Welcome to mirror list, hosted at ThFree Co, Russian Federation.

stub_member_access_level.rb « support « spec - gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 62e932ee1fca2f55956de5ef18e0e28485a66374 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# frozen_string_literal: true

module StubMemberAccessLevel
  # Stubs access level of a member of +object+.
  #
  # The following types are supported:
  # * `Project` - stubs `project.team.max_member_access(user.id)`
  # * `Group` - stubs `group.max_member_access_for_user(user)`
  #
  # @example
  #
  #   stub_member_access_level(project, maintainer: user)
  #   project.team.max_member_access(user.id) # => Gitlab::Access::MAINTAINER
  #
  #   stub_member_access_level(group, developer: user)
  #   group.max_member_access_for_user(user) # => Gitlab::Access::DEVELOPER
  #
  #   stub_member_access_level(project, reporter: user, guest: [guest1, guest2])
  #   project.team.max_member_access(user.id) # => Gitlab::Access::REPORTER
  #   project.team.max_member_access(guests.first.id) # => Gitlab::Access::GUEST
  #   project.team.max_member_access(guests.last.id) # => Gitlab::Access::GUEST
  #
  # @param object [Project, Group] Object to be stubbed.
  # @param access_levels [Hash<Symbol, User>, Hash<Symbol, [User]>] Map of access level to users
  def stub_member_access_level(object, **access_levels)
    expectation = case object
                  when Project
                    ->(user) { expect(object.team).to receive(:max_member_access).with(user.id) }
                  when Group
                    ->(user) { expect(object).to receive(:max_member_access_for_user).with(user) }
                  else
                    raise ArgumentError,
                      "Stubbing member access level unsupported for #{object.inspect} (#{object.class})"
                  end

    access_levels.each do |access_level, users|
      access_level = Gitlab::Access.sym_options_with_owner.fetch(access_level) do
        raise ArgumentError, "Invalid access level #{access_level.inspect}"
      end

      Array(users).each do |user|
        expectation.call(user).at_least(1).times.and_return(access_level)
      end
    end
  end
end