summaryrefslogtreecommitdiff
path: root/spec/features/groups
diff options
context:
space:
mode:
authorRémy Coutable <remy@rymai.me>2016-04-18 18:53:32 +0200
committerRémy Coutable <remy@rymai.me>2016-06-14 13:07:26 +0200
commitd26f81239a33b80694783ee35f0da0e2ed082c9b (patch)
treef092e818d4b81805a16879b13407a335bbda0054 /spec/features/groups
parent17c22156c5fa5663aae65178ed38cbeef9a80b7e (diff)
downloadgitlab-ce-d26f81239a33b80694783ee35f0da0e2ed082c9b.tar.gz
Add request access for groups
Signed-off-by: Rémy Coutable <remy@rymai.me>
Diffstat (limited to 'spec/features/groups')
-rw-r--r--spec/features/groups/members/owner_manages_access_requests_spec.rb52
-rw-r--r--spec/features/groups/members/user_requests_access_spec.rb54
2 files changed, 106 insertions, 0 deletions
diff --git a/spec/features/groups/members/owner_manages_access_requests_spec.rb b/spec/features/groups/members/owner_manages_access_requests_spec.rb
new file mode 100644
index 00000000000..d5b5e0e35ea
--- /dev/null
+++ b/spec/features/groups/members/owner_manages_access_requests_spec.rb
@@ -0,0 +1,52 @@
+require 'spec_helper'
+
+feature 'Groups > Members > Owner manages access requests', feature: true do
+ let(:user) { create(:user) }
+ let(:owner) { create(:user) }
+ let(:group) { create(:group, :public) }
+
+ background do
+ group.request_access(user)
+ group.add_owner(owner)
+ login_as(owner)
+ end
+
+ scenario 'owner can see access requests' do
+ visit group_group_members_path(group)
+
+ expect_visible_access_request(group, user)
+ end
+
+ scenario 'master can grant access' do
+ visit group_group_members_path(group)
+
+ expect_visible_access_request(group, user)
+
+ perform_enqueued_jobs do
+ click_on 'Grant access'
+ end
+
+ expect(ActionMailer::Base.deliveries.last.to).to eq [user.notification_email]
+ expect(ActionMailer::Base.deliveries.last.subject).to match /Access to #{group.name} group was granted/
+ end
+
+ scenario 'master can deny access' do
+ visit group_group_members_path(group)
+
+ expect_visible_access_request(group, user)
+
+ perform_enqueued_jobs do
+ click_on 'Deny access'
+ end
+
+ expect(ActionMailer::Base.deliveries.last.to).to eq [user.notification_email]
+ expect(ActionMailer::Base.deliveries.last.subject).to match /Access to #{group.name} group was denied/
+ end
+
+
+ def expect_visible_access_request(group, user)
+ expect(group.access_requested?(user)).to be_truthy
+ expect(page).to have_content "#{group.name} access requests (1)"
+ expect(page).to have_content user.name
+ end
+end
diff --git a/spec/features/groups/members/user_requests_access_spec.rb b/spec/features/groups/members/user_requests_access_spec.rb
new file mode 100644
index 00000000000..9b8492807fa
--- /dev/null
+++ b/spec/features/groups/members/user_requests_access_spec.rb
@@ -0,0 +1,54 @@
+require 'spec_helper'
+
+feature 'Groups > Members > User requests access', feature: true do
+ let(:user) { create(:user) }
+ let(:owner) { create(:user) }
+ let(:group) { create(:group, :public) }
+
+ background do
+ group.add_owner(owner)
+ login_as(user)
+ end
+
+ scenario 'user can request access to a group' do
+ visit group_path(group)
+
+ perform_enqueued_jobs do
+ click_link 'Request Access'
+ end
+
+ expect(ActionMailer::Base.deliveries.last.to).to eq [owner.notification_email]
+ expect(ActionMailer::Base.deliveries.last.subject).to match /Request to join #{group.name} group/
+
+ expect(group.access_requested?(user)).to be_truthy
+ expect(page).to have_content 'Your request for access has been queued for review.'
+ expect(page).to have_content 'Withdraw Request'
+ end
+
+ scenario 'user is not listed in the group members page' do
+ visit group_path(group)
+
+ click_link 'Request Access'
+
+ expect(group.access_requested?(user)).to be_truthy
+
+ click_link 'Members'
+
+ visit group_group_members_path(group)
+ page.within('.content') do
+ expect(page).not_to have_content(user.name)
+ end
+ end
+
+ scenario 'user can withdraw its request for access' do
+ visit group_path(group)
+ click_link 'Request Access'
+
+ expect(group.access_requested?(user)).to be_truthy
+
+ click_link 'Withdraw Request'
+
+ expect(group.access_requested?(user)).to be_falsey
+ expect(page).to have_content 'You withdrawn your access request to the group.'
+ end
+end