diff --git a/spec/jobs/clean_api_defender_statistics_job_spec.rb b/jobs/clean_api_defender_statistics_job_spec.rb similarity index 100% rename from spec/jobs/clean_api_defender_statistics_job_spec.rb rename to jobs/clean_api_defender_statistics_job_spec.rb diff --git a/spec/jobs/clean_buildroot_job_spec.rb b/jobs/clean_buildroot_job_spec.rb similarity index 100% rename from spec/jobs/clean_buildroot_job_spec.rb rename to jobs/clean_buildroot_job_spec.rb diff --git a/spec/jobs/create_empty_metadata_job_spec.rb b/jobs/create_empty_metadata_job_spec.rb similarity index 100% rename from spec/jobs/create_empty_metadata_job_spec.rb rename to jobs/create_empty_metadata_job_spec.rb diff --git a/spec/jobs/dependent_packages_job_spec.rb b/jobs/dependent_packages_job_spec.rb similarity index 100% rename from spec/jobs/dependent_packages_job_spec.rb rename to jobs/dependent_packages_job_spec.rb diff --git a/spec/jobs/destroy_project_from_repository_job_spec.rb b/jobs/destroy_project_from_repository_job_spec.rb similarity index 100% rename from spec/jobs/destroy_project_from_repository_job_spec.rb rename to jobs/destroy_project_from_repository_job_spec.rb diff --git a/spec/jobs/publish_task_manager_job_spec.rb b/jobs/publish_task_manager_job_spec.rb similarity index 100% rename from spec/jobs/publish_task_manager_job_spec.rb rename to jobs/publish_task_manager_job_spec.rb diff --git a/spec/jobs/run_extra_mass_builds_job_spec.rb b/jobs/run_extra_mass_builds_job_spec.rb similarity index 100% rename from spec/jobs/run_extra_mass_builds_job_spec.rb rename to jobs/run_extra_mass_builds_job_spec.rb diff --git a/spec/controllers/admin/build_scripts_controller_spec.rb b/spec/controllers/admin/build_scripts_controller_spec.rb deleted file mode 100644 index 41e096331..000000000 --- a/spec/controllers/admin/build_scripts_controller_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe Admin::BuildScriptsController, type: :controller do - it_should_behave_like 'an admin controller' -end diff --git a/spec/controllers/admin/node_instructions_controller_spec.rb b/spec/controllers/admin/node_instructions_controller_spec.rb deleted file mode 100644 index cdb09a082..000000000 --- a/spec/controllers/admin/node_instructions_controller_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe Admin::NodeInstructionsController, type: :controller do - it_should_behave_like 'an admin controller' -end diff --git a/spec/controllers/admin/register_requests_controller_spec.rb b/spec/controllers/admin/register_requests_controller_spec.rb deleted file mode 100644 index bffece67f..000000000 --- a/spec/controllers/admin/register_requests_controller_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe Admin::RegisterRequestsController, type: :controller do - it_should_behave_like 'an admin controller' -end diff --git a/spec/controllers/admin/resque_controller_spec.rb b/spec/controllers/admin/resque_controller_spec.rb deleted file mode 100644 index 35fbd5fda..000000000 --- a/spec/controllers/admin/resque_controller_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe Admin::ResqueController, type: :controller do - it_should_behave_like 'an admin controller' -end diff --git a/spec/controllers/advisories_controller_spec.rb b/spec/controllers/advisories_controller_spec.rb deleted file mode 100644 index 9723d1c33..000000000 --- a/spec/controllers/advisories_controller_spec.rb +++ /dev/null @@ -1,15 +0,0 @@ -require 'spec_helper' - -describe AdvisoriesController, type: :controller do - context 'for all' do - it "should be able to perform search action" do - get :search - expect(response).to_not redirect_to(forbidden_path) - end - - it "should be able to perform index action" do - get :index - expect(response).to be_success - end - end -end diff --git a/spec/controllers/api/v1/advisories_controller_spec.rb b/spec/controllers/api/v1/advisories_controller_spec.rb deleted file mode 100644 index 54dda6864..000000000 --- a/spec/controllers/api/v1/advisories_controller_spec.rb +++ /dev/null @@ -1,138 +0,0 @@ -require 'spec_helper' - -shared_examples_for 'api advisories user with show rights' do - it 'should be able to perform show action' do - get :show, id: @advisory.advisory_id, format: :json - expect(response).to be_success - end - - it 'should be able to perform index action' do - get :index, format: :json - expect(response).to be_success - end -end - -shared_examples_for 'api advisories user with admin rights' do - context 'api advisories user with create rights' do - let(:params) {{ build_list_id: @build_list.id, advisory: { description: 'test' }, format: :json }} - it 'should be able to perform create action' do - post :create, params - expect(response).to be_success - end - it 'ensures that advisory has been created' do - expect { post :create, params }.to change(Advisory, :count).by(1) - end - it 'ensures that build_list has been associated with advisory' do - post :create, params - expect(@build_list.reload.advisory).to_not be_nil - end - end - - context 'api advisories user with update rights' do - let(:params) {{ id: @advisory.advisory_id, build_list_id: @build_list.id, format: :json }} - it 'should be able to perform update action' do - put :update, params - expect(response).to be_success - end - it 'ensures that advisory has not been created' do - expect { put :update, params }.to_not change(Advisory, :count) - end - it 'ensures that build_list has been associated with advisory' do - put :update, params - expect(@build_list.reload.advisory).to_not be_nil - end - end -end - -shared_examples_for 'api advisories user without admin rights' do - context 'api advisories user without create rights' do - let(:params) {{ build_list_id: @build_list.id, advisory: { description: 'test' }, format: :json }} - it 'should not be able to perform create action' do - post :create, params - expect(response).to_not be_success - end - it 'ensures that advisory has not been created' do - expect { post :create, params }.to_not change(Advisory, :count) - end - it 'ensures that build_list has not been associated with advisory' do - post :create, params - expect(@build_list.reload.advisory).to be_nil - end - end - - context 'api advisories user without update rights' do - let(:params) {{ id: @advisory.advisory_id, build_list_id: @build_list.id, format: :json }} - it 'should not be able to perform update action' do - put :update, params - expect(response).to_not be_success - end - it 'ensures that advisory has not been created' do - expect { put :update, params }.to_not change(Advisory, :count) - end - it 'ensures that build_list has not been associated with advisory' do - put :update, params - expect(@build_list.reload.advisory).to be_nil - end - end -end - -describe Api::V1::AdvisoriesController, type: :controller do - - before do - stub_symlink_methods - - @advisory = FactoryGirl.create(:advisory) - @build_list = FactoryGirl.create(:build_list, status: BuildList::BUILD_PUBLISHED) - @build_list.save_to_platform.update_column(:released, true) - @build_list.save_to_repository.update_column(:publish_without_qa, false) - end - - context 'for guest' do - - if APP_CONFIG['anonymous_access'] - it_should_behave_like 'api advisories user with show rights' - end - - it 'should not be able to perform show action', :anonymous_access => false do - get :show, id: @advisory.advisory_id, format: :json - expect(response).to_not be_success - end - - it 'should not be able to perform index action', :anonymous_access => false do - get :index, format: :json - expect(response).to_not be_success - end - it_should_behave_like 'api advisories user without admin rights' - end - - context 'for simple user' do - before do - @user = FactoryGirl.create(:user) - http_login(@user) - end - it_should_behave_like 'api advisories user with show rights' - it_should_behave_like 'api advisories user without admin rights' - end - - context 'for admin' do - before do - @admin = FactoryGirl.create(:admin) - http_login(@admin) - end - - it_should_behave_like 'api advisories user with show rights' - it_should_behave_like 'api advisories user with admin rights' - end - - context 'for user who has access to update build_list' do - before do - @user = FactoryGirl.create(:user) - create_relation @build_list.save_to_platform, @user, 'admin' - http_login(@user) - end - - it_should_behave_like 'api advisories user with show rights' - it_should_behave_like 'api advisories user with admin rights' - end - -end diff --git a/spec/controllers/api/v1/issues_controller_spec.rb b/spec/controllers/api/v1/issues_controller_spec.rb deleted file mode 100644 index 84ef4f7f9..000000000 --- a/spec/controllers/api/v1/issues_controller_spec.rb +++ /dev/null @@ -1,222 +0,0 @@ -require 'spec_helper' - -describe Api::V1::IssuesController, type: :controller do - let(:user) { FactoryGirl.create(:user) } - let(:project) { FactoryGirl.create(:project_with_commit) } - let(:issue) { FactoryGirl.create(:issue, project: project, user: user) } - let(:open_project) { FactoryGirl.create(:project) } - let(:open_issue) { FactoryGirl.create(:issue, project: open_project) } - let(:own_hidden_project) { FactoryGirl.create(:project, owner: user, visibility: 'hidden') } - let(:own_hidden_issue) { FactoryGirl.create(:issue, project: own_hidden_project, assignee: user) } - let(:hidden_project) { FactoryGirl.create(:project, visibility: 'hidden') } - let(:hidden_issue) { FactoryGirl.create(:issue, project: hidden_project) } - let(:create_params) { {issue: {title: 'title', body: 'body'}, project_id: project.id, format: :json} } - let(:update_params) { {issue: {title: 'new title'}, project_id: project.id, id: issue.serial_id, format: :json} } - - before do - stub_symlink_methods - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) - end - - context 'read and accessible abilities' do - context 'for user' do - before do - http_login(user) - end - - it 'can show issue in own project' do - get :show, project_id: project.id, id: issue.serial_id, format: :json - expect(response).to be_success - end - - it 'should render right template for show action' do - get :show, project_id: project.id, id: issue.serial_id, format: :json - expect(response).to render_template('api/v1/issues/show') - end - - it 'can show issue in open project' do - get :show, project_id: open_project.id, id: open_issue.serial_id, format: :json - expect(response).to be_success - end - - it 'can show issue in own hidden project' do - get :show, project_id: own_hidden_project.id, id: own_hidden_issue.serial_id, format: :json - expect(response).to be_success - end - - it "can't show issue in hidden project" do - get :show, project_id: hidden_project.id, id: hidden_issue.serial_id, format: :json - expect(response.code).to eq '403' - end - - it 'should return three issues' do - membered_issue = FactoryGirl.create(:issue) - membered_project = membered_issue.project - create_relation(membered_project, issue.user, 'reader') - - issue && own_hidden_issue # init - get :all_index, filter: 'all', format: :json - expect(assigns[:issues]).to include(issue) - expect(assigns[:issues]).to include(own_hidden_issue) - expect(assigns[:issues]).to include(membered_issue) - end - - it 'should render right template for all index action' do - get :all_index, format: :json - expect(response).to render_template('api/v1/issues/index') - end - - it 'should return only assigned issue' do - own_hidden_issue # init - get :user_index, format: :json - expect(assigns[:issues]).to include(own_hidden_issue) - expect(assigns[:issues].count).to eq 1 - end - - it 'should render right template for user index action' do - get :user_index, format: :json - expect(response).to render_template('api/v1/issues/index') - end - - it 'should return 404' do - get :show, project_id: project.id, id: 999999, format: :json - expect(response.code).to eq '404' - end - - it 'should redirect to pull request page' do - pull = project.pull_requests.new issue_attributes: {title: 'test', body: 'testing'} - pull.issue.user, pull.issue.project = project.owner, pull.to_project - pull.to_ref = 'master' - pull.from_project, pull.from_ref = project, 'non_conflicts' - pull.save - - get :show, project_id: project.id, id: pull.reload.serial_id, format: :json - expect(response).to redirect_to(api_v1_project_pull_request_path(project.id, pull.serial_id)) - end - end - - context 'for anonymous user' do - it 'can show issue in open project', anonymous_access: true do - get :show, project_id: project.id, id: issue.serial_id, format: :json - expect(response).to be_success - end - - it "can't show issue in hidden project", anonymous_access: true do - get :show, project_id: hidden_project.id, id: hidden_issue.serial_id, format: :json - expect(response.code).to eq '403' - end - - it 'should not return any issues' do - get :all_index, filter: 'all', format: :json - expect(response.code).to eq '401' - end - end - end - - context 'create accessibility' do - context 'for user' do - before do - http_login(user) - end - - it 'can create issue in own project' do - expect do - post :create, create_params - end.to change(Issue, :count).by(1) - end - - it 'can create issue in own hidden project' do - expect do - post :create, create_params.merge(project_id: own_hidden_project.id) - end.to change(Issue, :count).by(1) - end - - it 'can create issue in open project' do - expect do - post :create, create_params.merge(project_id: open_project.id) - end.to change(Issue, :count).by(1) - end - - it "can't create issue in hidden project" do - expect do - post :create, create_params.merge(project_id: hidden_project.id) - end.to change(Issue, :count).by(0) - end - - it 'can assignee issue in own project' do - post :create, create_params.deep_merge(project_id: own_hidden_project.id, issue: {assignee_id: user.id}) - expect(own_hidden_project.issues.order(:id).last.assignee.id).to eq user.id - end - - it "can't assignee issue in open project" do - post :create, create_params.deep_merge(project_id: open_project.id, issue: {assignee_id: user.id}) - expect(open_project.issues.order(:id).last.assignee).to be_nil - end - end - - context 'for anonymous user' do - it "can't create issue in project", anonymous_access: true do - expect do - post :create, create_params - end.to change(Issue, :count).by(0) - end - - it "can't create issue in hidden project", anonymous_access: true do - expect do - post :create, create_params.merge(project_id: hidden_project.id) - end.to change(Issue, :count).by(0) - end - end - end - - context 'update accessibility' do - context 'for user' do - before(:each) do - http_login(user) - end - - it 'can update issue in own project' do - put :update, update_params - expect(issue.reload.title).to eq 'new title' - end - - it 'can update issue in own hidden project' do - put :update, update_params.merge(project_id: own_hidden_project.id, id: own_hidden_issue.serial_id) - expect(own_hidden_issue.reload.title).to eq 'new title' - end - - it "can't update issue in open project" do - put :update, update_params.merge(project_id: open_project.id, id: open_issue.serial_id) - expect(open_issue.reload.title).to_not eq 'new title' - end - - it "can't update issue in hidden project" do - put :update, update_params.merge(project_id: hidden_project.id, id: hidden_issue.serial_id) - expect(hidden_issue.reload.title).to_not eq 'title' - end - - it "can't assignee issue in open project" do - post :create, update_params.deep_merge(project_id: open_project.id, issue: {assignee_id: user.id}) - expect(open_issue.reload.assignee.id).to_not eq issue.user.id - end - - it 'can assignee issue in own project' do - post :create, update_params.deep_merge(issue: {assignee_id: issue.user.id}) - expect(issue.reload.assignee.id).to_not eq issue.user.id - end - end - - context 'for anonymous user' do - it "can't update issue in project", anonymous_access: true do - put :update, update_params - expect(response.code).to eq '401' - end - - it "can't update issue in hidden project", anonymous_access: true do - put :update, update_params.merge(project_id: hidden_project.id, id: hidden_issue.serial_id) - expect(response.code).to eq '401' - end - end - end - -end diff --git a/spec/controllers/api/v1/pull_requests_controller_spec.rb b/spec/controllers/api/v1/pull_requests_controller_spec.rb deleted file mode 100644 index c72470243..000000000 --- a/spec/controllers/api/v1/pull_requests_controller_spec.rb +++ /dev/null @@ -1,330 +0,0 @@ -require 'spec_helper' - -def create_pull to_ref, from_ref, owner, project - pull = project.pull_requests.build issue_attributes: {title: 'test', body: 'testing'} - pull.issue.user, pull.issue.project = owner, pull.to_project - pull.to_ref, pull.from_ref, pull.from_project = to_ref, from_ref, project - pull.save; pull.check - pull.reload -end - -describe Api::V1::PullRequestsController, type: :controller do - let(:user) { FactoryGirl.create(:user) } - let(:project) { FactoryGirl.create(:project_with_commit, owner: user) } - let(:issue) { FactoryGirl.create(:issue, project: project) } - let(:pull) { create_pull 'master', 'non_conflicts', user, project } - let(:another_project) { FactoryGirl.create(:project_with_commit) } - let(:another_pull) { create_pull 'master', 'non_conflicts', another_project.owner, another_project } - let(:hidden_project) { FactoryGirl.create(:project_with_commit, visibility: 'hidden') } - let(:hidden_pull) { create_pull 'master', 'non_conflicts', hidden_project.owner, hidden_project } - let(:own_hidden_project) { FactoryGirl.create(:project_with_commit, owner: user, visibility: 'hidden') } - let(:own_hidden_pull) { create_pull 'master', 'non_conflicts', user, own_hidden_project } - let(:membered_project) { FactoryGirl.create(:project_with_commit) } - let(:membered_pull) { create_pull 'master', 'non_conflicts', membered_project.owner, membered_project } - let(:create_params) { { - pull_request: { - title: 'title', - body: 'body', - from_ref: 'conflicts', - to_ref: 'master' - }, - project_id: project.id, - format: :json - } } - let(:update_params) { { - pull_request: { - title: 'new title' - }, - project_id: project.id, - id: pull.serial_id, - format: :json - } } - - before do - stub_symlink_methods - - own_hidden_pull.issue.update_column :assignee_id, user.id - create_relation(membered_project, user, 'reader') - end - - context 'read and accessible abilities' do - context 'for user' do - before do - http_login(user) - end - - it 'can show pull request in own project' do - get :show, project_id: project.id, id: pull.serial_id, format: :json - expect(response).to be_success - end - - it 'should render right template for show action' do - get :show, project_id: project.id, id: pull.serial_id, format: :json - expect(response).to render_template('api/v1/pull_requests/show') - end - - it 'can show pull request in open project' do - get :show, project_id: another_project.id, id: another_pull.serial_id, format: :json - expect(response).to be_success - end - - it 'can show pull request in own hidden project' do - get :show, project_id: own_hidden_project.id, id: own_hidden_pull.serial_id, format: :json - expect(response).to be_success - end - - it 'cant show pull request in hidden project' do - get :show, project_id: hidden_project.id, id: hidden_pull.serial_id, format: :json - expect(response.status).to eq 403 - end - - it 'should return three pull requests' do - pull && own_hidden_pull && membered_pull # init - get :all_index, filter: 'all', format: :json - expect(assigns[:pulls]).to include(pull) - expect(assigns[:pulls]).to include(own_hidden_pull) - expect(assigns[:pulls]).to include(membered_pull) - end - - it 'should render right template for all index action' do - get :all_index, format: :json - expect(response).to render_template('api/v1/pull_requests/index') - end - - it 'should return only assigned pull request' do - own_hidden_pull # init - get :user_index, format: :json - expect(assigns[:pulls]).to include(own_hidden_pull) - expect(assigns[:pulls].count).to eq 1 - end - - it 'should render right template for user index action' do - get :user_index, format: :json - expect(response).to render_template('api/v1/pull_requests/index') - end - - %w(commits files).each do |action| - it "can show pull request #{action} in own project" do - get action, project_id: project.id, id: pull.serial_id, format: :json - expect(response).to be_success - end - - it "should render right template for commits action" do - get action, project_id: project.id, id: pull.serial_id, format: :json - expect(response).to render_template("api/v1/pull_requests/#{action}") - end - - it "can't show pull request #{action} in hidden project" do - get action, project_id: hidden_project.id, id: hidden_pull.serial_id, format: :json - expect(response).to_not be_success - end - end - - it 'should return 404' do - get :show, project_id: project.id, id: 999999, format: :json - expect(response.status).to eq 404 - end - - it 'should redirect to issue page' do - get :show, project_id: project.id, id: issue.serial_id, format: :json - expect(response).to redirect_to(api_v1_project_issue_path(project.id, issue.serial_id)) - end - end - - context 'for anonymous user' do - it 'can show pull request in open project', anonymous_access: true do - get :show, project_id: project.id, id: pull.serial_id, format: :json - expect(response).to be_success - end - - it 'cant show pull request in hidden project', anonymous_access: true do - # project.update_column :visibility, 'hidden' - get :show, project_id: hidden_project.id, id: hidden_pull.serial_id, format: :json - expect(response.status).to eq 403 - end - - it 'should not return any pull requests' do - get :all_index, filter: 'all', format: :json - expect(response.status).to eq 401 - end - - %w(commits files).each do |action| - it "can show pull request #{action} in project", anonymous_access: true do - get action, project_id: project.id, id: pull.serial_id, format: :json - expect(response).to be_success - end - - it "should render right template for commits action", anonymous_access: true do - get action, project_id: project.id, id: pull.serial_id, format: :json - expect(response).to render_template("api/v1/pull_requests/#{action}") - end - - it "can't show pull request #{action} in hidden project", anonymous_access: true do - get action, project_id: hidden_project.id, id: hidden_pull.serial_id, format: :json - expect(response).to_not be_success - end - end - end - end - - context 'create accessibility' do - context 'for user' do - before(:each) do - http_login(user) - end - - it 'can create pull request in own project' do - expect do - post :create, create_params - end.to change(PullRequest, :count).by(1) - end - - it 'can create pull request in own hidden project' do - expect do - post :create, create_params.merge(project_id: own_hidden_project.id) - end.to change(PullRequest, :count).by(1) - end - - it 'can create pull request in open project' do - expect do - post :create, create_params.merge(project_id: another_project.id) - end.to change(PullRequest, :count).by(1) - end - - it 'cant create pull request in hidden project' do - expect do - post :create, create_params.merge(project_id: hidden_project.id) - end.to_not change(PullRequest, :count) - end - end - - context 'for anonymous user' do - it 'cant create pull request in project', anonymous_access: true do - expect do - post :create, create_params - end.to_not change(PullRequest, :count) - end - - it 'cant create pull request in hidden project', anonymous_access: true do - expect do - post :create, create_params.merge(project_id: hidden_project.id) - end.to_not change(PullRequest, :count) - end - end - end - - context 'update accessibility' do - context 'for user' do - before(:each) do - http_login(project.owner) - end - - it 'can update pull request in own project' do - put :update, update_params - expect(pull.reload.title).to eq 'new title' - end - - it 'can update pull request in own hidden project' do - put :update, update_params.merge(project_id: own_hidden_project.id, id: own_hidden_pull.serial_id) - expect(own_hidden_pull.reload.title).to eq 'new title' - end - - it 'cant update pull request in open project' do - put :update, update_params.merge(project_id: another_project.id, id: another_pull.serial_id) - expect(another_pull.reload.title).to_not eq 'new title' - end - - it 'cant update pull request in hidden project' do - put :update, update_params.merge(project_id: hidden_project.id, id: hidden_pull.serial_id) - expect(hidden_pull.reload.title).to_not eq 'title' - end - - it 'can merge pull request in own project' do - put :merge, project_id: project.id, id: pull.serial_id, format: :json - expect(pull.reload.status).to eq 'merged' - expect(response).to be_success - end - - it 'can merge pull request in own hidden project' do - put :merge, project_id: own_hidden_project.id, id: own_hidden_pull.serial_id, format: :json - expect(own_hidden_pull.reload.status).to eq 'merged' - expect(response).to be_success - end - - it 'cant merge pull request in open project' do - put :merge, project_id: another_project.id, id: another_pull.serial_id, format: :json - expect(another_pull.reload.status).to eq 'ready' - expect(response.status).to eq 403 - end - - it 'cant merge pull request in hidden project' do - put :merge, project_id: hidden_project.id, id: hidden_pull.serial_id, format: :json - expect(hidden_pull.reload.status).to eq 'ready' - expect(response.status).to eq 403 - end - end - - context 'for anonymous user' do - it 'cant update pull request in project', anonymous_access: true do - put :update, update_params - expect(response.status).to eq 401 - end - - it 'cant update pull request in hidden project', anonymous_access: true do - put :update, update_params.merge(project_id: hidden_project.id, id: hidden_pull.serial_id) - expect(response.status).to eq 401 - end - - it 'cant merge pull request in open project' do - put :merge, project_id: another_project.id, id: another_pull.serial_id, format: :json - expect(another_pull.reload.status).to eq 'ready' - expect(response.status).to eq 401 - end - - it 'cant merge pull request in hidden project' do - put :merge, project_id: hidden_project.id, id: hidden_pull.serial_id, format: :json - expect(hidden_pull.reload.status).to eq 'ready' - expect(response.status).to eq 401 - end - end - end - - context 'send email messages' do - let(:project_reader) { FactoryGirl.create :user } - let(:project_writer) { FactoryGirl.create :user } - let(:project_admin) { FactoryGirl.create :user } - - before do - create_relation(project, project_reader, 'reader') - create_relation(project, project_admin, 'admin') - create_relation(project, project_writer, 'writer') - - http_login(project_writer) - pull # init - ActionMailer::Base.deliveries = [] - end - - it 'should send two email messages to all project members' do - post :create, create_params - expect(ActionMailer::Base.deliveries.count).to eq 3 # project owner + reader + admin - end - - it 'should send two email messages to admins and one to assignee' do - post :create, create_params.deep_merge(pull_request: {assignee_id: project_reader.id}) - expect(ActionMailer::Base.deliveries.count).to eq 3 - end - - it 'should send email message to new assignee' do - http_login(project_admin) - put :update, update_params.deep_merge(pull_request: {assignee_id: project_reader.id}) - expect(ActionMailer::Base.deliveries.count).to eq 1 - end - - it 'should not duplicate email message' do - post :create, create_params.deep_merge(pull_request: {assignee_id: project_admin.id}) - expect(ActionMailer::Base.deliveries.count).to eq 3 # send to all project members - expect(ActionMailer::Base.deliveries.map(&:to).uniq).to match_array(ActionMailer::Base.deliveries.map(&:to)) - end - end - -end diff --git a/spec/controllers/projects/collaborators_controller_spec.rb b/spec/controllers/projects/collaborators_controller_spec.rb deleted file mode 100644 index 3255758b8..000000000 --- a/spec/controllers/projects/collaborators_controller_spec.rb +++ /dev/null @@ -1,141 +0,0 @@ -require 'spec_helper' - -shared_context "collaborators controller" do - before(:each) do - stub_symlink_methods - @project = FactoryGirl.create(:project) - @another_user = FactoryGirl.create(:user) - @group = FactoryGirl.create(:group) - @member_user = FactoryGirl.create(:user) - # Create relation with 'writer' rights - @collaborator = Collaborator.create(actor: @member_user, project: @project, role: 'writer') - - @user = FactoryGirl.create(:user) - set_session_for(@user) - - @user_params = { - actor_id: @another_user.id.to_s, - actor_type: 'user', - role: 'reader' - } - @group_params = { - actor_id: @group.id.to_s, - actor_type: 'group', - role: 'reader' - } if @group - @create_params = { - name_with_owner: @project.name_with_owner, - format: :json - } - @update_params = @create_params.merge(collaborator: { role: 'reader' }) - end -end - -shared_examples_for 'project admin user' do - it 'should be able to view collaborators list' do - get :index, name_with_owner: @project.name_with_owner - expect(response).to be_success - end - - it 'should be able to perform update action' do - put :update, {id: @collaborator.id}.merge(@update_params) - expect(response).to be_success - end - - it 'should add new collaborator with reader role' do - post :create, @create_params.merge(collaborator: @user_params) - expect(@project.relations.exists?(actor_type: 'User', actor_id: @another_user.id, role: 'reader')).to be true - end - - it 'should add new group with reader role' do - post :create, @create_params.merge(collaborator: @group_params) - expect(@project.relations.exists?(actor_type: 'Group', actor_id: @group.id, role: 'reader')).to be true - end - - it 'should be able to set reader role for any user' do - put :update, {id: @collaborator.id}.merge(@update_params) - expect(@collaborator.actor.relations.exists? target_id: @project.id, target_type: 'Project', role: 'reader').to be true - end -end - -shared_examples_for 'user with no rights for this project' do - it 'should not be able to view collaborators list' do - get :index, name_with_owner: @project.name_with_owner - expect(response).to redirect_to(forbidden_path) - end - - it 'should not be able to perform update action' do - put :update, {id: @collaborator.id}.merge(@update_params) - expect(response).to redirect_to(forbidden_path) - end - - it 'should not be able to set reader role for any user' do - put :update, {id: @collaborator.id}.merge(@update_params) - expect(@another_user.relations.exists? target_id: @project.id, target_type: 'Project', role: 'reader').to be false - end -end - -describe Projects::CollaboratorsController, type: :controller do - include_context "collaborators controller" - - context 'for guest' do - before(:each) do - set_session_for(User.new) - end - it 'should not be able to perform index action' do - get :index, name_with_owner: @project.name_with_owner - expect(response).to redirect_to(new_user_session_path) - end - - it 'should not be able to perform update action' do - put :update, {id: @collaborator.id}.merge(@update_params) - expect(response.code).to eq '401' - end - end - - context 'for global admin' do - before(:each) do - @user.role = "admin" - @user.save - end - - it_should_behave_like 'project admin user' - end - - context 'for admin user' do - before(:each) do - create_relation(@project, @user, 'admin') - end - - it_should_behave_like 'project admin user' - end - - context 'for owner user' do - before(:each) do - @user = @project.owner # owner should be user - set_session_for(@user) - end - - it_should_behave_like 'project admin user' - end - - context 'for reader user' do - before(:each) do - create_relation(@project, @user, 'reader') - end - - it_should_behave_like 'user with no rights for this project' - end - - context 'for writer user' do - before(:each) do - create_relation(@project, @user, 'writer') - end - - it_should_behave_like 'user with no rights for this project' - end - - context 'for another user' do - it_should_behave_like 'user with no rights for this project' - end -end diff --git a/spec/controllers/projects/comments_controller_for_commit_spec.rb b/spec/controllers/projects/comments_controller_for_commit_spec.rb deleted file mode 100644 index 85433c965..000000000 --- a/spec/controllers/projects/comments_controller_for_commit_spec.rb +++ /dev/null @@ -1,67 +0,0 @@ -require 'spec_helper' - -describe Projects::CommentsController, type: :controller do - before(:each) do - stub_symlink_methods - @project = FactoryGirl.create(:project_with_commit) - @commit = @project.repo.commits.first - - @create_params = { comment: { body: 'I am a comment!' }, name_with_owner: @project.name_with_owner, - commit_id: @commit.id, format: :json } - @update_params = { comment: { body: 'updated' }, name_with_owner: @project.name_with_owner, commit_id: @commit.id, format: :json } - - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) - - @comment = FactoryGirl.create(:comment, commentable: @commit, project: @project) - @user = FactoryGirl.create(:user) - @own_comment = FactoryGirl.create(:comment, commentable: @commit, user: @user, project: @project) - set_session_for(@user) - @path = { name_with_owner: @project.name_with_owner, commit_id: @commit.id } - @return_path = commit_path(@project, @commit.id) - end - - context 'for project admin user' do - before(:each) do - create_relation(@project, @user, 'admin') - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user with update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user with destroy comment ability' - #it_should_behave_like 'user with destroy ability' - end - - context 'for project owner user' do - before(:each) do - set_session_for(@project.owner) - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user with update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user with destroy comment ability' - end - - context 'for project reader user' do - before(:each) do - create_relation(@project, @user, 'reader') - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user without update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user without destroy comment ability' - end - - context 'for project writer user' do - before(:each) do - create_relation(@project, @user, 'writer') - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user without update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user without destroy comment ability' - end -end diff --git a/spec/controllers/projects/comments_controller_spec.rb b/spec/controllers/projects/comments_controller_spec.rb deleted file mode 100644 index 7c65f15c3..000000000 --- a/spec/controllers/projects/comments_controller_spec.rb +++ /dev/null @@ -1,82 +0,0 @@ -require 'spec_helper' - -shared_context "comments controller" do - before(:each) do - stub_symlink_methods - - @project = FactoryGirl.create(:project) - @issue = FactoryGirl.create(:issue, project_id: @project.id) - @comment = FactoryGirl.create(:comment, commentable: @issue, project_id: @project.id) - - @user = FactoryGirl.create(:user) - @own_comment = FactoryGirl.create(:comment, commentable: @issue, user: @user, project_id: @project.id) - - set_session_for(@user) - - @path = { name_with_owner: @project.name_with_owner, issue_id: @issue.serial_id, format: :json } - @return_path = project_issue_path(@project, @issue) - @create_params = { comment: { body: 'I am a comment!' }}.merge(@path) - @update_params = { comment: { body: 'updated' }}.merge(@path) - end - -end - -describe Projects::CommentsController, type: :controller do - include_context "comments controller" - - context 'for global admin user' do - before(:each) do - @user.role = "admin" - @user.save - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user with update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user with destroy comment ability' - end - - context 'for project admin user' do - before(:each) do - create_relation(@project, @user, 'admin') - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user with update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user with destroy comment ability' - end - - context 'for project owner user' do - before(:each) do - set_session_for(@project.owner) # owner should be user - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user with update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user with destroy comment ability' - end - - context 'for project reader user' do - before(:each) do - create_relation(@project, @user, 'reader') - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user without update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user without destroy comment ability' - end - - context 'for project writer user' do - before(:each) do - create_relation(@project, @user, 'writer') - end - - it_should_behave_like 'user with create comment ability' - it_should_behave_like 'user without update stranger comment ability' - it_should_behave_like 'user with update own comment ability' - it_should_behave_like 'user without destroy comment ability' - end -end diff --git a/spec/controllers/projects/commit_subscribes_controller_spec.rb b/spec/controllers/projects/commit_subscribes_controller_spec.rb deleted file mode 100644 index 1abcfd5f4..000000000 --- a/spec/controllers/projects/commit_subscribes_controller_spec.rb +++ /dev/null @@ -1,117 +0,0 @@ -require 'spec_helper' - -def subscribe_to_commit - Subscribe.subscribe_to_commit(project_id: @project.id, - subscribeable_id: @commit.id.hex, - subscribeable_type: @commit.class.name, - user_id: @user.id) -end - -shared_examples_for 'can subscribe' do - it 'should be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(commit_path(@project, @commit)) - end - - it 'should create subscribe object into db' do - expect { post :create, @create_params }.to change(Subscribe, :count).by(1) - end -end - -shared_examples_for 'can not subscribe' do - it 'should not be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(commit_path(@project, @commit)) - end - - it 'should not create subscribe object into db' do - expect { post :create, @create_params }.to_not change(Subscribe, :count) - end -end - -shared_examples_for 'can unsubscribe' do - it 'should be able to perform destroy action' do - delete :destroy, @destroy_params - expect(response).to redirect_to(commit_path(@project, @commit)) - end - - it 'should reduce subscribes count' do - delete :destroy, @destroy_params - expect(Subscribe.subscribed_to_commit?(@project, @user, @commit)).to be_falsy - end -end - -shared_examples_for 'can not unsubscribe' do - it 'should not be able to perform destroy action' do - delete :destroy, @destroy_params - - expect(response).to redirect_to(commit_path(@project, @commit)) - end - - it 'should not reduce subscribes count' do - expect { delete :destroy, @destroy_params }.to_not change(Subscribe, :count) - end -end - -describe Projects::CommitSubscribesController, type: :controller do - before(:each) do - stub_symlink_methods - - @project = FactoryGirl.create(:project_with_commit) - @commit = @project.repo.commits.first - - @create_params = { commit_id: @commit.sha, name_with_owner: @project.name_with_owner } - @destroy_params = { commit_id: @commit.sha, name_with_owner: @project.name_with_owner } - - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) - end - - context 'for global admin user' do - before(:each) do - @user = FactoryGirl.create(:admin) - set_session_for(@user) - end - - context 'subscribed' do - before(:each) { subscribe_to_commit } - it_should_behave_like 'can unsubscribe' - it_should_behave_like 'can not subscribe' - end - - context 'not subscribed' do - it_should_behave_like 'can subscribe' - end - end - - context 'for simple user' do - before(:each) do - @user = FactoryGirl.create(:user) - set_session_for(@user) - end - - context 'subscribed' do - before(:each) { subscribe_to_commit } - - it_should_behave_like 'can unsubscribe' - it_should_behave_like 'can not subscribe' - end - - context 'not subscribed' do - it_should_behave_like 'can subscribe' - end - end - - context 'for guest' do - before(:each) { set_session_for(User.new) } - - it 'should not be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(new_user_session_path) - end - - it 'should not be able to perform destroy action' do - delete :destroy, @destroy_params - expect(response).to redirect_to(new_user_session_path) - end - end -end diff --git a/spec/controllers/projects/git/git_trees_controller_spec.rb b/spec/controllers/projects/git/git_trees_controller_spec.rb deleted file mode 100644 index 3c2aff6b9..000000000 --- a/spec/controllers/projects/git/git_trees_controller_spec.rb +++ /dev/null @@ -1,123 +0,0 @@ -require 'spec_helper' - -describe Projects::Git::TreesController, type: :controller do - - before(:each) do - stub_symlink_methods - - @project = FactoryGirl.create(:project) - @params = { name_with_owner: @project.name_with_owner, treeish: "#{@project.name}-master" } - fill_project @project - end - - context 'for guest' do - [:tags, :branches].each do |action| - it "should be able to perform #{action} action with anonymous acccess", anonymous_access: true do - get action, @params.merge(treeish: 'master') - expect(response).to be_success - end - - it "should not be able to perform #{action} action without anonymous acccess", anonymous_access: false do - get action, @params.merge(treeish: 'master') - expect(response).to_not be_success - end - end - - it "should be able to perform archive action with anonymous acccess", anonymous_access: true do - get :archive, @params.merge(format: 'tar.gz') - expect(response).to be_success - end - - it "should not be able to perform archive action without anonymous acccess", anonymous_access: false do - get :archive, @params.merge(format: 'tar.gz') - expect(response.code).to eq '401' - end - - it 'should not be able to perform destroy action' do - delete :destroy, @params.merge(treeish: 'master') - expect(response).to_not be_success - end - - it 'should not be able to perform restore_branch action' do - put :restore_branch, @params.merge(treeish: 'master') - expect(response).to_not be_success - end - - it 'should not be able to perform create action' do - post :create, @params.merge(treeish: '', from_ref: 'master', new_ref: 'master-1') - expect(response).to_not be_success - end - - end - - context 'for other user' do - before { set_session_for FactoryGirl.create(:user) } - it 'should not be able to archive empty project' do - %x(rm -rf #{@project.path}) - expect { get :archive, @params.merge(format: 'tar.gz') }.to raise_error(ActionController::RoutingError) - end - - it 'should not be able to injection code with treeish' do - expect do - get :archive, @params.merge(format: 'tar.gz', treeish: "master > /dev/null; echo 'I am hacker!';\#") - end.to raise_error(ActionController::RoutingError) - end - - it 'should be able to perform archive action' do - get :archive, @params.merge(format: 'tar.gz') - expect(response).to be_success - end - - it 'should not be able to perform destroy action' do - delete :destroy, @params.merge(treeish: 'master') - expect(response).to_not be_success - end - - it 'should not be able to perform restore_branch action' do - put :restore_branch, @params.merge(treeish: 'master') - expect(response).to_not be_success - end - - it 'should not be able to perform create action' do - post :create, @params.merge(treeish: '', from_ref: 'master', new_ref: 'master-1') - expect(response).to_not be_success - end - - [:tags, :branches].each do |action| - it "should be able to perform #{action} action" do - get action, @params.merge(treeish: 'master') - expect(response).to be_success - end - end - end - - context 'for writer user' do - before(:each) do - user = FactoryGirl.create(:user) - create_relation(@project, user, 'writer') - set_session_for user - end - - it 'should be able to perform destroy action' do - delete :destroy, @params.merge(treeish: 'conflicts') - expect(response).to be_success - end - - it 'should not be able to perform destroy action for master branch' do - delete :destroy, @params.merge(treeish: 'master') - expect(response).to_not be_success - end - - it 'should be able to perform restore_branch action' do - put :restore_branch, @params.merge(treeish: 'master-1', sha: 'master') - expect(response).to be_success - end - - it 'should be able to perform create action' do - post :create, @params.merge(treeish: '', from_ref: 'master', new_ref: 'master-1') - expect(response).to be_success - end - end - - after(:all) {clean_projects_dir} -end diff --git a/spec/controllers/projects/hooks_controller_spec.rb b/spec/controllers/projects/hooks_controller_spec.rb deleted file mode 100644 index 98c8064f3..000000000 --- a/spec/controllers/projects/hooks_controller_spec.rb +++ /dev/null @@ -1,181 +0,0 @@ -require 'spec_helper' - -shared_examples_for 'hooks user with project admin rights' do - it 'should be able to perform index action' do - get :index, {name_with_owner: "#{@project.owner.uname}/#{@project.name}"} - expect(response).to be_success - end - - it 'should be able to perform new action' do - get :new, { name_with_owner: @project.name_with_owner, hook: { name: 'web' }} - expect(response).to be_success - end - - it 'should be able to perform edit action' do - get :new, { name_with_owner: @project.name_with_owner, id: @hook.id } - expect(response).to be_success - end - - it 'should be able to perform update action' do - put :update, { name_with_owner: @project.name_with_owner, id: @hook.id }.merge(@update_params) - expect(response).to redirect_to(project_hooks_path(@project, name: 'web')) - end - - it 'should be able to perform create action' do - post :create, { name_with_owner: @project.name_with_owner }.merge(@create_params) - expect(response).to redirect_to(project_hooks_path(@project, name: 'web')) - end -end - -shared_examples_for 'hooks user without project admin rights' do - it 'should not be able to perform index action' do - get :index, { name_with_owner: @project.name_with_owner } - expect(response).to redirect_to(forbidden_path) - end - - it 'should not be able to perform new action' do - get :new, { name_with_owner: @project.name_with_owner, hook: { name: 'web' }} - expect(response).to redirect_to(forbidden_path) - end - - it 'should not be able to perform edit action' do - get :new, { name_with_owner: @project.name_with_owner, id: @hook.id } - expect(response).to redirect_to(forbidden_path) - end - - it 'should not be able to perform update action' do - put :update, { name_with_owner: @project.name_with_owner, id: @hook.id }.merge(@update_params) - expect(response).to redirect_to(forbidden_path) - end - - it 'should not be able to perform create action' do - post :create, { name_with_owner: @project.name_with_owner }.merge(@create_params) - expect(response).to redirect_to(forbidden_path) - end -end - -describe Projects::HooksController, type: :controller do - - before(:each) do - stub_symlink_methods - - @project = FactoryGirl.create(:project) - @hook = FactoryGirl.create(:hook, project: @project) - - @create_params = {hook: {name: 'web', data: {url: 'create'}}} - @update_params = {hook: {data: {url: 'update'}}} - - @user = FactoryGirl.create(:user) - set_session_for(@user) - end - - context 'registered user' do - it_should_behave_like 'hooks user without project admin rights' - end # context 'registered user' - - context 'for project members' do - - context 'for global admin' do - before do - @user.role = "admin" - @user.save - end - - it_should_behave_like 'hooks user with project admin rights' - end - - context 'for owner user' do - before do - @user = @project.owner - set_session_for(@user) # owner should be user - end - it_should_behave_like 'hooks user with project admin rights' - end - - context 'for reader user' do - before do - create_relation(@project, @user, 'reader') - end - it_should_behave_like 'hooks user without project admin rights' - end - - context 'for writer user' do - before do - create_relation(@project, @user, 'writer') - end - it_should_behave_like 'hooks user without project admin rights' - end - - end # context 'for project members' - - context 'for group' do - before do - @group = FactoryGirl.create(:group) - end - - context 'group is owner of the project' do - before do - @project = FactoryGirl.create(:project, owner: @group) - @hook = FactoryGirl.create(:hook, project: @project) - end - - context 'group member user with reader role' do - before { create_actor_relation(@group, @user, 'reader') } - - it_should_behave_like 'hooks user without project admin rights' - - context 'user should has best role' do - before { create_relation(@project, @user, 'admin') } - it_should_behave_like 'hooks user with project admin rights' - end - end - - context 'group member user with admin role' do - before { create_actor_relation(@group, @user, 'admin') } - it_should_behave_like 'hooks user with project admin rights' - end - end - - context 'group is member of the project' do - context 'with admin rights' do - before { create_relation(@project, @group, 'admin') } - - context 'group member user with reader role' do - before { create_actor_relation(@group, @user, 'reader') } - - it_should_behave_like 'hooks user with project admin rights' - - context 'user should has best role' do - before { create_relation(@project, @user, 'reader') } - it_should_behave_like 'hooks user with project admin rights' - end - end - - context 'group member user with admin role' do - before { create_actor_relation(@group, @user, 'admin') } - it_should_behave_like 'hooks user with project admin rights' - end - end - - context 'with reader rights' do - before { create_relation(@project, @group, 'reader') } - - context 'group member user with reader role' do - before { create_actor_relation(@group, @user, 'reader') } - - it_should_behave_like 'hooks user without project admin rights' - - context 'user should has best role' do - before { create_relation(@project, @user, 'admin') } - it_should_behave_like 'hooks user with project admin rights' - end - end - - context 'group member user with admin role' do - before { create_actor_relation(@group, @user, 'admin') } - it_should_behave_like 'hooks user without project admin rights' - end - end - end - end -end diff --git a/spec/controllers/projects/issues_controller_spec.rb b/spec/controllers/projects/issues_controller_spec.rb deleted file mode 100644 index b39bb87b5..000000000 --- a/spec/controllers/projects/issues_controller_spec.rb +++ /dev/null @@ -1,309 +0,0 @@ -require 'spec_helper' - -shared_context "issues controller" do - before do - stub_symlink_methods - - @project = FactoryGirl.create(:project_with_commit) - @issue_user = FactoryGirl.create(:user) - - @issue = FactoryGirl.create(:issue, project_id: @project.id, assignee_id: @issue_user.id) - @label = FactoryGirl.create(:label, project_id: @project.id) - - @project_with_turned_off_issues = FactoryGirl.create(:project, has_issues: false) - @turned_of_issue = FactoryGirl.create(:issue, project_id: @project_with_turned_off_issues.id, assignee_id: @issue_user.id) - - @user = FactoryGirl.create(:user) - set_session_for(@user) - - @create_params = { - name_with_owner: @project.name_with_owner, - issue: { - title: "issue1", - body: "issue body", - labelings_attributes: { @label.id.to_s => { label_id: @label.id }}, - assignee_id: @issue_user.id - } - } - - @update_params = { name_with_owner: @project.name_with_owner, issue: { title: "issue2" }, format: :json } - - @pull = create_pull_request(@project) - end - -end - -shared_examples_for 'issue user with project guest rights' do - it 'should be able to perform index action' do - get :index, name_with_owner: @project.name_with_owner - expect(response).to render_template(:index) - end - - it 'should be able to perform show action' do - get :show, name_with_owner: @project.name_with_owner, id: @issue.serial_id - expect(response).to render_template(:show) - end -end - -shared_examples_for 'issue user with project reader rights' do - - it 'should be able to perform index action on hidden project' do - @project.update_attributes(visibility: 'hidden') - get :index, name_with_owner: @project.name_with_owner - expect(response).to render_template(:index) - end - - it 'should be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(project_issues_path(@project)) - end - - it 'should create issue object into db' do - expect do - post :create, @create_params - end.to change(Issue, :count).by(1) - end -end - -shared_examples_for 'issue user with project writer rights' do - it 'should be able to perform index action on hidden project' do - @project.update_attributes(visibility: 'hidden') - get :index, name_with_owner: @project.name_with_owner - expect(response).to render_template(:index) - end - - it 'should create issue object into db' do - expect do - post :create, @create_params - end.to change(Issue, :count).by(1) - end - - context 'perform create action' do - before { post :create, @create_params } - - it 'user should be assigned to issue' do - expect(@project.issues.last.assignee_id).to_not be_nil - end - - it 'label should be attached to issue' do - expect(@project.issues.last.labels.count).to eq 1 - end - end -end - -shared_examples_for 'user with issue update rights' do - it 'should be able to perform update action' do - put :update, {id: @issue.serial_id}.merge(@update_params) - expect(response).to be_success - end - - it 'should update issue title' do - put :update, {id: @issue.serial_id}.merge(@update_params) - expect(@issue.reload.title).to eq 'issue2' - end -end - -shared_examples_for 'user without issue update rights' do - it 'should not be able to perform update action' do - put :update, {id: @issue.serial_id}.merge(@update_params) - expect(response).to redirect_to(forbidden_path) - end - - it 'should not update issue title' do - put :update, {id: @issue.serial_id}.merge(@update_params) - expect(@issue.reload.title).to_not eq 'issue2' - end -end - -# shared_examples_for 'user without issue destroy rights' do -# it 'should not be able to perform destroy action' do -# delete :destroy, id: @issue.serial_id, name_with_owner: @project.name_with_owner -# expect(response).to redirect_to(controller.current_user ? forbidden_path : new_user_session_path) -# end - -# it 'should not reduce issues count' do -# expect -# delete :destroy, id: @issue.serial_id, name_with_owner: @project.name_with_owner -# end.to change(Issue, :count).by(0) -# end -# end - -shared_examples_for 'project with issues turned off' do - it 'should not be able to perform index action' do - get :index, name_with_owner: @project_with_turned_off_issues.name_with_owner - expect(response).to redirect_to(forbidden_path) - end - - it 'should not be able to perform show action' do - get :show, name_with_owner: @project_with_turned_off_issues.name_with_owner, id: @turned_of_issue.serial_id - expect(response).to redirect_to(forbidden_path) - end -end - -describe Projects::IssuesController, type: :controller do - include_context "issues controller" - - context 'for global admin user' do - before do - @user.role = "admin" - @user.save - end - - it_should_behave_like 'issue user with project guest rights' - it_should_behave_like 'issue user with project reader rights' - it_should_behave_like 'issue user with project writer rights' - it_should_behave_like 'user with issue update rights' - it_should_behave_like 'project with issues turned off' - # it_should_behave_like 'user without issue destroy rights' - end - - context 'for project admin user' do - before do - create_relation(@project, @user, 'admin') - end - - it_should_behave_like 'issue user with project guest rights' - it_should_behave_like 'issue user with project reader rights' - it_should_behave_like 'issue user with project writer rights' - it_should_behave_like 'user with issue update rights' - it_should_behave_like 'project with issues turned off' - # it_should_behave_like 'user without issue destroy rights' - end - - context 'for project owner user' do - before do - @user = @project.owner - set_session_for(@user) - end - - it_should_behave_like 'issue user with project guest rights' - it_should_behave_like 'issue user with project reader rights' - it_should_behave_like 'issue user with project writer rights' - it_should_behave_like 'user with issue update rights' - it_should_behave_like 'project with issues turned off' - # it_should_behave_like 'user without issue destroy rights' - end - - context 'for project reader user' do - before do - create_relation(@project, @user, 'reader') - end - - it_should_behave_like 'issue user with project guest rights' - it_should_behave_like 'issue user with project reader rights' - it_should_behave_like 'user without issue update rights' - it_should_behave_like 'project with issues turned off' - # it_should_behave_like 'user without issue destroy rights' - - context 'perform create action' do - before { post :create, @create_params } - - it 'user should not be assigned to issue' do - expect(@project.issues.last.assignee_id).to be_nil - end - - it 'label should not be attached to issue' do - expect(@project.issues.last.labels.count).to eq 0 - end - end - - it 'should return 404' do - get :show, name_with_owner: @project.name_with_owner, id: 999999 - expect(response).to render_template(file: "#{Rails.root}/public/404.html") - end - - it 'should redirect to pull request page' do - get :show, name_with_owner: @project.name_with_owner, id: @pull.reload.serial_id - expect(response).to redirect_to(project_pull_request_path(@project, @pull)) - end - - it 'should redirect to pull request in project with turned off issues' do - @project.update_attribute :has_issues, false - get :show, name_with_owner: @project.name_with_owner, id: @pull.reload.serial_id - expect(response).to redirect_to(project_pull_request_path(@project, @pull)) - end - - end - - context 'for project writer user' do - before do - create_relation(@project, @user, 'writer') - end - - it_should_behave_like 'issue user with project guest rights' - it_should_behave_like 'issue user with project reader rights' - it_should_behave_like 'issue user with project writer rights' - it_should_behave_like 'user without issue update rights' - it_should_behave_like 'project with issues turned off' - # it_should_behave_like 'user without issue destroy rights' - end - - context 'for issue assign user' do - before do - set_session_for(@issue_user) - end - - it_should_behave_like 'user without issue update rights' - it_should_behave_like 'project with issues turned off' - # it_should_behave_like 'user without issue destroy rights' - end - - context 'for guest' do - - before do - set_session_for(User.new) - end - - if APP_CONFIG['anonymous_access'] - - it_should_behave_like 'issue user with project guest rights' - - it 'should not be able to perform index action on hidden project' do - @project.update_attributes(visibility: 'hidden') - get :index, name_with_owner: @project.name_with_owner - expect(response).to redirect_to(forbidden_path) - end - - else - it 'should not be able to perform index action' do - get :index, name_with_owner: @project.name_with_owner - expect(response).to redirect_to(new_user_session_path) - end - - it 'should not be able to perform show action' do - get :show, name_with_owner: @project.name_with_owner, id: @issue.serial_id - expect(response).to redirect_to(new_user_session_path) - end - - it 'should not be able to perform index action on hidden project' do - @project.update_attributes(visibility: 'hidden') - get :index, name_with_owner: @project.name_with_owner - expect(response).to redirect_to(new_user_session_path) - end - end - - it 'should not be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(new_user_session_path) - end - - it 'should not create issue object into db' do - expect do - post :create, @create_params - end.to change(Issue, :count).by(0) - end - - #it_should_behave_like 'user without issue update rights' - it 'should not be able to perform update action' do - put :update, {id: @issue.serial_id}.merge(@update_params) - expect(response.code).to eq '401' - end - - it 'should not update issue title' do - put :update, {id: @issue.serial_id}.merge(@update_params) - expect(@issue.reload.title).to_not eq 'issue2' - end - - # it_should_behave_like 'user without issue destroy rights' - end -end diff --git a/spec/controllers/projects/pull_requests_controller_spec.rb b/spec/controllers/projects/pull_requests_controller_spec.rb deleted file mode 100644 index bd2716b77..000000000 --- a/spec/controllers/projects/pull_requests_controller_spec.rb +++ /dev/null @@ -1,312 +0,0 @@ -require 'spec_helper' - -shared_context "pull request controller" do - after { FileUtils.rm_rf File.join(Rails.root, "tmp", Rails.env, "pull_requests") } - before do - FileUtils.rm_rf(APP_CONFIG['root_path']) - stub_symlink_methods - - @project = FactoryGirl.create(:project_with_commit) - @pull = create_pull_request(@project) - - @create_params = { - pull_request: { issue_attributes: { title: 'create', body: 'creating' }, - to_ref: 'non_conflicts', - from_ref: 'master' }, - to_project: @project.name_with_owner, - name_with_owner: @project.name_with_owner - } - @update_params = @create_params.merge(pull_request_action: 'close', id: @pull.reload.serial_id) - @wrong_update_params = @create_params.merge( - pull_request: { issue_attributes: { title: 'update', body: 'updating', id: @pull.issue.id }}, - id: @pull.serial_id - ) - - @user = FactoryGirl.create(:user) - set_session_for(@user) - - @issue = FactoryGirl.create(:issue, project: @project) - end -end - -shared_examples_for 'pull request user with project guest rights' do - it 'should be able to perform show action when pull request has been created' do - @pull.check - get :show, name_with_owner: @project.name_with_owner, id: @pull.serial_id - expect(response).to render_template(:show) - end -end - -shared_examples_for 'pull request user with project reader rights' do - it 'should be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(project_pull_request_path(@project, @project.pull_requests.last)) - end - - it 'should create pull request object into db' do - expect do - post :create, @create_params - end.to change { - PullRequest.joins(:issue).where(issues: {title: 'create', body: 'creating'}).count - }.by(1) - end - - it "should not create same pull" do - expect do - post :create, @create_params.merge({pull_request: {issue_attributes: {title: 'same', body: 'creating'}, from_ref: 'non_conflicts', to_ref: 'master'}, to_project_id: @project.id}) - end.to change(PullRequest, :count).by(0) - end - - it "should not create already up-to-date pull" do - expect do - post :create, @create_params.merge({pull_request: {issue_attributes: {title: 'already', body: 'creating'}, - to_ref: 'master', from_ref: 'master'}, to_project_id: @project.id}) - end.to change(PullRequest, :count).by(0) - end - - it "should create pull request to the same project" do - @parent = FactoryGirl.create(:project) - @project.update_attributes(parent_id: @parent) - - expect do - post :create, @create_params - end.to change { - PullRequest.joins(:issue).where(issues: {user_id: @user}, to_project_id: @project, from_project_id: @project).count - }.by(1) - end - - it "should create pull request to the parent project" do - @parent = FactoryGirl.create(:project_with_commit) - @project.update_attributes(parent_id: @parent) - - expect do - post :create, @create_params.merge({to_project: @parent.name_with_owner}) - end.to change { - PullRequest.joins(:issue).where(issues: {user_id: @user}, to_project_id: @parent, from_project_id: @project).count - }.by(1) - end -end - -shared_examples_for 'user with pull request update rights' do - it 'should be able to perform update action' do - put :update, @update_params - expect(response).to be_success - end - - it 'should be able to perform merge action' do - @pull.check - put :merge, @update_params - expect(response).to be_success - end - - let(:pull) { @project.pull_requests.find(@pull) } - it 'should update pull request status' do - put :update, @update_params - expect(pull.status).to eq 'closed' - end - - it 'should not update pull request title' do - put :update, @wrong_update_params - expect(pull.issue.title).to eq 'test' - end - - it 'should not update pull request body' do - put :update, @wrong_update_params - expect(pull.issue.body).to eq 'testing' - end - - it 'should not update pull request title direct' do - put :update, @wrong_update_params - expect(pull.issue.title).to_not eq 'update' - end - - it 'should not update pull request body direct' do - put :update, @wrong_update_params - expect(pull.issue.body).to_not eq 'updating' - end -end - -shared_examples_for 'user without pull request update rights' do - it 'should not be able to perform update action' do - put :update, @update_params - expect(response).to redirect_to(controller.current_user ? forbidden_path : new_user_session_path) - end - - let(:pull) { @project.pull_requests.find(@pull) } - it 'should not update pull request status' do - put :update, @update_params - expect(pull.status).to_not eq 'closed' - end - it 'should not update pull request title' do - put :update, @wrong_update_params - expect(pull.issue.title).to_not eq 'update' - end - - it 'should not update pull request body' do - put :update, @wrong_update_params - expect(pull.issue.body).to_not eq 'updating' - end - - it 'should not be able to perform merge action' do - @pull.check - put :merge, @update_params - expect(response).to_not be_success - end - -end - -shared_examples_for 'pull request when project with issues turned off' do - before { @project.update_attributes(has_issues: false) } - - it 'should be able to perform show action when pull request has been created' do - @pull.check - get :show, name_with_owner: @project.name_with_owner, id: @pull.serial_id - expect(response).to render_template(:show) - end -end - -describe Projects::PullRequestsController, type: :controller do - include_context "pull request controller" - - context 'for global admin user' do - before do - @user.role = "admin" - @user.save - end - - it_should_behave_like 'pull request user with project guest rights' - it_should_behave_like 'pull request user with project reader rights' - it_should_behave_like 'user with pull request update rights' - it_should_behave_like 'pull request when project with issues turned off' - end - - context 'for project admin user' do - before do - create_relation(@project, @user, 'admin') - end - - it_should_behave_like 'pull request user with project guest rights' - it_should_behave_like 'pull request user with project reader rights' - it_should_behave_like 'user with pull request update rights' - it_should_behave_like 'pull request when project with issues turned off' - end - - context 'for project owner user' do - before do - @user = @project.owner - set_session_for(@user) - end - - it_should_behave_like 'pull request user with project guest rights' - it_should_behave_like 'pull request user with project reader rights' - it_should_behave_like 'user with pull request update rights' - it_should_behave_like 'pull request when project with issues turned off' - end - - context 'for project reader user' do - before do - create_relation(@project, @user, 'reader') - end - - it_should_behave_like 'pull request user with project guest rights' - it_should_behave_like 'pull request user with project reader rights' - it_should_behave_like 'user without pull request update rights' - it_should_behave_like 'pull request when project with issues turned off' - - it 'should return 404' do - get :show, name_with_owner: @project.name_with_owner, id: 999999 - expect(response).to render_template(file: "#{Rails.root}/public/404.html") - end - - it 'should redirect to issue page' do - get :show, name_with_owner: @project.name_with_owner, id: @issue.serial_id - expect(response).to redirect_to(project_issue_path(@project, @issue)) - end - end - - context 'for project writer user' do - before do - create_relation(@project, @user, 'writer') - end - - it_should_behave_like 'pull request user with project guest rights' - it_should_behave_like 'pull request user with project reader rights' - it_should_behave_like 'user with pull request update rights' - it_should_behave_like 'pull request when project with issues turned off' - end - -=begin - context 'for pull request assign user' do - before do - set_session_for(@pull request_user) - end - - it_should_behave_like 'user without pull request update rights' - it_should_behave_like 'pull request when project with issues turned off' - end -=end - - context 'for guest' do - let(:guest) { User.new } - before do - set_session_for(guest) - end - - if APP_CONFIG['anonymous_access'] - - it_should_behave_like 'pull request user with project guest rights' - it_should_behave_like 'pull request when project with issues turned off' - - else - it 'should not be able to perform show action' do - @pull.check - get :show, name_with_owner: @project.name_with_owner, id: @pull.serial_id - expect(response).to redirect_to(new_user_session_path) - end - end - - it 'should not be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(new_user_session_path) - end - - it 'should not create pull request object into db' do - expect do - post :create, @create_params - end.to change(PullRequest, :count).by(0) - end - - it_should_behave_like 'user without pull request update rights' - end - - context 'send email messages' do - before do - @project_reader = FactoryGirl.create :user - create_relation(@project, @project_reader, 'reader') - @project_admin = FactoryGirl.create :user - create_relation(@project, @project_admin, 'admin') - @project_writer = FactoryGirl.create :user - create_relation(@project, @project_writer, 'writer') - - set_session_for(@project_writer) - ActionMailer::Base.deliveries = [] - end - - it 'should send three email messages to project members' do - # project owner + project reader + project admin (project writer is a pull creator) - expect { post :create, @create_params }.to change(ActionMailer::Base.deliveries, :count).by(3) - end - - it 'should send two email messages to admins and one to assignee' do - expect do - post :create, @create_params.deep_merge(issue: {assignee_id: @project_reader.id}) - end.to change(ActionMailer::Base.deliveries, :count).by(3) - end - - it 'should not duplicate email message' do - expect { - post :create, @create_params.deep_merge(issue: {assignee_id: @project_admin.id}) - }.to change(ActionMailer::Base.deliveries, :count).by(3) # send all project members - end - end -end diff --git a/spec/controllers/projects/subscribes_controller_spec.rb b/spec/controllers/projects/subscribes_controller_spec.rb deleted file mode 100644 index 83f71404d..000000000 --- a/spec/controllers/projects/subscribes_controller_spec.rb +++ /dev/null @@ -1,109 +0,0 @@ -require 'spec_helper' - -shared_examples_for 'can subscribe' do - it 'should be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(project_issue_path(@project, @issue)) - end - - it 'should create subscribe object into db' do - expect { post :create, @create_params }.to change(Subscribe, :count).by(1) - end -end - -shared_examples_for 'can not subscribe' do - it 'should not be able to perform create action' do - post :create, @create_params - expect(response).to redirect_to(forbidden_path) - end - - it 'should not create subscribe object into db' do - expect { post :create, @create_params }.to_not change(Subscribe, :count) - end -end - -shared_examples_for 'can unsubscribe' do - it 'should be able to perform destroy action' do - delete :destroy, @destroy_params - - expect(response).to redirect_to([@project, @issue]) - end - - it 'should reduce subscribes count' do - expect { delete :destroy, @destroy_params }.to change(Subscribe, :count).by(-1) - end -end - -shared_examples_for 'can not unsubscribe' do - it 'should not be able to perform destroy action' do - delete :destroy, @destroy_params - - expect(response).to redirect_to(forbidden_path) - end - - it 'should not reduce subscribes count' do - expect { delete :destroy, @destroy_params }.to_not change(Subscribe, :count) - end -end - -describe Projects::SubscribesController, type: :controller do - before(:each) do - stub_symlink_methods - - @project = FactoryGirl.create(:project) - @issue = FactoryGirl.create(:issue, project_id: @project.id) - - @create_params = { issue_id: @issue.serial_id, name_with_owner: @project.name_with_owner } - @destroy_params = { issue_id: @issue.serial_id, name_with_owner: @project.name_with_owner } - - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) - - @request.env['HTTP_REFERER'] = project_issue_path(@project, @issue) - end - - context 'for global admin user' do - before(:each) do - @user = FactoryGirl.create(:admin) - set_session_for(@user) - create_relation(@project, @user, 'admin') - end - - context 'subscribed' do - before(:each) do - ss = @issue.subscribes.build - ss.user = @user - ss.save! - end - - it_should_behave_like 'can unsubscribe' - it_should_behave_like 'can not subscribe' - end - - context 'not subscribed' do - it_should_behave_like 'can subscribe' - end - end - - context 'for simple user' do - before(:each) do - @user = FactoryGirl.create(:user) - set_session_for(@user) - @destroy_params = @destroy_params.merge({id: @user.id}) - end - - context 'subscribed' do - before(:each) do - ss = @issue.subscribes.build - ss.user = @user - ss.save! - end - - it_should_behave_like 'can unsubscribe' - it_should_behave_like 'can not subscribe' - end - - context 'not subscribed' do - it_should_behave_like 'can subscribe' - end - end -end diff --git a/spec/controllers/projects/wiki_controller_spec.rb b/spec/controllers/projects/wiki_controller_spec.rb deleted file mode 100644 index cdc90933f..000000000 --- a/spec/controllers/projects/wiki_controller_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe Projects::WikiController, type: :controller do - -end diff --git a/spec/factories/users.rb b/spec/factories/users.rb index 86af559fa..7d36be3b3 100644 --- a/spec/factories/users.rb +++ b/spec/factories/users.rb @@ -6,7 +6,7 @@ FactoryGirl.define do password '123456' password_confirmation {|u| u.password} confirmed_at { Time.now.utc } - after(:create) { |u| u.send(:new_user_notification) } + #after(:create) { |u| u.send(:new_user_notification) } end factory :admin, parent: :user do diff --git a/spec/jobs/restart_nodes_job_spec.rb b/spec/jobs/restart_nodes_job_spec.rb deleted file mode 100644 index 20b187f98..000000000 --- a/spec/jobs/restart_nodes_job_spec.rb +++ /dev/null @@ -1,40 +0,0 @@ -require 'spec_helper' - -describe RestartNodesJob do - - it 'ensures that not raises error' do - lambda do - RestartNodesJob.perform - end.should_not raise_exception - end - - it 'ensures that do nothing when all instructions disabled' do - NodeInstruction.lock_all - expect(RpmBuildNode).to_not receive(:all) - RestartNodesJob.perform - end - - it 'ensures that creates tasks' do - allow_any_instance_of(NodeInstruction).to receive(:perform_restart) - - # ABF active node - ni1 = FactoryGirl.create(:node_instruction) - FactoryGirl.create(:rpm_build_node, user_id: ni1.user_id) - - # User node - FactoryGirl.create(:rpm_build_node) - - FactoryGirl.create(:node_instruction, status: NodeInstruction::DISABLED) - ni2 = FactoryGirl.create(:node_instruction, status: NodeInstruction::RESTARTING) - FactoryGirl.create(:node_instruction, status: NodeInstruction::FAILED) - - ni3 = FactoryGirl.create(:node_instruction) - - RestartNodesJob.perform - - expect(NodeInstruction.where(status: NodeInstruction::RESTARTING).count).to eq 2 - NodeInstruction.where(status: NodeInstruction::RESTARTING).should include(ni2, ni3) - NodeInstruction.where(status: NodeInstruction::RESTARTING).should_not include(ni1) - end - -end diff --git a/spec/models/advisory_spec.rb b/spec/models/advisory_spec.rb deleted file mode 100644 index 18c3c9e2e..000000000 --- a/spec/models/advisory_spec.rb +++ /dev/null @@ -1,47 +0,0 @@ -require 'spec_helper' - -shared_examples_for 'attach advisory to build_list' do - - it 'ensure that advisory has been attached to build_list' do - build_list.reload.advisory.should == advisory - end - - it 'ensure that save_to_platform of build_list has been attached to advisory' do - build_list.save_to_platform.advisories.should include(advisory) - end - - it 'ensure that projects of build_list has been attached to advisory' do - build_list.project.advisories.should include(advisory) - end - -end - -describe Advisory do - before { stub_symlink_methods } - context 'attach_build_list' do - let(:build_list) { FactoryGirl.create(:build_list) } - - context 'attach new advisory to build_list' do - let(:advisory) { FactoryGirl.build(:advisory) } - before do - advisory.attach_build_list(build_list) - end - - it_should_behave_like 'attach advisory to build_list' - - it 'ensure that advisory has been created' do - expect(Advisory.count).to eq 1 - end - end - - context 'attach old advisory to build_list' do - let(:advisory) { FactoryGirl.create(:advisory) } - before do - advisory.attach_build_list(build_list) - end - - it_should_behave_like 'attach advisory to build_list' - end - - end -end diff --git a/spec/models/build_script_spec.rb b/spec/models/build_script_spec.rb deleted file mode 100644 index 30a8308db..000000000 --- a/spec/models/build_script_spec.rb +++ /dev/null @@ -1,24 +0,0 @@ -require 'spec_helper' - -describe BuildScript do - before { stub_symlink_methods } - - let(:build_script) { FactoryGirl.build(:build_script) } - - it 'is valid given valid attributes' do - build_script.should be_valid - end - - context 'ensures that validations and associations exist' do - it { should belong_to(:project) } - - it { should validate_presence_of(:project) } - it { should validate_presence_of(:treeish) } - - context 'uniqueness' do - before { build_script.save } - it { should validate_uniqueness_of(:project_id).scoped_to(:treeish) } - end - end - -end diff --git a/spec/models/comment_for_commit_spec.rb b/spec/models/comment_for_commit_spec.rb deleted file mode 100644 index 4f7ef13b6..000000000 --- a/spec/models/comment_for_commit_spec.rb +++ /dev/null @@ -1,307 +0,0 @@ -require 'spec_helper' - -def create_comment user - FactoryGirl.create(:comment, user: user, commentable: @commit, project: @project) -end - -def create_comment_in_commit commit, project, body - FactoryGirl.create(:comment, user: @user, commentable: commit, project: project, body: body) -end - -def set_comments_data_for_commit - @project = FactoryGirl.create(:project_with_commit, owner: @user) - @commit = @project.repo.commits.first - - @comment = create_comment(@user) - @stranger_comment = create_comment(@stranger) - - @subscribe_params = {project_id: @project.id, subscribeable_id: @commit.id.hex, subscribeable_type: @commit.class.name} - Subscribe.destroy_all - - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) -end - -def should_send_email(args={}) - user_mailer = double(:user_mailer) - expect(UserMailer).to receive(:new_comment_notification).with(kind_of(Comment), args[:receiver].id).and_return(user_mailer) - expect(user_mailer).to receive(:deliver) - - create_comment args[:commentor] -end - -def should_not_send_email(args={}) - create_comment args[:commentor] - expect(UserMailer).to_not receive(:new_comment_notification) -end - -def should_send_emails(commentor:, receivers:) - reset_email - create_comment commentor - expect(ActionMailer::Base.deliveries.count).to eq(receivers.count) - expect(ActionMailer::Base.deliveries.map &:to).to match_array(receivers.map {|u| [u.email]}) -end - -describe Comment do - before { stub_symlink_methods } - - context 'for project admin user' do - before do - @user = FactoryGirl.create(:user) - @stranger = FactoryGirl.create(:user) - - set_comments_data_for_commit - @admin = FactoryGirl.create(:user) - create_relation(@project, @admin, 'admin') - end - - it 'should send two emails by default settings' do - should_send_emails(commentor: @stranger, receivers: [@user, @admin]) - end - - context 'for disabled notify setting new_comment_commit_repo_owner' do - it 'should send an e-mail' do - @user.notifier.update_column :new_comment_commit_repo_owner, false - should_send_emails(commentor: @stranger, receivers: [@user, @admin]) - end - end - - context 'for disabled notify setting new_comment_commit_owner' do - it 'should send an e-mail' do - @user.notifier.update_column :new_comment_commit_owner, false - should_send_emails(commentor: @stranger, receivers: [@user, @admin]) - end - end - - context 'for disabled notify setting new_comment_commit_commentor' do - it 'should send an e-mail' do - @user.notifier.update_column :new_comment_commit_commentor, false - should_send_emails(commentor: @stranger, receivers: [@user, @admin]) - end - end - - context 'for disabled all notify setting expect global' do - it 'should not send an e-mail' do - @user.notifier.update_column :new_comment_commit_repo_owner, false - @user.notifier.update_column :new_comment_commit_owner, false - @user.notifier.update_column :new_comment_commit_commentor, false - should_not_send_email(commentor: @stranger) - end - end - - context 'for unsubscribe commit' do - it 'should not send an e-mail' do - Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: @user.id) - should_not_send_email(commentor: @stranger) - end - end - - context 'for disabled global notify setting' do - it 'should not send an e-mail' do - @user.notifier.update_column :can_notify, false - should_not_send_email(commentor: @stranger) - end - end - end - - context 'for project owner user' do - before(:each) do - @user = FactoryGirl.create(:user) - @stranger = FactoryGirl.create(:user) - set_comments_data_for_commit - - @project.owner = @user - @project.save - end - - context 'for default enabled settings' do - it 'should send an e-mail by default settings' do - should_send_email(commentor: @stranger, receiver: @project.owner) - end - end - - context 'for disabled notify setting new_comment_commit_repo_owner' do - it 'should not send an e-mail' do - @user.notifier.update_column :new_comment_commit_repo_owner, false - Comment.destroy_all - should_not_send_email(commentor: @stranger) - end - end - - context 'for disabled notify setting new_comment_commit_owner' do - it 'should send an e-mail' do - @user.notifier.update_column :new_comment_commit_owner, false - should_send_email(commentor: @stranger, receiver: @user) - end - end - - context 'for disabled notify setting new_comment_commit_commentor' do - it 'should send an e-mail' do - @user.notifier.update_column :new_comment_commit_commentor, false - should_send_email(commentor: @stranger, receiver: @user) - end - end - - context 'for disabled all notify setting expect global' do - it 'should not send an e-mail' do - @user.notifier.update_column :new_comment_commit_repo_owner, false - @user.notifier.update_column :new_comment_commit_owner, false - @user.notifier.update_column :new_comment_commit_commentor, false - should_not_send_email(commentor: @stranger) - end - end - - context 'for unsubscribe project' do - it 'should not send an e-mail' do - Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: @user.id) - should_not_send_email(commentor: @stranger) - end - end - - context 'for disabled global notify setting' do - it 'should not send an e-mail' do - @user.notifier.update_column :can_notify, false - should_not_send_email(commentor: @stranger) - end - end - - context 'for own commit' do - it 'should send a one e-mail' do - @project.owner.update_column :email, 'code@tpope.net' - should_send_email(commentor: @stranger, receiver: @project.owner) - end - end - end - - context 'for simple user' do - before(:each) do - @user = FactoryGirl.create(:user) - @simple = FactoryGirl.create(:user) - @stranger = FactoryGirl.create(:user) - set_comments_data_for_commit - @comment = create_comment(@simple) - Subscribe.unsubscribe_from_commit @subscribe_params.merge(user_id: [@stranger.id, @project.owner.id]) - end - - context 'for default enabled settings' do - it 'should send an e-mail' do - should_send_email(commentor: @stranger, receiver: @simple) - end - - it 'should send an e-mail for comments after his comment' do - comment = create_comment(@simple) - should_send_email(commentor: @stranger, receiver: @simple) - end - - it 'should send an e-mail when subscribed to project' do - Subscribe.subscribe_to_commit @subscribe_params.merge(user_id: @simple.id) - should_send_email(commentor: @project.owner, receiver: @simple) - end - - it 'should not send an e-mail for own comment' do - should_not_send_email(commentor: @simple) - end - end - - context 'for committer' do - it 'should send an e-mail' do - @simple.update_column :email, 'test@test.test' - should_send_email commentor: @stranger, receiver: @simple - end - - it 'should send a one e-mail when subscribed to commit' do - Subscribe.subscribe_to_commit @subscribe_params.merge(user_id: @simple.id) - @simple.update_column :email, 'test@test.test' - should_send_email(commentor: @stranger, receiver: @simple) - end - - it 'should not send an e-mail for own comment' do - @simple.update_column :email, 'test@test.test' - should_not_send_email(commentor: @simple) - end - - it 'should not send an e-mail if global notify off' do - @project.owner.notifier.update_column :can_notify, false - @simple.update_column :email, 'test@test.test' - @simple.notifier.update_column :can_notify, false - should_not_send_email(commentor: @user) - end - - it 'should not send an e-mail if notify for my commits off' do - Comment.destroy_all - @simple.notifier.update_column :new_comment_commit_owner, false - @simple.update_column :email, 'test@test.test' - should_not_send_email(commentor: @user) - end - end - - context 'automatic issue linking' do - before(:each) do - @same_name_project = FactoryGirl.create(:project, name: @project.name) - @issue_in_same_name_project = FactoryGirl.create(:issue, project: @same_name_project, user: @same_name_project.owner) - @another_project = FactoryGirl.create(:project, owner: @user) - @other_user_project = FactoryGirl.create(:project) - @issue = FactoryGirl.create(:issue, project: @project, user: @user) - @second_issue = FactoryGirl.create(:issue, project: @project, user: @user) - @issue_in_another_project = FactoryGirl.create(:issue, project: @another_project, user: @user) - @issue_in_other_user_project = FactoryGirl.create(:issue, project: @other_user_project, user: @other_user_project.owner) - end - - it 'should create automatic comment' do - create_comment_in_commit(@commit, @project, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]") - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @second_issue.id, - created_from_commit_hash: @commit.id.hex).count - ).to eq(1) - end - - it 'should create automatic comment in the another project issue' do - body = "[#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]" - create_comment_in_commit(@commit, @project, body) - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @issue_in_another_project.id, - created_from_commit_hash: @commit.id.hex).count - ).to eq(1) - end - - it 'should create automatic comment in the same name project issue' do - body = "[#{@same_name_project.owner.uname}##{@issue_in_same_name_project.serial_id}]" - create_comment_in_commit(@commit, @project, body) - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @issue_in_same_name_project.id, - created_from_commit_hash: @commit.id.hex).count - ).to eq(1) - end - - it 'should not create duplicate automatic comment' do - create_comment_in_commit(@commit, @project, "test link to [##{@second_issue.serial_id}]") - create_comment_in_commit(@commit, @project, "test duplicate link to [##{@second_issue.serial_id}]") - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @second_issue.id, - created_from_commit_hash: @commit.id.hex).count - ).to eq(1) - end - - it 'should not create duplicate automatic comment from one' do - create_comment_in_commit(@commit, @project, "test link to [##{@second_issue.serial_id}]; ##{@second_issue.serial_id}") - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @second_issue.id, - created_from_commit_hash: @commit.id.hex).count - ).to eq(1) - end - it 'should create two automatic comment' do - body = "test ##{@second_issue.serial_id}" + - " && [#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]" - create_comment_in_commit(@commit, @project, body) - expect( - Comment.where(automatic: true, - created_from_commit_hash: @commit.id.hex).count - ).to eq(2) - end - end - end -end diff --git a/spec/models/comment_spec.rb b/spec/models/comment_spec.rb deleted file mode 100644 index e1850d1bd..000000000 --- a/spec/models/comment_spec.rb +++ /dev/null @@ -1,126 +0,0 @@ -require 'spec_helper' - -def set_commentable_data - @project = FactoryGirl.create(:project) - @issue = FactoryGirl.create(:issue, project_id: @project.id, user: @user) - - @comment = FactoryGirl.create(:comment, commentable: @issue, user: @user, project: @project) - @stranger_comment = FactoryGirl.create(:comment, commentable: @issue, user: @stranger, project: @project) - - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) -end - -def create_comment_in_issue issue, body - FactoryGirl.create(:comment, user: issue.user, commentable: issue, project: issue.project, body: body) -end - -describe Comment do - before { stub_symlink_methods } - - context 'for simple user' do - before(:each) do - @user = FactoryGirl.create(:user) - @stranger = FactoryGirl.create(:user) - set_commentable_data - end - - context 'automatic issue linking' do - before(:each) do - @same_name_project = FactoryGirl.create(:project, name: @project.name) - @issue_in_same_name_project = FactoryGirl.create(:issue, project: @same_name_project, user: @same_name_project.owner) - @another_project = FactoryGirl.create(:project, owner: @user) - @other_user_project = FactoryGirl.create(:project) - @issue = FactoryGirl.create(:issue, project: @project, user: @user) - @second_issue = FactoryGirl.create(:issue, project: @project, user: @user) - @issue_in_another_project = FactoryGirl.create(:issue, project: @another_project, user: @user) - @issue_in_other_user_project = FactoryGirl.create(:issue, project: @other_user_project, user: @other_user_project.owner) - end - - it 'should create automatic comment' do - create_comment_in_issue(@issue, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]") - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @second_issue.id, - created_from_issue_id: @issue.id).count - ).to eq(1) - end - - it 'should not create automatic comment to the same issue' do - create_comment_in_issue(@issue, "test link to ##{@issue.serial_id}; [##{@second_issue.serial_id}]") - expect( - Comment.where(automatic: true, - created_from_issue_id: @issue.id).count - ).to eq(1) - end - - it 'should create automatic comment in the another project issue' do - body = "[#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]" - create_comment_in_issue(@issue, body) - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @issue_in_another_project.id, - created_from_issue_id: @issue.id).count - ).to eq(1) - end - - it 'should create automatic comment in the same name project issue' do - body = "[#{@same_name_project.owner.uname}##{@issue_in_same_name_project.serial_id}]" - create_comment_in_issue(@issue, body) - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @issue_in_same_name_project.id, - created_from_issue_id: @issue.id).count - ).to eq(1) - end - - it 'should not create duplicate automatic comment' do - create_comment_in_issue(@issue, "test link to [##{@second_issue.serial_id}]") - create_comment_in_issue(@issue, "test duplicate link to [##{@second_issue.serial_id}]") - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @second_issue.id, - created_from_issue_id: @issue.id).count - ).to eq(1) - end - - it 'should not create duplicate automatic comment from one' do - create_comment_in_issue(@issue, "test link to [##{@second_issue.serial_id}]; ##{@second_issue.serial_id}") - expect( - Comment.where(automatic: true, commentable_type: 'Issue', - commentable_id: @second_issue.id, - created_from_issue_id: @issue.id).count - ).to eq(1) - end - - it 'should create two automatic comment' do - body = "test ##{@second_issue.serial_id}" + - " && [#{@another_project.name_with_owner}##{@issue_in_another_project.serial_id}]" - create_comment_in_issue(@issue, body) - expect(Comment.where(automatic: true, - created_from_issue_id: @issue.id).count).to eq(2) - end - - it 'should create automatic comment by issue title' do - issue = FactoryGirl.create(:issue, project: @project, user: @user, - title: "link to ##{@issue.serial_id}") - expect(Comment.where(automatic: true, - created_from_issue_id: issue.id).count).to eq(1) - end - - it 'should create automatic comment from issue body' do - issue = FactoryGirl.create(:issue, project: @project, user: @user, - body: "link to ##{@issue.serial_id}") - expect(Comment.where(automatic: true, - created_from_issue_id: issue.id).count).to eq(1) - end - - it 'should create only one automatic comment from issue title and body' do - issue = FactoryGirl.create(:issue, project: @project, user: @user, - title: "link to ##{@issue.serial_id} in title", - :body => "link to ##{@issue.serial_id} in body") - expect(Comment.where(automatic: true, - created_from_issue_id: issue.id).count).to eq(1) - end - end - end -end diff --git a/spec/models/hook_spec.rb b/spec/models/hook_spec.rb deleted file mode 100644 index 42515cea0..000000000 --- a/spec/models/hook_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe Hook do - pending "add some examples to (or delete) #{__FILE__}" -end diff --git a/spec/models/issue_spec.rb b/spec/models/issue_spec.rb deleted file mode 100644 index 9585f1e9f..000000000 --- a/spec/models/issue_spec.rb +++ /dev/null @@ -1,157 +0,0 @@ -require 'spec_helper' - -def set_data - @user = FactoryGirl.create(:user) - @stranger = FactoryGirl.create(:user) -end - -def create_issue issue_owner - ActionMailer::Base.deliveries = [] - @issue = FactoryGirl.create(:issue, project_id: @project.id, - user: issue_owner, assignee: nil) -end - -describe Issue do - before do - stub_symlink_methods - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) - end - - - context '#update_statistic' do - it 'updates styatistics' do - expect { FactoryGirl.create(:issue) }.to change(Statistic, :count).by(1) - end - end - - context 'for project admin user' do - before(:each) do - set_data - @project = FactoryGirl.create(:project, owner: @user) - end - - it 'should send an e-mail' do - create_issue(@stranger) - expect(ActionMailer::Base.deliveries.count).to eq(1) - expect(ActionMailer::Base.deliveries.last.to).to include(@user.email) - end - - it 'should not send an e-mail to creator' do - create_issue(@user) - expect(ActionMailer::Base.deliveries.count).to eq(0) - end - - it 'should create automatic comment from another issue' do - create_issue(@user) - another_issue = FactoryGirl.create(:issue, project: @project, title: "[##{@issue.serial_id}]") - expect(Comment.where(automatic: true, commentable_type: 'Issue', - created_from_issue_id: another_issue.id).count).to eq(1) - end - - it 'should create automatic comment after updating another issue body' do - create_issue(@user) - another_issue = FactoryGirl.create(:issue, project: @project) - another_issue = Issue.find another_issue.id - another_issue.update_attribute(:title, "[##{@issue.serial_id}]") - - expect(Comment.where(automatic: true, commentable_type: 'Issue', - created_from_issue_id: another_issue.id).count).to eq(1) - end - - it 'should send email message to new assignee' do - create_issue(@user) - ActionMailer::Base.deliveries = [] - @issue = Issue.find @issue.id - @issue.update_attribute :assignee_id, @user.id - - expect(ActionMailer::Base.deliveries.count).to eq(1) - end - end - - context 'for member-group' do - before(:each) do - set_data - @project = FactoryGirl.create(:project, owner: @user) - - @group = FactoryGirl.create(:group) - @reader = FactoryGirl.create :user - create_actor_relation(@group, @reader, 'reader') - end - - it 'should send an e-mail to all members of the admin group' do - create_relation(@project, @group, 'admin') - - create_issue(@stranger) - expect(ActionMailer::Base.deliveries.count).to eq(3) # 1 owner + 2 group member. enough? - end - - it 'should send an e-mail to all members of the admin group except creator' do - create_relation(@project, @group, 'admin') - - create_issue(@group.owner) - expect(ActionMailer::Base.deliveries.count).to eq(2) # 1 owner + 1 group member. enough? - end - - it 'should send emails to members of the reader group' do - create_relation(@project, @group, 'reader') - create_issue(@stranger) - expect(ActionMailer::Base.deliveries.count).to eq(3) # project owner + group owner + group member - end - - it 'should reset issue assignee after remove him from group' do - create_relation(@project, @group, 'reader') - create_issue(@group.owner) - @issue.update_column :assignee_id, @reader.id - @group.remove_member @reader - expect(@issue.reload.assignee_id).to be_nil - end - - it 'should not reset issue assignee' do - create_relation(@project, @group, 'reader') - create_relation(@project, @reader, 'reader') - create_issue(@group.owner) - @issue.update_column :assignee_id, @reader.id - @group.remove_member @reader - expect(@issue.reload.assignee_id).to eq(@reader.id) - end - - it 'should reset issue assignee after remove him from project' do - create_relation(@project, @reader, 'reader') - create_issue(@reader) - @issue.update_column :assignee_id, @reader.id - @project.remove_member @reader # via api - expect(@issue.reload.assignee_id).to be_nil - end - - end - - context 'Group project' do - before(:each) do - set_data - @group = FactoryGirl.create(:group, owner: @user) - @project = FactoryGirl.create(:project, owner: @group) - end - - context 'for admin of the group' do - it 'should send an e-mail' do - create_issue(@stranger) - expect(ActionMailer::Base.deliveries.count).to eq(1) - expect(ActionMailer::Base.deliveries.last.to).to include(@user.email) - end - - it 'should not send an e-mail to creator' do - create_issue(@user) - expect(ActionMailer::Base.deliveries.count).to eq(0) - end - end - - context 'for reader of the group' do - it 'should send an email' do - reader = FactoryGirl.create :user - create_actor_relation(@group, reader, 'reader') - create_issue(@stranger) - expect(ActionMailer::Base.deliveries.count).to eq(2) # group owner + group reader - end - end - end -end diff --git a/spec/models/labels_spec.rb b/spec/models/labels_spec.rb deleted file mode 100644 index dd72c1f9f..000000000 --- a/spec/models/labels_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe Label do - pending "add some examples to (or delete) #{__FILE__}" -end diff --git a/spec/models/node_instruction_spec.rb b/spec/models/node_instruction_spec.rb deleted file mode 100644 index 99d675e22..000000000 --- a/spec/models/node_instruction_spec.rb +++ /dev/null @@ -1,9 +0,0 @@ -require 'spec_helper' - -describe NodeInstruction do - - it 'is valid given valid attributes' do - FactoryGirl.build(:node_instruction).should be_valid - end - -end diff --git a/spec/models/pull_request_spec.rb b/spec/models/pull_request_spec.rb deleted file mode 100644 index 80d9a807e..000000000 --- a/spec/models/pull_request_spec.rb +++ /dev/null @@ -1,155 +0,0 @@ -require 'spec_helper' - -def set_data_for_pull - @project = FactoryGirl.create(:project_with_commit, owner: @user) - - @clone_path = File.join(APP_CONFIG['root_path'], 'repo_clone', @project.id.to_s) - FileUtils.mkdir_p(@clone_path) - - @other_project = FactoryGirl.create(:project_with_commit, owner: @user) - - allow_any_instance_of(Project).to receive(:versions).and_return(%w(v1.0 v2.0)) -end - -describe PullRequest do - before { stub_symlink_methods } - - context 'for owner user' do - before do - @user = FactoryGirl.create(:user) - set_data_for_pull - @pull = @project.pull_requests.new(issue_attributes: {title: 'test', body: 'testing'}) - @pull.issue.user, @pull.issue.project = @user, @pull.to_project - @pull.to_ref = 'master' - @pull.from_project, @pull.from_ref = @project, 'non_conflicts' - @pull.save - - @other_pull = @project.pull_requests.new(issue_attributes: {title: 'test_other', body: 'testing_other'}) - @other_pull.issue.user, @other_pull.issue.project = @user, @other_pull.to_project - @other_pull.to_ref = 'master' - @other_pull.from_project, @other_pull.from_ref = @other_project, 'non_conflicts' - @other_pull.save - end - - it 'ensures that path to pull_request repository has been changed after rename of project' do - @pull.check - @project.update_attributes(name: "#{@project.name}-new") - @pull.reload - expect(Dir.exists? @pull.path).to be_truthy - end - - it 'master should merge with non_conflicts branch' do - @pull.check - expect(@pull.status).to eq('ready') - end - - it 'master should not merge with conflicts branch' do - @pull.from_ref = 'conflicts' - @pull.check - expect(@pull.status).to eq('blocked') - end - - it 'should already merged when already up-to-date branches' do - @pull.from_ref = 'master' - @pull.check - expect(@pull.status).to eq('merged') - end - - context 'for other head project' do - it 'master should merge with non_conflicts branch' do - @other_pull.check - expect(@other_pull.status).to eq('ready') - end - - it 'master should not merge with conflicts branch' do - @other_pull.from_ref = 'conflicts' - @other_pull.check - expect(@other_pull.status).to eq('blocked') - end - - it 'should already merged when already up-to-date branches' do - @other_pull.from_ref = 'master' - @other_pull.check - expect(@other_pull.status).to eq('merged') - end - end - - it "should not create same pull" do - expect { - @same_pull = @project.pull_requests.new(issue_attributes: {title: 'same', body: 'testing'}) - @same_pull.issue.user, @same_pull.issue.project = @user, @same_pull.to_project - @same_pull.to_ref = 'master' - @same_pull.from_project, @same_pull.from_ref = @project, 'non_conflicts' - @same_pull.save - }.to change { PullRequest.count }.by(0) - #expect(@project.pull_requests.joins(:issue).where(issues: {title: @same_pull.title}).count).to == 0 - end - - it "should not create pull with wrong base ref" do - expect { - @wrong_pull = @project.pull_requests.new(issue_attributes: {title: 'wrong base', body: 'testing'}) - @wrong_pull.issue.user, @wrong_pull.issue.project = @user, @wrong_pull.to_project - @wrong_pull.to_ref = 'wrong' - @wrong_pull.from_project, @wrong_pull.from_ref = @project, 'non_conflicts' - @wrong_pull.save - }.to change { PullRequest.count }.by(0) - end - - it "should not create pull with wrong head ref" do - expect { - @wrong_pull = @project.pull_requests.new(issue_attributes: {title: 'wrong head', body: 'testing'}) - @wrong_pull.issue.user, @wrong_pull.issue.project = @user, @wrong_pull.to_project - @wrong_pull.to_ref = 'master' - @wrong_pull.from_project, @wrong_pull.from_ref = @project, 'wrong' - @wrong_pull.save - }.to change { PullRequest.count }.by(0) - end - - it "should create pull with tag" do - expect { - system("cd #{@project.path} && git tag 4.7.5.3 $(git rev-parse #{@pull.from_ref})") # TODO REDO through grit - @pull = @project.pull_requests.new(issue_attributes: {title: 'tag', body: 'testing'}) - @pull.issue.user, @pull.issue.project = @user, @pull.to_project - @pull.to_ref = 'master' - @pull.from_project, @pull.from_ref = @project, '4.7.5.3' - @pull.save - }.to change { @project.pull_requests.count }.by(1) - end - - it "should close pull when deleting from branch" do - expect { - system("cd #{@project.path} && git branch -D #{@pull.from_branch}") - @pull.check - }.to change { - @project.pull_requests.joins(:issue).where(issues: {title: @pull.title, status: 'closed'}).count - }.by(1) - end - end - - before do - FileUtils.rm_rf(APP_CONFIG['root_path']) - end - - it { should belong_to(:issue).validate(true) } - it { should belong_to(:to_project) } - it { should belong_to(:from_project) } - - context '#update_statistic' do - let(:issue) { FactoryGirl.build(:issue) } - let(:pull_request) { FactoryGirl.build(:pull_request, issue: issue) } - - it 'updates styatistics' do - allow(PullRequest).to receive(:check_ref).and_return(true) - issue.new_pull_request = true - expect do - pull_request.save - end.to change(Statistic, :count).by(1) - expect(Statistic.last.key).to eq "#{Statistic::KEY_PULL_REQUEST}.#{Issue::STATUS_OPEN}" - end - end - - after do - FileUtils.rm_rf(APP_CONFIG['root_path']) - FileUtils.rm_rf File.join(Rails.root, "tmp", Rails.env, "pull_requests") - end -end diff --git a/spec/models/register_request_spec.rb b/spec/models/register_request_spec.rb deleted file mode 100644 index eea8bb192..000000000 --- a/spec/models/register_request_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe RegisterRequest do - pending "add some examples to (or delete) #{__FILE__}" -end diff --git a/spec/models/ssh_key_spec.rb b/spec/models/ssh_key_spec.rb deleted file mode 100644 index be9956521..000000000 --- a/spec/models/ssh_key_spec.rb +++ /dev/null @@ -1,5 +0,0 @@ -require 'spec_helper' - -describe SshKey do - pending "add some examples to (or delete) #{__FILE__}" -end diff --git a/spec/models/subscribe_spec.rb b/spec/models/subscribe_spec.rb deleted file mode 100644 index cacf7b9ba..000000000 --- a/spec/models/subscribe_spec.rb +++ /dev/null @@ -1,19 +0,0 @@ -require 'spec_helper' - -describe Subscribe do - before(:each) { stub_symlink_methods } - - context 'validates that subscribe contains user' do - - it 'when subscribe contains user' do - s = FactoryGirl.build(:subscribe) - expect(s.valid?).to be_truthy - end - - it 'when subscribe does not contains user' do - s = FactoryGirl.build(:subscribe) - s.user = nil - expect(s.valid?).to be_falsy - end - end -end diff --git a/spec/policies/advisory_policy_spec.rb b/spec/policies/advisory_policy_spec.rb deleted file mode 100644 index 766ae822f..000000000 --- a/spec/policies/advisory_policy_spec.rb +++ /dev/null @@ -1,31 +0,0 @@ -require 'spec_helper' - -RSpec.describe AdvisoryPolicy, type: :policy do - let(:advisory) { FactoryGirl.build(:advisory) } - subject { described_class } - - %i(index? search? show?).each do |perm| - permissions perm do - it "grants access to anonymous user" do - expect(subject).to permit(User.new, advisory) - end - - it "grants access to user" do - expect(subject).to permit(FactoryGirl.create(:user), advisory) - end - end - end - - %i(create? update?).each do |perm| - permissions perm do - it "denies access to anonymous user" do - expect(subject).not_to permit(User.new, advisory) - end - - it "grants access to user" do - expect(subject).to permit(FactoryGirl.create(:user), advisory) - end - end - end - -end diff --git a/spec/policies/comment_policy_spec.rb b/spec/policies/comment_policy_spec.rb deleted file mode 100644 index 4787b6866..000000000 --- a/spec/policies/comment_policy_spec.rb +++ /dev/null @@ -1,47 +0,0 @@ -require 'spec_helper' - -RSpec.describe CommentPolicy, type: :policy do - let(:comment) { FactoryGirl.build(:comment) } - subject { described_class } - - %i(create? new_line?).each do |perm| - permissions perm do - it "denies access to anonymous user" do - expect(subject).to_not permit(User.new, comment) - end - - it "denies access if user can not read a project" do - allow_any_instance_of(ProjectPolicy).to receive(:show?).and_return(false) - expect(subject).to_not permit(FactoryGirl.create(:user), comment) - end - - it "grants access if user can read a project" do - allow_any_instance_of(ProjectPolicy).to receive(:show?).and_return(true) - expect(subject).to permit(FactoryGirl.create(:user), comment) - end - end - end - - %i(update? destroy?).each do |perm| - permissions perm do - it "denies access to user" do - expect(subject).to_not permit(User.new, comment) - end - - it "grants access for creator" do - expect(subject).to permit(comment.user, comment) - end - - it "grants access for admin of project" do - allow_any_instance_of(CommentPolicy).to receive(:local_admin?). - with(comment.project).and_return(true) - expect(subject).to permit(User.new, comment) - end - - it "grants access for to global admin" do - expect(subject).to permit(FactoryGirl.build(:admin), comment) - end - end - end - -end diff --git a/spec/policies/hook_policy_spec.rb b/spec/policies/hook_policy_spec.rb deleted file mode 100644 index dc98c2dd7..000000000 --- a/spec/policies/hook_policy_spec.rb +++ /dev/null @@ -1,25 +0,0 @@ -require 'spec_helper' - -RSpec.describe HookPolicy, type: :policy do - let(:hook) { FactoryGirl.build(:hook) } - subject { described_class } - - %i(show? read? create? destroy? update?).each do |perm| - permissions perm do - it "denies access to anonymous user" do - expect(subject).to_not permit(User.new, hook) - end - - it "denies access if user can not update a project" do - allow_any_instance_of(ProjectPolicy).to receive(:update?).and_return(false) - expect(subject).to_not permit(User.new, hook) - end - - it "grants access if user can update a project" do - allow_any_instance_of(ProjectPolicy).to receive(:update?).and_return(true) - expect(subject).to permit(User.new, hook) - end - end - end - -end diff --git a/spec/policies/issue_policy_spec.rb b/spec/policies/issue_policy_spec.rb deleted file mode 100644 index 00690c80f..000000000 --- a/spec/policies/issue_policy_spec.rb +++ /dev/null @@ -1,63 +0,0 @@ -require 'spec_helper' - -RSpec.describe IssuePolicy, type: :policy do - let(:issue) { FactoryGirl.build(:issue) } - let(:user) { FactoryGirl.create(:user) } - subject { described_class } - - permissions :index? do - it "grants access to anonymous user" do - expect(subject).to permit(User.new, issue) - end - end - - %i(show? create? read?).each do |perm| - permissions perm do - it "denies access if user can not read a project" do - allow_any_instance_of(ProjectPolicy).to receive(:show?).and_return(false) - expect(subject).to_not permit(User.new, issue) - end - - context "user can read a project" do - before do - allow_any_instance_of(ProjectPolicy).to receive(:show?).and_return(true) - end - - it "grants access" do - expect(subject).to permit(User.new, issue) - end - - it "denies access if project issues are disabled" do - issue.project.has_issues = false - expect(subject).to_not permit(User.new, issue) - end - end - - end - end - - permissions :update? do - it "denies access to anonymous user" do - expect(subject).to_not permit(User.new, issue) - end - - it "denies access to user" do - expect(subject).to_not permit(user, issue) - end - - it "grants access to project admin" do - allow_any_instance_of(IssuePolicy).to receive(:local_admin?).with(issue.project).and_return(true) - expect(subject).to permit(user, issue) - end - - it "grants access to issue owner" do - issue.save! - expect(subject).to permit(issue.user, issue) - end - - it "grants access for to global admin" do - expect(subject).to permit(FactoryGirl.create(:admin), issue) - end - end - -end diff --git a/spec/policies/pull_request_policy_spec.rb b/spec/policies/pull_request_policy_spec.rb deleted file mode 100644 index 40462bd02..000000000 --- a/spec/policies/pull_request_policy_spec.rb +++ /dev/null @@ -1,80 +0,0 @@ -require 'spec_helper' - -RSpec.describe PullRequestPolicy, type: :policy do - let(:pull_request) { FactoryGirl.build(:pull_request) } - let(:user) { FactoryGirl.create(:user) } - subject { described_class } - - permissions :index? do - it "grants access to anonymous user" do - expect(subject).to permit(User.new, pull_request) - end - end - - %i(show? read? commits? files? create?).each do |perm| - permissions perm do - it "denies access if user can not read a project" do - allow_any_instance_of(ProjectPolicy).to receive(:show?).and_return(false) - expect(subject).to_not permit(User.new, pull_request) - end - - context "user can read a project" do - before do - allow_any_instance_of(ProjectPolicy).to receive(:show?).and_return(true) - end - - it "grants access" do - expect(subject).to permit(User.new, pull_request) - end - end - - it "grants access for to global admin" do - expect(subject).to permit(FactoryGirl.create(:admin), pull_request) - end - end - end - - permissions :update? do - it "denies access to anonymous user" do - expect(subject).to_not permit(User.new, pull_request) - end - - it "denies access to user" do - expect(subject).to_not permit(user, pull_request) - end - - it "grants access for writer of project" do - allow_any_instance_of(PullRequestPolicy).to receive(:local_writer?).and_return(true) - expect(subject).to permit(user, pull_request) - end - - it "grants access to issue owner" do - pull_request.user.save! - expect(subject).to permit(pull_request.user, pull_request) - end - - it "grants access for to global admin" do - expect(subject).to permit(FactoryGirl.create(:admin), pull_request) - end - end - - permissions :merge? do - it "denies access to anonymous user" do - expect(subject).to_not permit(User.new, pull_request) - end - - it "denies access to user" do - expect(subject).to_not permit(user, pull_request) - end - - it "grants access for writer of project" do - allow_any_instance_of(PullRequestPolicy).to receive(:local_writer?).and_return(true) - expect(subject).to permit(user, pull_request) - end - - it "grants access for to global admin" do - expect(subject).to permit(FactoryGirl.create(:admin), pull_request) - end - end - -end diff --git a/spec/policies/subscribe_policy_spec.rb b/spec/policies/subscribe_policy_spec.rb deleted file mode 100644 index 4fcff1167..000000000 --- a/spec/policies/subscribe_policy_spec.rb +++ /dev/null @@ -1,35 +0,0 @@ -require 'spec_helper' - -RSpec.describe SubscribePolicy, type: :policy do - let(:subscribe) { FactoryGirl.create(:subscribe) } - subject { described_class } - - permissions :create? do - it "denies access to anonymous user" do - expect(subject).to_not permit(User.new, subscribe) - end - - it "grants access to user" do - expect(subject).to permit(FactoryGirl.create(:user), subscribe) - end - - it "denies access if user already subscribed" do - expect(subject).to_not permit(subscribe.user, subscribe) - end - end - - permissions :destroy? do - it "denies access to anonymous user" do - expect(subject).to_not permit(User.new, subscribe) - end - - it "denies access to user" do - expect(subject).to_not permit(FactoryGirl.create(:user), subscribe) - end - - it "grants access if user already subscribed" do - expect(subject).to permit(subscribe.user, subscribe) - end - end - -end diff --git a/spec/spec_helper.rb b/spec/spec_helper.rb index c4f047b4b..e391b4228 100644 --- a/spec/spec_helper.rb +++ b/spec/spec_helper.rb @@ -57,14 +57,14 @@ def http_login(user=nil, password = '123456') end def stub_symlink_methods - allow_any_instance_of(Platform).to receive(:symlink_directory).and_return(true) - allow_any_instance_of(Platform).to receive(:remove_symlink_directory).and_return(true) + #allow_any_instance_of(Platform).to receive(:symlink_directory).and_return(true) + #allow_any_instance_of(Platform).to receive(:remove_symlink_directory).and_return(true) allow_any_instance_of(Platform).to receive(:create_empty_metadata).and_return(true) allow_any_instance_of(Repository).to receive(:create_empty_metadata).and_return(true) end -Resque.inline = true +#Resque.inline = true APP_CONFIG['root_path'] = "#{Rails.root}/tmp/test_root" APP_CONFIG['git_path'] = "#{Rails.root}/tmp/test_root" APP_CONFIG['tmpfs_path'] = "#{Rails.root}/tmp/test_root" @@ -83,7 +83,7 @@ def stub_redis allow(Redis).to receive(:new).and_return(@redis_instance) allow(Redis).to receive(:current).and_return(@redis_instance) allow(Redis::Store).to receive(:new).and_return(@redis_instance) - Resque.redis = @redis_instance + #Resque.redis = @redis_instance end def fill_project project