diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2019-11-08 09:06:07 +0000 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2019-11-08 09:06:07 +0000 |
commit | d23b2a0871f3ca507aafa949e0314625f1f0c6a7 (patch) | |
tree | b1e26c7460bdae25f19103e14978a3aaeef52037 /spec/services | |
parent | 1ef4b65f55f4fc6524a47050b4f6d686beb81d3a (diff) | |
download | gitlab-ce-d23b2a0871f3ca507aafa949e0314625f1f0c6a7.tar.gz |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/services')
-rw-r--r-- | spec/services/groups/transfer_service_spec.rb | 30 | ||||
-rw-r--r-- | spec/services/groups/update_service_spec.rb | 61 |
2 files changed, 59 insertions, 32 deletions
diff --git a/spec/services/groups/transfer_service_spec.rb b/spec/services/groups/transfer_service_spec.rb index 5ef1fb1932f..9a490dfd779 100644 --- a/spec/services/groups/transfer_service_spec.rb +++ b/spec/services/groups/transfer_service_spec.rb @@ -427,20 +427,34 @@ describe Groups::TransferService do end end - context 'when a project in group has container images' do + context 'when a project has container images' do let(:group) { create(:group, :public, :nested) } - let!(:project) { create(:project, :repository, :public, namespace: group) } + let!(:container_repository) { create(:container_repository, project: project) } + + subject { transfer_service.execute(new_parent_group) } before do - stub_container_registry_tags(repository: /image/, tags: %w[rc1]) - create(:container_repository, project: project, name: :image) - create(:group_member, :owner, group: new_parent_group, user: user) + group.add_owner(user) + new_parent_group.add_owner(user) end - it 'does not allow group to be transferred' do - transfer_service.execute(new_parent_group) + context 'within group' do + let(:project) { create(:project, :repository, :public, namespace: group) } + + it 'does not transfer' do + expect(subject).to be false + expect(transfer_service.error).to match(/Docker images in their Container Registry/) + end + end - expect(transfer_service.error).to match(/Docker images in their Container Registry/) + context 'within subgroup' do + let(:subgroup) { create(:group, parent: group) } + let(:project) { create(:project, :repository, :public, namespace: subgroup) } + + it 'does not transfer' do + expect(subject).to be false + expect(transfer_service.error).to match(/Docker images in their Container Registry/) + end end end end diff --git a/spec/services/groups/update_service_spec.rb b/spec/services/groups/update_service_spec.rb index ca8eaf4c970..1aa7e06182b 100644 --- a/spec/services/groups/update_service_spec.rb +++ b/spec/services/groups/update_service_spec.rb @@ -32,6 +32,43 @@ describe Groups::UpdateService do expect(service.execute).to be_falsey end + + context 'when a project has container images' do + let(:params) { { path: SecureRandom.hex } } + let!(:container_repository) { create(:container_repository, project: project) } + + subject { described_class.new(public_group, user, params).execute } + + context 'within group' do + let(:project) { create(:project, group: public_group) } + + context 'with path updates' do + it 'does not allow the update' do + expect(subject).to be false + expect(public_group.errors[:base].first).to match(/Docker images in their Container Registry/) + end + end + + context 'with name updates' do + let(:params) { { name: 'new-name' } } + + it 'allows the update' do + expect(subject).to be true + expect(public_group.reload.name).to eq('new-name') + end + end + end + + context 'within subgroup' do + let(:subgroup) { create(:group, parent: public_group) } + let(:project) { create(:project, group: subgroup) } + + it 'does not allow path updates' do + expect(subject).to be false + expect(public_group.errors[:base].first).to match(/Docker images in their Container Registry/) + end + end + end end context "internal group with internal project" do @@ -148,30 +185,6 @@ describe Groups::UpdateService do end end - context 'projects in group have container images' do - let(:service) { described_class.new(public_group, user, path: SecureRandom.hex) } - let(:project) { create(:project, :internal, group: public_group) } - - before do - stub_container_registry_tags(repository: /image/, tags: %w[rc1]) - create(:container_repository, project: project, name: :image) - end - - it 'does not allow path to be changed' do - result = described_class.new(public_group, user, path: 'new-path').execute - - expect(result).to eq false - expect(public_group.errors[:base].first).to match(/Docker images in their Container Registry/) - end - - it 'allows other settings to be changed' do - result = described_class.new(public_group, user, name: 'new-name').execute - - expect(result).to eq true - expect(public_group.reload.name).to eq('new-name') - end - end - context 'for a subgroup' do let(:subgroup) { create(:group, :private, parent: private_group) } |