, project: project) }
+
+ subject { transfer_service.execute(new_parent_group) }
before do
- stub_container_registry_tags(repository: /image/, tags: %w[rc1])
- create(:container_repository, project: project, name: :image)
- create(:group_member, :owner, group: new_parent_group, user: user)
+ group.add_owner(user)
+ new_parent_group.add_owner(user)
end
- it 'does not allow group to be transferred' do
- transfer_service.execute(new_parent_group)
+ context 'within group' do
+ let(:project) { create(:project, :repository, :public, namespace: group) }
+
+ it 'does not transfer' do
+ expect(subject).to be false
+ expect(transfer_service.error).to match(/Docker images in their Container Registry/)
+ end
+ end
- expect(transfer_service.error).to match(/Docker images in their Container Registry/)
+ context 'within subgroup' do
+ let(:subgroup) { create(:group, parent: group) }
+ let(:project) { create(:project, :repository, :public, namespace: subgroup) }
+
+ it 'does not transfer' do
+ expect(subject).to be false
+ expect(transfer_service.error).to match(/Docker images in their Container Registry/)
+ end
end
end
end
diff --git a/spec/services/groups/update_service_spec.rb b/spec/services/groups/update_service_spec.rb
index ca8eaf4c970..1aa7e06182b 100644
--- a/spec/services/groups/update_service_spec.rb
+++ b/spec/services/groups/update_service_spec.rb
@@ -32,6 +32,43 @@ describe Groups::UpdateService do
expect(service.execute).to be_falsey
end
+
+ context 'when a project has container images' do
+ let(:params) { { path: SecureRandom.hex } }
+ let!(:container_repository) { create(:container_repository, project: project) }
+
+ subject { described_class.new(public_group, user, params).execute }
+
+ context 'within group' do
+ let(:project) { create(:project, group: public_group) }
+
+ context 'with path updates' do
+ it 'does not allow the update' do
+ expect(subject).to be false
+ expect(public_group.errors[:base].first).to match(/Docker images in their Container Registry/)
+ end
+ end
+
+ context 'with name updates' do
+ let(:params) { { name: 'new-name' } }
+
+ it 'allows the update' do
+ expect(subject).to be true
+ expect(public_group.reload.name).to eq('new-name')
+ end
+ end
+ end
+
+ context 'within subgroup' do
+ let(:subgroup) { create(:group, parent: public_group) }
+ let(:project) { create(:project, group: subgroup) }
+
+ it 'does not allow path updates' do
+ expect(subject).to be false
+ expect(public_group.errors[:base].first).to match(/Docker images in their Container Registry/)
+ end
+ end
+ end
end
context "internal group with internal project" do
@@ -148,30 +185,6 @@ describe Groups::UpdateService do
end
end
- context 'projects in group have container images' do
- let(:service) { described_class.new(public_group, user, path: SecureRandom.hex) }
- let(:project) { create(:project, :internal, group: public_group) }
-
- before do
- stub_container_registry_tags(repository: /image/, tags: %w[rc1])
- create(:container_repository, project: project, name: :image)
- end
-
- it 'does not allow path to be changed' do
- result = described_class.new(public_group, user, path: 'new-path').execute
-
- expect(result).to eq false
- expect(public_group.errors[:base].first).to match(/Docker images in their Container Registry/)
- end
-
- it 'allows other settings to be changed' do
- result = described_class.new(public_group, user, name: 'new-name').execute
-
- expect(result).to eq true
- expect(public_group.reload.name).to eq('new-name')
- end
- end
-
context 'for a subgroup' do
let(:subgroup) { create(:group, :private, parent: private_group) }