Welcome to mirror list, hosted at ThFree Co, Russian Federation.

project_group_link_create_service_spec.rb « authorized_project_update « services « spec - gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 1fd47f78c241719efb35969ce7f133148daf4dae (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe AuthorizedProjectUpdate::ProjectGroupLinkCreateService do
  let_it_be(:group_parent) { create(:group, :private) }
  let_it_be(:group) { create(:group, :private, parent: group_parent) }
  let_it_be(:group_child) { create(:group, :private, parent: group) }

  let_it_be(:parent_group_user) { create(:user) }
  let_it_be(:group_user) { create(:user) }

  let_it_be(:project) { create(:project, :private, group: create(:group, :private)) }

  let(:access_level) { Gitlab::Access::MAINTAINER }
  let(:group_access) { nil }

  subject(:service) { described_class.new(project, group, group_access) }

  describe '#perform' do
    context 'direct group members' do
      before do
        create(:group_member, access_level: access_level, group: group, user: group_user)
        ProjectAuthorization.delete_all
      end

      it 'creates project authorization' do
        expect { service.execute }.to(
          change { ProjectAuthorization.count }.from(0).to(1))

        project_authorization = ProjectAuthorization.where(
          project_id: project.id,
          user_id: group_user.id,
          access_level: access_level)

        expect(project_authorization).to exist
      end
    end

    context 'inherited group members' do
      before do
        create(:group_member, access_level: access_level, group: group_parent, user: parent_group_user)
        ProjectAuthorization.delete_all
      end

      it 'creates project authorization' do
        expect { service.execute }.to(
          change { ProjectAuthorization.count }.from(0).to(1))

        project_authorization = ProjectAuthorization.where(
          project_id: project.id,
          user_id: parent_group_user.id,
          access_level: access_level)
        expect(project_authorization).to exist
      end
    end

    context 'with group_access' do
      let(:group_access) { Gitlab::Access::REPORTER }

      before do
        create(:group_member, access_level: access_level, group: group_parent, user: parent_group_user)
        ProjectAuthorization.delete_all
      end

      it 'creates project authorization' do
        expect { service.execute }.to(
          change { ProjectAuthorization.count }.from(0).to(1))

        project_authorization = ProjectAuthorization.where(
          project_id: project.id,
          user_id: parent_group_user.id,
          access_level: group_access)
        expect(project_authorization).to exist
      end
    end

    context 'membership overrides' do
      before do
        create(:group_member, access_level: Gitlab::Access::REPORTER, group: group_parent, user: group_user)
        create(:group_member, access_level: Gitlab::Access::DEVELOPER, group: group, user: group_user)
        ProjectAuthorization.delete_all
      end

      it 'creates project authorization' do
        expect { service.execute }.to(
          change { ProjectAuthorization.count }.from(0).to(1))

        project_authorization = ProjectAuthorization.where(
          project_id: project.id,
          user_id: group_user.id,
          access_level: Gitlab::Access::DEVELOPER)
        expect(project_authorization).to exist
      end
    end

    context 'no group member' do
      it 'does not create project authorization' do
        expect { service.execute }.not_to(
          change { ProjectAuthorization.count }.from(0))
      end
    end

    context 'unapproved access requests' do
      before do
        create(:group_member, :guest, :access_request, user: group_user, group: group)
      end

      it 'does not create project authorization' do
        expect { service.execute }.not_to(
          change { ProjectAuthorization.count }.from(0))
      end
    end

    context 'minimal access member' do
      before do
        create(:group_member, :minimal_access, user: group_user, source: group)
      end

      it 'does not create project authorization' do
        expect { service.execute }.not_to(
          change { ProjectAuthorization.count }.from(0))
      end
    end

    context 'project has more users than BATCH_SIZE' do
      let(:batch_size) { 2 }
      let(:users) { create_list(:user, batch_size + 1 ) }

      before do
        stub_const("#{described_class.name}::BATCH_SIZE", batch_size)

        users.each do |user|
          create(:group_member, access_level: access_level, group: group_parent, user: user)
        end

        ProjectAuthorization.delete_all
      end

      it 'bulk creates project authorizations in batches' do
        users.each_slice(batch_size) do |batch|
          attributes = batch.map do |user|
            { user_id: user.id, project_id: project.id, access_level: access_level }
          end

          expect(ProjectAuthorization).to(
            receive(:insert_all).with(array_including(attributes)).and_call_original)
        end

        expect { service.execute }.to(
          change { ProjectAuthorization.count }.from(0).to(batch_size + 1))
      end
    end

    context 'users have existing project authorizations' do
      before do
        create(:group_member, access_level: access_level, group: group, user: group_user)
        ProjectAuthorization.delete_all

        create(:project_authorization, user_id: group_user.id,
                                       project_id: project.id,
                                       access_level: existing_access_level)
      end

      context 'when access level is the same' do
        let(:existing_access_level) { access_level }

        it 'does not create project authorization' do
          project_authorization = ProjectAuthorization.where(
            project_id: project.id,
            user_id: group_user.id,
            access_level: existing_access_level)

          expect(ProjectAuthorization).not_to receive(:insert_all)

          expect { service.execute }.not_to(
            change { project_authorization.reload.exists? }.from(true))
        end
      end

      context 'when existing access level is lower' do
        let(:existing_access_level) { Gitlab::Access::DEVELOPER }

        it 'creates new project authorization' do
          project_authorization = ProjectAuthorization.where(
            project_id: project.id,
            user_id: group_user.id,
            access_level: access_level)

          expect { service.execute }.to(
            change { project_authorization.reload.exists? }.from(false).to(true))
        end

        it 'deletes previous project authorization' do
          project_authorization = ProjectAuthorization.where(
            project_id: project.id,
            user_id: group_user.id,
            access_level: existing_access_level)

          expect { service.execute }.to(
            change { project_authorization.reload.exists? }.from(true).to(false))
        end
      end

      context 'when existing access level is higher' do
        let(:existing_access_level) { Gitlab::Access::OWNER }

        it 'does not create project authorization' do
          project_authorization = ProjectAuthorization.where(
            project_id: project.id,
            user_id: group_user.id,
            access_level: existing_access_level)

          expect(ProjectAuthorization).not_to receive(:insert_all)

          expect { service.execute }.not_to(
            change { project_authorization.reload.exists? }.from(true))
        end
      end
    end
  end
end