1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Projects::WorkItemsController, feature_category: :team_planning do
let_it_be(:reporter) { create(:user) }
let_it_be(:guest) { create(:user) }
let_it_be(:project) { create(:project) }
let_it_be(:work_item) { create(:work_item, project: project) }
let(:file) { 'file' }
before do
project.add_reporter(reporter)
project.add_guest(guest)
end
shared_examples 'response with 404 status' do
it 'renders a not found message' do
expect(WorkItems::ImportWorkItemsCsvWorker).not_to receive(:perform_async)
subject
expect(response).to have_gitlab_http_status(:not_found)
end
end
shared_examples 'redirects to new session path' do
it 'redirects to sign in' do
subject
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(new_user_session_path)
end
end
describe 'GET index' do
specify do
expect(
get(:index, params: { namespace_id: project.namespace, project_id: project, work_items_path: work_item.id })
).to have_request_urgency(:low)
end
end
describe 'POST authorize' do
subject do
post(:authorize, params: { namespace_id: project.namespace, project_id: project, file: file })
end
specify do
expect(subject).to have_request_urgency(:high)
end
context 'when user is anonymous' do
it_behaves_like 'redirects to new session path'
end
end
describe 'POST import_csv' do
subject { post :import_csv, params: { namespace_id: project.namespace, project_id: project, file: file } }
let(:upload_service) { double }
let(:uploader) { double }
let(:upload) { double }
let(:upload_id) { 99 }
specify do
expect(subject).to have_request_urgency(:low)
end
context 'with authorized user' do
before do
sign_in(reporter)
allow(controller).to receive(:file_is_valid?).and_return(true)
end
context 'when feature is available' do
context 'when the upload is processed successfully' do
before do
mock_upload
end
it 'renders the correct message' do
expect(WorkItems::ImportWorkItemsCsvWorker).to receive(:perform_async)
.with(reporter.id, project.id, upload_id)
subject
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['message']).to eq(
"Your work items are being imported. Once finished, you'll receive a confirmation email."
)
end
end
context 'when file is not valid' do
before do
allow(controller).to receive(:file_is_valid?).and_return(false)
end
it 'renders the error message' do
expect(WorkItems::ImportWorkItemsCsvWorker).not_to receive(:perform_async)
subject
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['errors'])
.to eq('The uploaded file was invalid. Supported file extensions are .csv.')
end
end
context 'when service response includes errors' do
before do
mock_upload(false)
end
it 'renders the error message' do
subject
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['errors']).to eq('File upload error.')
end
end
end
context 'when feature is not available' do
before do
stub_feature_flags(import_export_work_items_csv: false)
end
it_behaves_like 'response with 404 status'
end
end
context 'with unauthorised user' do
before do
mock_upload
sign_in(guest)
allow(controller).to receive(:file_is_valid?).and_return(true)
end
it_behaves_like 'response with 404 status'
end
context 'with anonymous user' do
it 'redirects to sign in page' do
expect(WorkItems::ImportWorkItemsCsvWorker).not_to receive(:perform_async)
subject
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(new_user_session_path)
end
end
end
end
|