summaryrefslogtreecommitdiff
path: root/spec/graphql/mutations/dependency_proxy/image_ttl_group_policy/update_spec.rb
blob: 792e87f0d25697c0ffc092c546e9a3b9a4227007 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe Mutations::DependencyProxy::ImageTtlGroupPolicy::Update do
  using RSpec::Parameterized::TableSyntax

  let_it_be_with_reload(:group) { create(:group) }
  let_it_be(:user) { create(:user) }

  let(:params) { { group_path: group.full_path } }

  specify { expect(described_class).to require_graphql_authorizations(:admin_dependency_proxy) }

  describe '#resolve' do
    subject { described_class.new(object: group, context: { current_user: user }, field: nil).resolve(**params) }

    shared_examples 'returning a success' do
      it 'returns the dependency proxy image ttl group policy with no errors' do
        expect(subject).to eq(
          dependency_proxy_image_ttl_policy: ttl_policy,
          errors: []
        )
      end
    end

    shared_examples 'updating the dependency proxy image ttl policy' do
      it_behaves_like 'updating the dependency proxy image ttl policy attributes',
        from: { enabled: true, ttl: 90 },
        to: { enabled: false, ttl: 2 }

      it_behaves_like 'returning a success'

      context 'with invalid params' do
        let_it_be(:params) { { group_path: group.full_path, enabled: nil } }

        it "doesn't create the dependency proxy image ttl policy" do
          expect { subject }.not_to change { DependencyProxy::ImageTtlGroupPolicy.count }
        end

        it 'does not update' do
          expect { subject }
            .not_to change { ttl_policy.reload.enabled }
        end

        it 'returns an error' do
          expect(subject).to eq(
            dependency_proxy_image_ttl_policy: nil,
            errors: ['Enabled is not included in the list']
          )
        end
      end
    end

    shared_examples 'denying access to dependency proxy image ttl policy' do
      it 'raises Gitlab::Graphql::Errors::ResourceNotAvailable' do
        expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable)
      end
    end

    before do
      stub_config(dependency_proxy: { enabled: true })
    end

    context 'with existing dependency proxy image ttl policy' do
      let_it_be(:ttl_policy) { create(:image_ttl_group_policy, group: group) }
      let_it_be(:params) do
        { group_path: group.full_path,
          enabled: false,
          ttl: 2 }
      end

      where(:user_role, :shared_examples_name) do
        :maintainer | 'updating the dependency proxy image ttl policy'
        :developer  | 'updating the dependency proxy image ttl policy'
        :reporter   | 'denying access to dependency proxy image ttl policy'
        :guest      | 'denying access to dependency proxy image ttl policy'
        :anonymous  | 'denying access to dependency proxy image ttl policy'
      end

      with_them do
        before do
          group.send("add_#{user_role}", user) unless user_role == :anonymous
        end

        it_behaves_like params[:shared_examples_name]
      end
    end

    context 'without existing dependency proxy image ttl policy' do
      let_it_be(:ttl_policy) { group.dependency_proxy_image_ttl_policy }

      where(:user_role, :shared_examples_name) do
        :maintainer | 'creating the dependency proxy image ttl policy'
        :developer  | 'creating the dependency proxy image ttl policy'
        :reporter   | 'denying access to dependency proxy image ttl policy'
        :guest      | 'denying access to dependency proxy image ttl policy'
        :anonymous  | 'denying access to dependency proxy image ttl policy'
      end

      with_them do
        before do
          group.send("add_#{user_role}", user) unless user_role == :anonymous
        end

        it_behaves_like params[:shared_examples_name]
      end
    end
  end
end