Welcome to mirror list, hosted at ThFree Co, Russian Federation.

delete_rule_service_spec.rb « protection « container_registry « services « spec - gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: acefe6a55d0e88efbf1863a3ac973b44d876e938 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe ContainerRegistry::Protection::DeleteRuleService, '#execute', feature_category: :container_registry do
  let_it_be(:project) { create(:project) }
  let_it_be(:current_user) { create(:user, maintainer_projects: [project]) }
  let_it_be_with_refind(:container_registry_protection_rule) do
    create(:container_registry_protection_rule, project: project)
  end

  subject(:service_execute) do
    described_class.new(container_registry_protection_rule, current_user: current_user).execute
  end

  shared_examples 'a successful service response' do
    it { is_expected.to be_success }

    it do
      is_expected.to have_attributes(
        errors: be_blank,
        message: be_blank,
        payload: { container_registry_protection_rule: container_registry_protection_rule }
      )
    end

    it do
      service_execute

      expect { container_registry_protection_rule.reload }.to raise_error ActiveRecord::RecordNotFound
    end
  end

  shared_examples 'an erroneous service response' do
    it { is_expected.to be_error }

    it do
      is_expected.to have_attributes(message: be_present, payload: { container_registry_protection_rule: be_blank })
    end

    it do
      expect { service_execute }.not_to change { ContainerRegistry::Protection::Rule.count }

      expect { container_registry_protection_rule.reload }.not_to raise_error
    end
  end

  it_behaves_like 'a successful service response'

  it 'deletes the container registry protection rule in the database' do
    expect { service_execute }
      .to change {
            project.reload.container_registry_protection_rules
          }.from([container_registry_protection_rule]).to([])
      .and change { ::ContainerRegistry::Protection::Rule.count }.from(1).to(0)
  end

  context 'with deleted container registry protection rule' do
    let!(:container_registry_protection_rule) do
      create(:container_registry_protection_rule, project: project,
        repository_path_pattern: 'protection_rule_deleted').destroy!
    end

    it_behaves_like 'a successful service response'
  end

  context 'when error occurs during delete operation' do
    before do
      allow(container_registry_protection_rule).to receive(:destroy!).and_raise(StandardError.new('Some error'))
    end

    it_behaves_like 'an erroneous service response'

    it { is_expected.to have_attributes message: /Some error/ }
  end

  context 'when current_user does not have permission' do
    let_it_be(:developer) { create(:user).tap { |u| project.add_developer(u) } }
    let_it_be(:reporter) { create(:user).tap { |u| project.add_reporter(u) } }
    let_it_be(:guest) { create(:user).tap { |u| project.add_guest(u) } }
    let_it_be(:anonymous) { create(:user) }

    where(:current_user) do
      [ref(:developer), ref(:reporter), ref(:guest), ref(:anonymous)]
    end

    with_them do
      it_behaves_like 'an erroneous service response'

      it { is_expected.to have_attributes message: /Unauthorized to delete a container registry protection rule/ }
    end
  end

  context 'without container registry protection rule' do
    let(:container_registry_protection_rule) { nil }

    it { expect { service_execute }.to raise_error(ArgumentError) }
  end

  context 'without current_user' do
    let(:current_user) { nil }
    let(:container_registry_protection_rule) { build_stubbed(:container_registry_protection_rule, project: project) }

    it { expect { service_execute }.to raise_error(ArgumentError) }
  end
end