2016-08-01 18:31:21 -04:00
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe ProjectFeature do
|
2017-08-02 15:55:11 -04:00
|
|
|
let(:project) { create(:project) }
|
2016-08-01 18:31:21 -04:00
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
2017-06-14 08:31:20 -04:00
|
|
|
describe '.quoted_access_level_column' do
|
|
|
|
it 'returns the table name and quoted column name for a feature' do
|
|
|
|
expected = if Gitlab::Database.postgresql?
|
|
|
|
'"project_features"."issues_access_level"'
|
|
|
|
else
|
|
|
|
'`project_features`.`issues_access_level`'
|
|
|
|
end
|
|
|
|
|
|
|
|
expect(described_class.quoted_access_level_column(:issues)).to eq(expected)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-08-01 18:31:21 -04:00
|
|
|
describe '#feature_available?' do
|
2016-09-16 15:15:39 -04:00
|
|
|
let(:features) { %w(issues wiki builds merge_requests snippets repository) }
|
2016-08-01 18:31:21 -04:00
|
|
|
|
|
|
|
context 'when features are disabled' do
|
|
|
|
it "returns false" do
|
|
|
|
features.each do |feature|
|
|
|
|
project.project_feature.update_attribute("#{feature}_access_level".to_sym, ProjectFeature::DISABLED)
|
|
|
|
expect(project.feature_available?(:issues, user)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when features are enabled only for team members' do
|
|
|
|
it "returns false when user is not a team member" do
|
|
|
|
features.each do |feature|
|
|
|
|
project.project_feature.update_attribute("#{feature}_access_level".to_sym, ProjectFeature::PRIVATE)
|
|
|
|
expect(project.feature_available?(:issues, user)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true when user is a team member" do
|
2017-12-22 03:18:28 -05:00
|
|
|
project.add_developer(user)
|
2016-08-01 18:31:21 -04:00
|
|
|
|
|
|
|
features.each do |feature|
|
|
|
|
project.project_feature.update_attribute("#{feature}_access_level".to_sym, ProjectFeature::PRIVATE)
|
|
|
|
expect(project.feature_available?(:issues, user)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true when user is a member of project group" do
|
|
|
|
group = create(:group)
|
2017-08-02 15:55:11 -04:00
|
|
|
project = create(:project, namespace: group)
|
2016-08-01 18:31:21 -04:00
|
|
|
group.add_developer(user)
|
|
|
|
|
|
|
|
features.each do |feature|
|
|
|
|
project.project_feature.update_attribute("#{feature}_access_level".to_sym, ProjectFeature::PRIVATE)
|
|
|
|
expect(project.feature_available?(:issues, user)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true if user is an admin" do
|
|
|
|
user.update_attribute(:admin, true)
|
|
|
|
|
|
|
|
features.each do |feature|
|
|
|
|
project.project_feature.update_attribute("#{feature}_access_level".to_sym, ProjectFeature::PRIVATE)
|
|
|
|
expect(project.feature_available?(:issues, user)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when feature is enabled for everyone' do
|
|
|
|
it "returns true" do
|
|
|
|
features.each do |feature|
|
|
|
|
expect(project.feature_available?(:issues, user)).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-09-16 15:15:39 -04:00
|
|
|
context 'repository related features' do
|
|
|
|
before do
|
2018-07-02 06:43:06 -04:00
|
|
|
project.project_feature.update(
|
2016-09-16 15:15:39 -04:00
|
|
|
merge_requests_access_level: ProjectFeature::DISABLED,
|
|
|
|
builds_access_level: ProjectFeature::DISABLED,
|
|
|
|
repository_access_level: ProjectFeature::PRIVATE
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not allow repository related features have higher level" do
|
|
|
|
features = %w(builds merge_requests)
|
|
|
|
project_feature = project.project_feature
|
|
|
|
|
|
|
|
features.each do |feature|
|
|
|
|
field = "#{feature}_access_level".to_sym
|
|
|
|
project_feature.update_attribute(field, ProjectFeature::ENABLED)
|
|
|
|
expect(project_feature.valid?).to be_falsy
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-08-01 18:31:21 -04:00
|
|
|
describe '#*_enabled?' do
|
|
|
|
let(:features) { %w(wiki builds merge_requests) }
|
|
|
|
|
|
|
|
it "returns false when feature is disabled" do
|
|
|
|
features.each do |feature|
|
|
|
|
project.project_feature.update_attribute("#{feature}_access_level".to_sym, ProjectFeature::DISABLED)
|
|
|
|
expect(project.public_send("#{feature}_enabled?")).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true when feature is enabled only for team members" do
|
|
|
|
features.each do |feature|
|
|
|
|
project.project_feature.update_attribute("#{feature}_access_level".to_sym, ProjectFeature::PRIVATE)
|
|
|
|
expect(project.public_send("#{feature}_enabled?")).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns true when feature is enabled for everyone" do
|
|
|
|
features.each do |feature|
|
|
|
|
expect(project.public_send("#{feature}_enabled?")).to eq(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-07-05 11:46:10 -04:00
|
|
|
|
|
|
|
context 'Site Statistics' do
|
|
|
|
set(:project_with_wiki) { create(:project, :wiki_enabled) }
|
|
|
|
set(:project_without_wiki) { create(:project, :wiki_disabled) }
|
|
|
|
|
|
|
|
context 'when creating a project' do
|
|
|
|
it 'tracks wiki availability when wikis are enabled by default' do
|
|
|
|
expect { create(:project) }.to change { SiteStatistic.fetch.wikis_count }.by(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not track wiki availability when wikis are disabled by default' do
|
|
|
|
expect { create(:project, :wiki_disabled) }.not_to change { SiteStatistic.fetch.wikis_count }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when updating a project_feature' do
|
|
|
|
it 'untracks wiki availability when disabling wiki access' do
|
|
|
|
expect { project_with_wiki.project_feature.update_attribute(:wiki_access_level, ProjectFeature::DISABLED) }
|
|
|
|
.to change { SiteStatistic.fetch.wikis_count }.by(-1)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'tracks again wiki availability when re-enabling wiki access as public' do
|
|
|
|
expect { project_without_wiki.project_feature.update_attribute(:wiki_access_level, ProjectFeature::ENABLED) }
|
|
|
|
.to change { SiteStatistic.fetch.wikis_count }.by(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'tracks again wiki availability when re-enabling wiki access as private' do
|
|
|
|
expect { project_without_wiki.project_feature.update_attribute(:wiki_access_level, ProjectFeature::PRIVATE) }
|
|
|
|
.to change { SiteStatistic.fetch.wikis_count }.by(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when removing a project' do
|
|
|
|
it 'untracks wiki availability when removing a project with previous wiki access' do
|
|
|
|
expect { project_with_wiki.destroy }.to change { SiteStatistic.fetch.wikis_count }.by(-1)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not untrack wiki availability when removing a project without wiki access' do
|
|
|
|
expect { project_without_wiki.destroy }.not_to change { SiteStatistic.fetch.wikis_count }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2016-08-01 18:31:21 -04:00
|
|
|
end
|