blob: 54614ec2b210166ff05e5c4e58cebaf323a8164e (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe User, feature_category: :system_access do
User::USER_TYPES.keys.each do |type| # rubocop:disable RSpec/UselessDynamicDefinition
let_it_be(type) { create(:user, username: type, user_type: type) }
end
let(:bots) { User::BOT_USER_TYPES.map { |type| public_send(type) } }
let(:non_internal) { User::NON_INTERNAL_USER_TYPES.map { |type| public_send(type) } }
let(:everyone) { User::USER_TYPES.keys.map { |type| public_send(type) } }
specify 'types consistency checks', :aggregate_failures do
expect(described_class::USER_TYPES.keys)
.to match_array(%w[human ghost alert_bot project_bot support_bot service_user security_bot
visual_review_bot migration_bot automation_bot security_policy_bot admin_bot suggested_reviewers_bot
service_account llm_bot])
expect(described_class::USER_TYPES).to include(*described_class::BOT_USER_TYPES)
expect(described_class::USER_TYPES).to include(*described_class::NON_INTERNAL_USER_TYPES)
expect(described_class::USER_TYPES).to include(*described_class::INTERNAL_USER_TYPES)
end
describe 'validations' do
it 'validates type presence' do
expect(described_class.new).to validate_presence_of(:user_type)
end
end
describe 'scopes & predicates' do
describe '.bots' do
it 'includes all bots' do
expect(described_class.bots).to match_array(bots)
end
end
describe '.without_bots' do
it 'includes everyone except bots' do
expect(described_class.without_bots).to match_array(everyone - bots)
end
end
describe '.non_internal' do
it 'includes all non_internal users' do
expect(described_class.non_internal).to match_array(non_internal)
end
end
describe '.without_ghosts' do
it 'includes everyone except ghosts' do
expect(described_class.without_ghosts).to match_array(everyone - [ghost])
end
end
describe '.without_project_bot' do
it 'includes everyone except project_bot' do
expect(described_class.without_project_bot).to match_array(everyone - [project_bot])
end
end
describe '#bot?' do
it 'is true for all bot user types and false for others' do
expect(bots).to all(be_bot)
(everyone - bots).each do |user|
expect(user).not_to be_bot
end
end
end
describe '#internal?' do
it 'is true for all internal user types and false for others' do
expect(everyone - non_internal).to all(be_internal)
non_internal.each do |user|
expect(user).not_to be_internal
end
end
end
describe '#redacted_name(viewing_user)' do
let_it_be(:viewing_user) { human }
subject { observed_user.redacted_name(viewing_user) }
context 'when user is not a project bot' do
let(:observed_user) { support_bot }
it { is_expected.to eq(support_bot.name) }
end
context 'when user is a project_bot' do
let(:observed_user) { project_bot }
context 'when groups are present and user can :read_group' do
let_it_be(:group) { create(:group) }
before do
group.add_developer(observed_user)
group.add_developer(viewing_user)
end
it { is_expected.to eq(observed_user.name) }
end
context 'when user can :read_project' do
let_it_be(:project) { create(:project) }
before do
project.add_developer(observed_user)
project.add_developer(viewing_user)
end
it { is_expected.to eq(observed_user.name) }
end
context 'when requester does not have permissions to read project_bot name' do
it { is_expected.to eq('****') }
end
end
end
describe '#resource_bot_resource' do
let_it_be(:group) { create(:group) }
let_it_be(:group2) { create(:group) }
let_it_be(:project) { create(:project) }
let_it_be(:project2) { create(:project) }
using RSpec::Parameterized::TableSyntax
where(:bot_user, :member_of, :owning_resource) do
ref(:human) | [ref(:group)] | nil
ref(:project_bot) | [] | nil # orphaned project bot
ref(:project_bot) | [ref(:group)] | ref(:group)
ref(:project_bot) | [ref(:project)] | ref(:project)
# Project bot can only be added to one group or project.
# That first group or project becomes the owning resource.
ref(:project_bot) | [ref(:group), ref(:project)] | ref(:group)
ref(:project_bot) | [ref(:group), ref(:group2)] | ref(:group)
ref(:project_bot) | [ref(:project), ref(:group)] | ref(:project)
ref(:project_bot) | [ref(:project), ref(:project2)] | ref(:project)
end
with_them do
before do
member_of.each { |resource| resource.add_developer(bot_user) }
end
it 'returns the owning resource' do
expect(bot_user.resource_bot_resource).to eq(owning_resource)
end
end
end
describe 'resource_bot_owners' do
it 'returns nil when user is not a project bot' do
expect(human.resource_bot_resource).to be_nil
end
context 'when the user is a project bot' do
let(:user1) { create(:user) }
let(:user2) { create(:user) }
subject(:owners) { project_bot.resource_bot_owners }
it 'returns an empty array when there is no owning resource' do
expect(owners).to match_array([])
end
it 'returns group owners when owned by a group' do
group = create(:group)
group.add_developer(project_bot)
group.add_owner(user1)
expect(owners).to match_array([user1])
end
it 'returns project maintainers when owned by a project' do
project = create(:project)
project.add_developer(project_bot)
project.add_maintainer(user2)
expect(owners).to match_array([user2])
end
end
end
end
end
|