summaryrefslogtreecommitdiff
path: root/spec/models
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-03-26 09:07:52 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-03-26 09:07:52 +0000
commit7e019504f5ac6decde690565857238e7e59aa034 (patch)
treefab8832b40e25fc9bc1ae54b9303b95ea146b5d5 /spec/models
parent116d4e56e83a1f408afe710ce070e699ba206475 (diff)
downloadgitlab-ce-7e019504f5ac6decde690565857238e7e59aa034.tar.gz
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/models')
-rw-r--r--spec/models/member_spec.rb52
-rw-r--r--spec/models/project_spec.rb2
-rw-r--r--spec/models/user_spec.rb20
3 files changed, 73 insertions, 1 deletions
diff --git a/spec/models/member_spec.rb b/spec/models/member_spec.rb
index e7f03226826..ce3ee3fcfb0 100644
--- a/spec/models/member_spec.rb
+++ b/spec/models/member_spec.rb
@@ -3,6 +3,8 @@
require 'spec_helper'
describe Member do
+ using RSpec::Parameterized::TableSyntax
+
describe "Associations" do
it { is_expected.to belong_to(:user) }
end
@@ -582,4 +584,54 @@ describe Member do
expect(user.authorized_projects).not_to include(project)
end
end
+
+ context 'when after_commit :update_highest_role' do
+ where(:member_type, :source_type) do
+ :project_member | :project
+ :group_member | :group
+ end
+
+ with_them do
+ describe 'create member' do
+ it 'initializes a new Members::UpdateHighestRoleService object' do
+ source = create(source_type) # source owner initializes a new service object too
+ user = create(:user)
+
+ expect(Members::UpdateHighestRoleService).to receive(:new).with(user.id).and_call_original
+
+ create(member_type, :guest, user: user, source_type => source)
+ end
+ end
+
+ context 'when member exists' do
+ let!(:member) { create(member_type) }
+
+ describe 'update member' do
+ context 'when access level was changed' do
+ it 'initializes a new Members::UpdateHighestRoleService object' do
+ expect(Members::UpdateHighestRoleService).to receive(:new).with(member.user_id).and_call_original
+
+ member.update(access_level: Gitlab::Access::GUEST)
+ end
+ end
+
+ context 'when access level was not changed' do
+ it 'does not initialize a new Members::UpdateHighestRoleService object' do
+ expect(Members::UpdateHighestRoleService).not_to receive(:new).with(member.user_id)
+
+ member.update(notification_level: NotificationSetting.levels[:disabled])
+ end
+ end
+ end
+
+ describe 'destroy member' do
+ it 'initializes a new Members::UpdateHighestRoleService object' do
+ expect(Members::UpdateHighestRoleService).to receive(:new).with(member.user_id).and_call_original
+
+ member.destroy
+ end
+ end
+ end
+ end
+ end
end
diff --git a/spec/models/project_spec.rb b/spec/models/project_spec.rb
index 2586289a699..51fcee29485 100644
--- a/spec/models/project_spec.rb
+++ b/spec/models/project_spec.rb
@@ -5718,7 +5718,7 @@ describe Project do
subject { project.limited_protected_branches(1) }
it 'returns limited number of protected branches based on specified limit' do
- expect(subject).to eq([another_protected_branch])
+ expect(subject.count).to eq(1)
end
end
diff --git a/spec/models/user_spec.rb b/spec/models/user_spec.rb
index 3286a891203..bbd45afadd7 100644
--- a/spec/models/user_spec.rb
+++ b/spec/models/user_spec.rb
@@ -4360,4 +4360,24 @@ describe User, :do_not_mock_admin_mode do
it { is_expected.to be expected_result }
end
end
+
+ describe '#current_highest_access_level' do
+ let_it_be(:user) { create(:user) }
+
+ context 'when no memberships exist' do
+ it 'returns nil' do
+ expect(user.current_highest_access_level).to be_nil
+ end
+ end
+
+ context 'when memberships exist' do
+ it 'returns the highest access level for non requested memberships' do
+ create(:group_member, :reporter, user_id: user.id)
+ create(:project_member, :guest, user_id: user.id)
+ create(:project_member, :maintainer, user_id: user.id, requested_at: Time.current)
+
+ expect(user.current_highest_access_level).to eq(Gitlab::Access::REPORTER)
+ end
+ end
+ end
end