Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'spec/services/application_settings/update_service_spec.rb')
-rw-r--r--spec/services/application_settings/update_service_spec.rb28
1 files changed, 26 insertions, 2 deletions
diff --git a/spec/services/application_settings/update_service_spec.rb b/spec/services/application_settings/update_service_spec.rb
index 03e55b3ec46..46483fede97 100644
--- a/spec/services/application_settings/update_service_spec.rb
+++ b/spec/services/application_settings/update_service_spec.rb
@@ -49,7 +49,7 @@ RSpec.describe ApplicationSettings::UpdateService do
expect(application_settings.terms).to eq('Be nice!')
end
- it 'Only queries once when the terms are changed' do
+ it 'only queries once when the terms are changed' do
create(:term, terms: 'Other terms')
expect(application_settings.terms).to eq('Other terms')
@@ -257,7 +257,7 @@ RSpec.describe ApplicationSettings::UpdateService do
described_class.new(application_settings, admin, { external_authorization_service_enabled: false }).execute
end
- it 'does validate labels if external authorization gets enabled ' do
+ it 'does validate labels if external authorization gets enabled' do
expect_any_instance_of(described_class).to receive(:validate_classification_label)
described_class.new(application_settings, admin, { external_authorization_service_enabled: true }).execute
@@ -350,4 +350,28 @@ RSpec.describe ApplicationSettings::UpdateService do
expect(application_settings.issues_create_limit).to eq(600)
end
end
+
+ context 'when require_admin_approval_after_user_signup changes' do
+ context 'when it goes from enabled to disabled' do
+ let(:params) { { require_admin_approval_after_user_signup: false } }
+
+ it 'calls ApproveBlockedPendingApprovalUsersWorker' do
+ expect(ApproveBlockedPendingApprovalUsersWorker).to receive(:perform_async)
+
+ subject.execute
+ end
+ end
+
+ context 'when it goes from disabled to enabled' do
+ let(:params) { { require_admin_approval_after_user_signup: true } }
+
+ it 'does not call ApproveBlockedPendingApprovalUsersWorker' do
+ application_settings.update!(require_admin_approval_after_user_signup: false)
+
+ expect(ApproveBlockedPendingApprovalUsersWorker).not_to receive(:perform_async)
+
+ subject.execute
+ end
+ end
+ end
end