Welcome to mirror list, hosted at ThFree Co, Russian Federation.

container_repositories_finder_spec.rb « finders « spec - gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 472c39d1f23f5d142a6add70aeadcb6861686847 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe ContainerRepositoriesFinder do
  let_it_be(:reporter) { create(:user) }
  let_it_be(:guest) { create(:user) }

  let_it_be(:group) { create(:group) }
  let_it_be(:project) { create(:project, :public, group: group) }
  let_it_be(:project_repository) { create(:container_repository, name: 'my_image', project: project) }

  let(:params) { {} }

  before do
    project.project_feature.update!(container_registry_access_level: ProjectFeature::PRIVATE)

    group.add_reporter(reporter)
    project.add_reporter(reporter)
  end

  shared_examples 'with name search' do
    let_it_be(:not_searched_repository) do
      create(:container_repository, name: 'foo_bar_baz', project: project)
    end

    %w[my_image my_imag _image _imag].each do |name|
      context "with name set to #{name}" do
        let(:params) { { name: name } }

        it { is_expected.to contain_exactly(project_repository) }

        it { is_expected.not_to include(not_searched_repository) }
      end
    end
  end

  shared_examples 'with sorting' do
    let_it_be(:group) { create(:group) }
    let_it_be(:project) { create(:project, group: group) }
    let_it_be(:sort_repository) do
      create(:container_repository, name: 'bar', project: project, created_at: 1.day.ago)
    end

    let_it_be(:sort_repository2) do
      create(:container_repository, name: 'foo', project: project, created_at: 1.hour.ago, updated_at: 1.hour.ago)
    end

    [:created_desc, :updated_asc, :name_desc].each do |order|
      context "with sort set to #{order}" do
        let(:params) { { sort: order } }

        it { is_expected.to eq([sort_repository2, sort_repository]) }
      end
    end

    [:created_asc, :updated_desc, :name_asc].each do |order|
      context "with sort set to #{order}" do
        let(:params) { { sort: order } }

        it { is_expected.to eq([sort_repository, sort_repository2]) }
      end
    end
  end

  describe '#execute' do
    context 'with authorized user' do
      subject { described_class.new(user: reporter, subject: subject_object, params: params).execute }

      context 'when subject_type is group' do
        let(:subject_object) { group }
        let(:other_project) { create(:project, group: group) }

        let(:other_repository) do
          create(:container_repository, name: 'test_repository2', project: other_project)
        end

        it { is_expected.to match_array([project_repository, other_repository]) }

        it_behaves_like 'with name search'
        it_behaves_like 'with sorting'

        context 'when project has container registry disabled' do
          before do
            project.project_feature.update!(container_registry_access_level: ProjectFeature::DISABLED)
          end

          it { is_expected.to match_array([other_repository]) }
        end
      end

      context 'when subject_type is project' do
        let(:subject_object) { project }

        it { is_expected.to match_array([project_repository]) }

        it_behaves_like 'with name search'
        it_behaves_like 'with sorting'

        context 'when project has container registry disabled' do
          before do
            project.project_feature.update!(container_registry_access_level: ProjectFeature::DISABLED)
          end

          it { is_expected.to be nil }
        end
      end

      context 'with invalid subject_type' do
        let(:subject_object) { "invalid type" }

        it { expect { subject }.to raise_exception('invalid subject_type') }
      end
    end

    context 'with unauthorized user' do
      subject { described_class.new(user: guest, subject: subject_type).execute }

      context 'when subject_type is group' do
        let(:subject_type) { group }

        it { is_expected.to be nil }
      end

      context 'when subject_type is project' do
        let(:subject_type) { project }

        it { is_expected.to be nil }
      end
    end
  end
end