# frozen_string_literal: true require 'spec_helper' describe Groups::CreateService, '#execute' do let!(:user) { create(:user) } let!(:group_params) { { path: "group_path", visibility_level: Gitlab::VisibilityLevel::PUBLIC } } subject { service.execute } describe 'visibility level restrictions' do let!(:service) { described_class.new(user, group_params) } context "create groups without restricted visibility level" do it { is_expected.to be_persisted } end context "cannot create group with restricted visibility level" do before do allow_any_instance_of(ApplicationSetting).to receive(:restricted_visibility_levels).and_return([Gitlab::VisibilityLevel::PUBLIC]) end it { is_expected.not_to be_persisted } end end context 'creating a group with `default_branch_protection` attribute' do let(:params) { group_params.merge(default_branch_protection: Gitlab::Access::PROTECTION_NONE) } let(:service) { described_class.new(user, params) } let(:created_group) { service.execute } context 'for users who have the ability to create a group with `default_branch_protection`' do it 'creates group with the specified branch protection level' do expect(created_group.default_branch_protection).to eq(Gitlab::Access::PROTECTION_NONE) end end context 'for users who do not have the ability to create a group with `default_branch_protection`' do it 'does not create the group with the specified branch protection level' do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(user, :create_group_with_default_branch_protection) { false } expect(created_group.default_branch_protection).not_to eq(Gitlab::Access::PROTECTION_NONE) end end end describe 'creating a top level group' do let(:service) { described_class.new(user, group_params) } context 'when user can create a group' do before do user.update_attribute(:can_create_group, true) end it { is_expected.to be_persisted } end context 'when user can not create a group' do before do user.update_attribute(:can_create_group, false) end it { is_expected.not_to be_persisted } end end describe 'creating subgroup' do let!(:group) { create(:group) } let!(:service) { described_class.new(user, group_params.merge(parent_id: group.id)) } context 'as group owner' do before do group.add_owner(user) end it { is_expected.to be_persisted } end context 'as guest' do it 'does not save group and returns an error' do is_expected.not_to be_persisted expect(subject.errors[:parent_id].first).to eq(s_('CreateGroup|You don’t have permission to create a subgroup in this group.')) expect(subject.parent_id).to be_nil end end context 'as owner' do before do group.add_owner(user) end it { is_expected.to be_persisted } end context 'as maintainer' do before do group.add_maintainer(user) end it { is_expected.to be_persisted } end end describe "when visibility level is passed as a string" do let(:service) { described_class.new(user, group_params) } let(:group_params) { { path: 'group_path', visibility: 'public' } } it "assigns the correct visibility level" do group = service.execute expect(group.visibility_level).to eq(Gitlab::VisibilityLevel::PUBLIC) end end describe 'creating a mattermost team' do let!(:params) { group_params.merge(create_chat_team: "true") } let!(:service) { described_class.new(user, params) } before do stub_mattermost_setting(enabled: true) end it 'create the chat team with the group' do allow_any_instance_of(Mattermost::Team).to receive(:create) .and_return({ 'name' => 'tanuki', 'id' => 'lskdjfwlekfjsdifjj' }) expect { subject }.to change { ChatTeam.count }.from(0).to(1) end end end