summaryrefslogtreecommitdiff
path: root/spec/models/concerns
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2021-02-18 14:10:09 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2021-02-18 14:10:09 +0000
commita0a166e723005aea66e278c653542eb4e5cca11f (patch)
treebf9fb05985ff9e4046afe8d48733d5f41f10e7fd /spec/models/concerns
parent859a6fb938bb9ee2a317c46dfa4fcc1af49608f0 (diff)
downloadgitlab-ce-a0a166e723005aea66e278c653542eb4e5cca11f.tar.gz
Add latest changes from gitlab-org/gitlab@13-9-stable-ee
Diffstat (limited to 'spec/models/concerns')
-rw-r--r--spec/models/concerns/protected_ref_spec.rb77
1 files changed, 0 insertions, 77 deletions
diff --git a/spec/models/concerns/protected_ref_spec.rb b/spec/models/concerns/protected_ref_spec.rb
deleted file mode 100644
index 0a020736269..00000000000
--- a/spec/models/concerns/protected_ref_spec.rb
+++ /dev/null
@@ -1,77 +0,0 @@
-# frozen_string_literal: true
-
-require 'spec_helper'
-
-RSpec.describe ProtectedRef do
- using RSpec::Parameterized::TableSyntax
-
- let_it_be(:project) { create(:project, :repository) }
- let_it_be(:user) { create(:user, maintainer_projects: [project]) }
-
- where(:klass, :factory, :action) do
- ProtectedBranch | :protected_branch | :push
- ProtectedTag | :protected_tag | :create
- end
-
- with_them do
- describe '#protected_ref_accessible_to?' do
- subject do
- klass.protected_ref_accessible_to?('release', user, project: project, action: action)
- end
-
- it 'user cannot do action if rules do not exist' do
- is_expected.to be_falsy
- end
-
- context 'the ref is protected' do
- let!(:default_rule) { create(factory, :"developers_can_#{action}", project: project, name: 'release') }
-
- context 'all rules permit action' do
- let!(:maintainers_can) { create(factory, :"maintainers_can_#{action}", project: project, name: 'release*') }
-
- it 'user can do action' do
- is_expected.to be_truthy
- end
- end
-
- context 'one of the rules forbids action' do
- let!(:no_one_can) { create(factory, :"no_one_can_#{action}", project: project, name: 'release*') }
-
- it 'user cannot do action' do
- is_expected.to be_falsy
- end
- end
- end
- end
-
- describe '#developers_can?' do
- subject do
- klass.developers_can?(action, 'release')
- end
-
- it 'developers cannot do action if rules do not exist' do
- is_expected.to be_falsy
- end
-
- context 'the ref is protected' do
- let!(:default_rule) { create(factory, :"developers_can_#{action}", project: project, name: 'release') }
-
- context 'all rules permit developers to do action' do
- let!(:developers_can) { create(factory, :"developers_can_#{action}", project: project, name: 'release*') }
-
- it 'developers can do action' do
- is_expected.to be_truthy
- end
- end
-
- context 'one of the rules forbids developers to do action' do
- let!(:maintainers_can) { create(factory, :"maintainers_can_#{action}", project: project, name: 'release*') }
-
- it 'developers cannot do action' do
- is_expected.to be_falsy
- end
- end
- end
- end
- end
-end