422 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			422 lines
		
	
	
		
			12 KiB
		
	
	
	
		
			Ruby
		
	
	
	
require 'spec_helper'
 | 
						|
 | 
						|
describe Group, models: true do
 | 
						|
  let!(:group) { create(:group, :access_requestable) }
 | 
						|
 | 
						|
  describe 'associations' do
 | 
						|
    it { is_expected.to have_many :projects }
 | 
						|
    it { is_expected.to have_many(:group_members).dependent(:destroy) }
 | 
						|
    it { is_expected.to have_many(:users).through(:group_members) }
 | 
						|
    it { is_expected.to have_many(:owners).through(:group_members) }
 | 
						|
    it { is_expected.to have_many(:requesters).dependent(:destroy) }
 | 
						|
    it { is_expected.to have_many(:project_group_links).dependent(:destroy) }
 | 
						|
    it { is_expected.to have_many(:shared_projects).through(:project_group_links) }
 | 
						|
    it { is_expected.to have_many(:notification_settings).dependent(:destroy) }
 | 
						|
    it { is_expected.to have_many(:labels).class_name('GroupLabel') }
 | 
						|
    it { is_expected.to have_many(:uploads).dependent(:destroy) }
 | 
						|
    it { is_expected.to have_one(:chat_team) }
 | 
						|
 | 
						|
    describe '#members & #requesters' do
 | 
						|
      let(:requester) { create(:user) }
 | 
						|
      let(:developer) { create(:user) }
 | 
						|
      before do
 | 
						|
        group.request_access(requester)
 | 
						|
        group.add_developer(developer)
 | 
						|
      end
 | 
						|
 | 
						|
      describe '#members' do
 | 
						|
        it 'includes members and exclude requesters' do
 | 
						|
          member_user_ids = group.members.pluck(:user_id)
 | 
						|
 | 
						|
          expect(member_user_ids).to include(developer.id)
 | 
						|
          expect(member_user_ids).not_to include(requester.id)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      describe '#requesters' do
 | 
						|
        it 'does not include requesters' do
 | 
						|
          requester_user_ids = group.requesters.pluck(:user_id)
 | 
						|
 | 
						|
          expect(requester_user_ids).to include(requester.id)
 | 
						|
          expect(requester_user_ids).not_to include(developer.id)
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'modules' do
 | 
						|
    subject { described_class }
 | 
						|
 | 
						|
    it { is_expected.to include_module(Referable) }
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'validations' do
 | 
						|
    it { is_expected.to validate_presence_of :name }
 | 
						|
    it { is_expected.to validate_uniqueness_of(:name).scoped_to(:parent_id) }
 | 
						|
    it { is_expected.to validate_presence_of :path }
 | 
						|
    it { is_expected.not_to validate_presence_of :owner }
 | 
						|
    it { is_expected.to validate_presence_of :two_factor_grace_period }
 | 
						|
    it { is_expected.to validate_numericality_of(:two_factor_grace_period).is_greater_than_or_equal_to(0) }
 | 
						|
 | 
						|
    describe 'path validation' do
 | 
						|
      it 'rejects paths reserved on the root namespace when the group has no parent' do
 | 
						|
        group = build(:group, path: 'api')
 | 
						|
 | 
						|
        expect(group).not_to be_valid
 | 
						|
      end
 | 
						|
 | 
						|
      it 'allows root paths when the group has a parent' do
 | 
						|
        group = build(:group, path: 'api', parent: create(:group))
 | 
						|
 | 
						|
        expect(group).to be_valid
 | 
						|
      end
 | 
						|
 | 
						|
      it 'rejects any wildcard paths when not a top level group' do
 | 
						|
        group = build(:group, path: 'tree', parent: create(:group))
 | 
						|
 | 
						|
        expect(group).not_to be_valid
 | 
						|
      end
 | 
						|
 | 
						|
      it 'rejects reserved group paths' do
 | 
						|
        group = build(:group, path: 'activity', parent: create(:group))
 | 
						|
 | 
						|
        expect(group).not_to be_valid
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '.visible_to_user' do
 | 
						|
    let!(:group) { create(:group) }
 | 
						|
    let!(:user)  { create(:user) }
 | 
						|
 | 
						|
    subject { described_class.visible_to_user(user) }
 | 
						|
 | 
						|
    describe 'when the user has access to a group' do
 | 
						|
      before do
 | 
						|
        group.add_user(user, Gitlab::Access::MASTER)
 | 
						|
      end
 | 
						|
 | 
						|
      it { is_expected.to eq([group]) }
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'when the user does not have access to any groups' do
 | 
						|
      it { is_expected.to eq([]) }
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'scopes' do
 | 
						|
    let!(:private_group)  { create(:group, :private)  }
 | 
						|
    let!(:internal_group) { create(:group, :internal) }
 | 
						|
 | 
						|
    describe 'public_only' do
 | 
						|
      subject { described_class.public_only.to_a }
 | 
						|
 | 
						|
      it { is_expected.to eq([group]) }
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'public_and_internal_only' do
 | 
						|
      subject { described_class.public_and_internal_only.to_a }
 | 
						|
 | 
						|
      it { is_expected.to match_array([group, internal_group]) }
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'non_public_only' do
 | 
						|
      subject { described_class.non_public_only.to_a }
 | 
						|
 | 
						|
      it { is_expected.to match_array([private_group, internal_group]) }
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#to_reference' do
 | 
						|
    it 'returns a String reference to the object' do
 | 
						|
      expect(group.to_reference).to eq "@#{group.name}"
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#users' do
 | 
						|
    it { expect(group.users).to eq(group.owners) }
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#human_name' do
 | 
						|
    it { expect(group.human_name).to eq(group.name) }
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#add_user' do
 | 
						|
    let(:user) { create(:user) }
 | 
						|
 | 
						|
    before do
 | 
						|
      group.add_user(user, GroupMember::MASTER)
 | 
						|
    end
 | 
						|
 | 
						|
    it { expect(group.group_members.masters.map(&:user)).to include(user) }
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#add_users' do
 | 
						|
    let(:user) { create(:user) }
 | 
						|
 | 
						|
    before do
 | 
						|
      group.add_users([user.id], GroupMember::GUEST)
 | 
						|
    end
 | 
						|
 | 
						|
    it "updates the group permission" do
 | 
						|
      expect(group.group_members.guests.map(&:user)).to include(user)
 | 
						|
      group.add_users([user.id], GroupMember::DEVELOPER)
 | 
						|
      expect(group.group_members.developers.map(&:user)).to include(user)
 | 
						|
      expect(group.group_members.guests.map(&:user)).not_to include(user)
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#avatar_type' do
 | 
						|
    let(:user) { create(:user) }
 | 
						|
 | 
						|
    before do
 | 
						|
      group.add_user(user, GroupMember::MASTER)
 | 
						|
    end
 | 
						|
 | 
						|
    it "is true if avatar is image" do
 | 
						|
      group.update_attribute(:avatar, 'uploads/avatar.png')
 | 
						|
      expect(group.avatar_type).to be_truthy
 | 
						|
    end
 | 
						|
 | 
						|
    it "is false if avatar is html page" do
 | 
						|
      group.update_attribute(:avatar, 'uploads/avatar.html')
 | 
						|
      expect(group.avatar_type).to eq(["only images allowed"])
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#avatar_url' do
 | 
						|
    let!(:group) { create(:group, :access_requestable, :with_avatar) }
 | 
						|
    let(:user) { create(:user) }
 | 
						|
    let(:gitlab_host) { "http://#{Gitlab.config.gitlab.host}" }
 | 
						|
    let(:avatar_path) { "/uploads/system/group/avatar/#{group.id}/dk.png" }
 | 
						|
 | 
						|
    context 'when avatar file is uploaded' do
 | 
						|
      before do
 | 
						|
        group.add_master(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'shows correct avatar url' do
 | 
						|
        expect(group.avatar_url).to eq(avatar_path)
 | 
						|
        expect(group.avatar_url(only_path: false)).to eq([gitlab_host, avatar_path].join)
 | 
						|
 | 
						|
        allow(ActionController::Base).to receive(:asset_host).and_return(gitlab_host)
 | 
						|
 | 
						|
        expect(group.avatar_url).to eq([gitlab_host, avatar_path].join)
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '.search' do
 | 
						|
    it 'returns groups with a matching name' do
 | 
						|
      expect(described_class.search(group.name)).to eq([group])
 | 
						|
    end
 | 
						|
 | 
						|
    it 'returns groups with a partially matching name' do
 | 
						|
      expect(described_class.search(group.name[0..2])).to eq([group])
 | 
						|
    end
 | 
						|
 | 
						|
    it 'returns groups with a matching name regardless of the casing' do
 | 
						|
      expect(described_class.search(group.name.upcase)).to eq([group])
 | 
						|
    end
 | 
						|
 | 
						|
    it 'returns groups with a matching path' do
 | 
						|
      expect(described_class.search(group.path)).to eq([group])
 | 
						|
    end
 | 
						|
 | 
						|
    it 'returns groups with a partially matching path' do
 | 
						|
      expect(described_class.search(group.path[0..2])).to eq([group])
 | 
						|
    end
 | 
						|
 | 
						|
    it 'returns groups with a matching path regardless of the casing' do
 | 
						|
      expect(described_class.search(group.path.upcase)).to eq([group])
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#has_owner?' do
 | 
						|
    before do
 | 
						|
      @members = setup_group_members(group)
 | 
						|
    end
 | 
						|
 | 
						|
    it { expect(group.has_owner?(@members[:owner])).to be_truthy }
 | 
						|
    it { expect(group.has_owner?(@members[:master])).to be_falsey }
 | 
						|
    it { expect(group.has_owner?(@members[:developer])).to be_falsey }
 | 
						|
    it { expect(group.has_owner?(@members[:reporter])).to be_falsey }
 | 
						|
    it { expect(group.has_owner?(@members[:guest])).to be_falsey }
 | 
						|
    it { expect(group.has_owner?(@members[:requester])).to be_falsey }
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#has_master?' do
 | 
						|
    before do
 | 
						|
      @members = setup_group_members(group)
 | 
						|
    end
 | 
						|
 | 
						|
    it { expect(group.has_master?(@members[:owner])).to be_falsey }
 | 
						|
    it { expect(group.has_master?(@members[:master])).to be_truthy }
 | 
						|
    it { expect(group.has_master?(@members[:developer])).to be_falsey }
 | 
						|
    it { expect(group.has_master?(@members[:reporter])).to be_falsey }
 | 
						|
    it { expect(group.has_master?(@members[:guest])).to be_falsey }
 | 
						|
    it { expect(group.has_master?(@members[:requester])).to be_falsey }
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#lfs_enabled?' do
 | 
						|
    context 'LFS enabled globally' do
 | 
						|
      before do
 | 
						|
        allow(Gitlab.config.lfs).to receive(:enabled).and_return(true)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns true when nothing is set' do
 | 
						|
        expect(group.lfs_enabled?).to be_truthy
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns false when set to false' do
 | 
						|
        group.update_attribute(:lfs_enabled, false)
 | 
						|
 | 
						|
        expect(group.lfs_enabled?).to be_falsey
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns true when set to true' do
 | 
						|
        group.update_attribute(:lfs_enabled, true)
 | 
						|
 | 
						|
        expect(group.lfs_enabled?).to be_truthy
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'LFS disabled globally' do
 | 
						|
      before do
 | 
						|
        allow(Gitlab.config.lfs).to receive(:enabled).and_return(false)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns false when nothing is set' do
 | 
						|
        expect(group.lfs_enabled?).to be_falsey
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns false when set to false' do
 | 
						|
        group.update_attribute(:lfs_enabled, false)
 | 
						|
 | 
						|
        expect(group.lfs_enabled?).to be_falsey
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns false when set to true' do
 | 
						|
        group.update_attribute(:lfs_enabled, true)
 | 
						|
 | 
						|
        expect(group.lfs_enabled?).to be_falsey
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#owners' do
 | 
						|
    let(:owner) { create(:user) }
 | 
						|
    let(:developer) { create(:user) }
 | 
						|
 | 
						|
    it 'returns the owners of a Group' do
 | 
						|
      group.add_owner(owner)
 | 
						|
      group.add_developer(developer)
 | 
						|
 | 
						|
      expect(group.owners).to eq([owner])
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  def setup_group_members(group)
 | 
						|
    members = {
 | 
						|
      owner: create(:user),
 | 
						|
      master: create(:user),
 | 
						|
      developer: create(:user),
 | 
						|
      reporter: create(:user),
 | 
						|
      guest: create(:user),
 | 
						|
      requester: create(:user)
 | 
						|
    }
 | 
						|
 | 
						|
    group.add_user(members[:owner], GroupMember::OWNER)
 | 
						|
    group.add_user(members[:master], GroupMember::MASTER)
 | 
						|
    group.add_user(members[:developer], GroupMember::DEVELOPER)
 | 
						|
    group.add_user(members[:reporter], GroupMember::REPORTER)
 | 
						|
    group.add_user(members[:guest], GroupMember::GUEST)
 | 
						|
    group.request_access(members[:requester])
 | 
						|
 | 
						|
    members
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#web_url' do
 | 
						|
    it 'returns the canonical URL' do
 | 
						|
      expect(group.web_url).to include("groups/#{group.name}")
 | 
						|
    end
 | 
						|
 | 
						|
    context 'nested group' do
 | 
						|
      let(:nested_group) { create(:group, :nested) }
 | 
						|
 | 
						|
      it { expect(nested_group.web_url).to include("groups/#{nested_group.full_path}") }
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'nested group' do
 | 
						|
    subject { build(:group, :nested) }
 | 
						|
 | 
						|
    it { is_expected.to be_valid }
 | 
						|
    it { expect(subject.parent).to be_kind_of(Group) }
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#members_with_parents', :nested_groups do
 | 
						|
    let!(:group) { create(:group, :nested) }
 | 
						|
    let!(:master) { group.parent.add_user(create(:user), GroupMember::MASTER) }
 | 
						|
    let!(:developer) { group.add_user(create(:user), GroupMember::DEVELOPER) }
 | 
						|
 | 
						|
    it 'returns parents members' do
 | 
						|
      expect(group.members_with_parents).to include(developer)
 | 
						|
      expect(group.members_with_parents).to include(master)
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#user_ids_for_project_authorizations' do
 | 
						|
    it 'returns the user IDs for which to refresh authorizations' do
 | 
						|
      master = create(:user)
 | 
						|
      developer = create(:user)
 | 
						|
 | 
						|
      group.add_user(master, GroupMember::MASTER)
 | 
						|
      group.add_user(developer, GroupMember::DEVELOPER)
 | 
						|
 | 
						|
      expect(group.user_ids_for_project_authorizations)
 | 
						|
        .to include(master.id, developer.id)
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#update_two_factor_requirement' do
 | 
						|
    let(:user) { create(:user) }
 | 
						|
 | 
						|
    before do
 | 
						|
      group.add_user(user, GroupMember::OWNER)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'is called when require_two_factor_authentication is changed' do
 | 
						|
      expect_any_instance_of(User).to receive(:update_two_factor_requirement)
 | 
						|
 | 
						|
      group.update!(require_two_factor_authentication: true)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'is called when two_factor_grace_period is changed' do
 | 
						|
      expect_any_instance_of(User).to receive(:update_two_factor_requirement)
 | 
						|
 | 
						|
      group.update!(two_factor_grace_period: 23)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'is not called when other attributes are changed' do
 | 
						|
      expect_any_instance_of(User).not_to receive(:update_two_factor_requirement)
 | 
						|
 | 
						|
      group.update!(description: 'foobar')
 | 
						|
    end
 | 
						|
 | 
						|
    it 'calls #update_two_factor_requirement on each group member' do
 | 
						|
      other_user = create(:user)
 | 
						|
      group.add_user(other_user, GroupMember::OWNER)
 | 
						|
 | 
						|
      calls = 0
 | 
						|
      allow_any_instance_of(User).to receive(:update_two_factor_requirement) do
 | 
						|
        calls += 1
 | 
						|
      end
 | 
						|
 | 
						|
      group.update!(require_two_factor_authentication: true, two_factor_grace_period: 23)
 | 
						|
 | 
						|
      expect(calls).to eq 2
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 |