summaryrefslogtreecommitdiff
path: root/spec/requests/api/graphql/mutations/members/groups/bulk_update_spec.rb
blob: ad70129a7bca260266e7d1b7ace079d1c19868ec (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
# frozen_string_literal: true

require 'spec_helper'

RSpec.describe 'GroupMemberBulkUpdate', feature_category: :subgroups do
  include GraphqlHelpers

  let_it_be(:current_user) { create(:user) }
  let_it_be(:user1) { create(:user) }
  let_it_be(:user2) { create(:user) }
  let_it_be(:group) { create(:group) }
  let_it_be(:group_member1) { create(:group_member, group: group, user: user1) }
  let_it_be(:group_member2) { create(:group_member, group: group, user: user2) }
  let_it_be(:mutation_name) { :group_member_bulk_update }

  let(:input) do
    {
      'group_id' => group.to_global_id.to_s,
      'user_ids' => [user1.to_global_id.to_s, user2.to_global_id.to_s],
      'access_level' => 'GUEST'
    }
  end

  let(:extra_params) { { expires_at: 10.days.from_now } }
  let(:input_params) { input.merge(extra_params) }
  let(:mutation) { graphql_mutation(mutation_name, input_params) }
  let(:mutation_response) { graphql_mutation_response(mutation_name) }

  context 'when user is not logged-in' do
    it_behaves_like 'a mutation that returns a top-level access error'
  end

  context 'when user is not an owner' do
    before do
      group.add_maintainer(current_user)
    end

    it_behaves_like 'a mutation that returns a top-level access error'
  end

  context 'when user is an owner' do
    before do
      group.add_owner(current_user)
    end

    shared_examples 'updates the user access role' do
      specify do
        post_graphql_mutation(mutation, current_user: current_user)

        new_access_levels = mutation_response['groupMembers'].map { |member| member['accessLevel']['integerValue'] }
        expect(response).to have_gitlab_http_status(:success)
        expect(mutation_response['errors']).to be_empty
        expect(new_access_levels).to all(be Gitlab::Access::GUEST)
      end
    end

    it_behaves_like 'updates the user access role'

    context 'when inherited members are passed' do
      let_it_be(:subgroup) { create(:group, parent: group) }
      let_it_be(:subgroup_member) { create(:group_member, group: subgroup) }

      let(:input) do
        {
          'group_id' => group.to_global_id.to_s,
          'user_ids' => [user1.to_global_id.to_s, user2.to_global_id.to_s, subgroup_member.user.to_global_id.to_s],
          'access_level' => 'GUEST'
        }
      end

      it 'does not update the members' do
        post_graphql_mutation(mutation, current_user: current_user)

        error = Mutations::Members::Groups::BulkUpdate::INVALID_MEMBERS_ERROR
        expect(json_response['errors'].first['message']).to include(error)
      end
    end

    context 'when members count is more than the allowed limit' do
      let(:max_members_update_limit) { 1 }

      before do
        stub_const('Mutations::Members::Groups::BulkUpdate::MAX_MEMBERS_UPDATE_LIMIT', max_members_update_limit)
      end

      it 'does not update the members' do
        post_graphql_mutation(mutation, current_user: current_user)

        error = Mutations::Members::Groups::BulkUpdate::MAX_MEMBERS_UPDATE_ERROR
        expect(json_response['errors'].first['message']).to include(error)
      end
    end

    context 'when the update service raises access denied error' do
      before do
        allow_next_instance_of(Members::UpdateService) do |instance|
          allow(instance).to receive(:execute).and_raise(Gitlab::Access::AccessDeniedError)
        end
      end

      it 'does not update the members' do
        post_graphql_mutation(mutation, current_user: current_user)

        expect(mutation_response['groupMembers']).to be_nil
        expect(mutation_response['errors'])
          .to contain_exactly("Unable to update members, please check user permissions.")
      end
    end

    context 'when the update service returns an error message' do
      before do
        allow_next_instance_of(Members::UpdateService) do |instance|
          error_result = {
            message: 'Expires at cannot be a date in the past',
            status: :error,
            members: [group_member1]
          }
          allow(instance).to receive(:execute).and_return(error_result)
        end
      end

      it 'will pass through the error' do
        post_graphql_mutation(mutation, current_user: current_user)

        expect(mutation_response['groupMembers'].first['id']).to eq(group_member1.to_global_id.to_s)
        expect(mutation_response['errors']).to contain_exactly('Expires at cannot be a date in the past')
      end
    end
  end
end