require 'spec_helper' describe Todos::Destroy::EntityLeaveService do let(:group) { create(:group, :private) } let(:project) { create(:project, group: group) } let(:user) { create(:user) } let(:user2) { create(:user) } let(:issue) { create(:issue, project: project) } let(:mr) { create(:merge_request, source_project: project) } let!(:todo_mr_user) { create(:todo, user: user, target: mr, project: project) } let!(:todo_issue_user) { create(:todo, user: user, target: issue, project: project) } let!(:todo_issue_user2) { create(:todo, user: user2, target: issue, project: project) } describe '#execute' do context 'when a user leaves a project' do subject { described_class.new(user.id, project.id, 'Project').execute } context 'when project is private' do it 'removes todos for the provided user' do expect { subject }.to change { Todo.count }.from(3).to(1) expect(user.todos).to be_empty expect(user2.todos).to match_array([todo_issue_user2]) end end context 'when project is not private' do before do group.update!(visibility_level: Gitlab::VisibilityLevel::INTERNAL) project.update!(visibility_level: Gitlab::VisibilityLevel::INTERNAL) end context 'when a user is not an author of confidential issue' do before do issue.update!(confidential: true) end it 'removes only confidential issues todos' do expect { subject }.to change { Todo.count }.from(3).to(2) end end context 'when a user is an author of confidential issue' do before do issue.update!(author: user, confidential: true) end it 'removes only confidential issues todos' do expect { subject }.not_to change { Todo.count } end end context 'when a user is an assignee of confidential issue' do before do issue.update!(confidential: true) issue.assignees << user end it 'removes only confidential issues todos' do expect { subject }.not_to change { Todo.count } end end context 'feature visibility check' do context 'when issues are visible only to project members' do before do project.project_feature.update!(issues_access_level: ProjectFeature::PRIVATE) end it 'removes only users issue todos' do expect { subject }.to change { Todo.count }.from(3).to(2) end end end end end context 'when a user leaves a group' do subject { described_class.new(user.id, group.id, 'Group').execute } context 'when group is private' do it 'removes todos for the user' do expect { subject }.to change { Todo.count }.from(3).to(1) expect(user.todos).to be_empty expect(user2.todos).to match_array([todo_issue_user2]) end context 'with nested groups', :nested_groups do let(:subgroup) { create(:group, :private, parent: group) } let(:subproject) { create(:project, group: subgroup) } let!(:todo_subproject_user) { create(:todo, user: user, project: subproject) } let!(:todo_subproject_user2) { create(:todo, user: user2, project: subproject) } it 'removes todos for the user including subprojects todos' do expect { subject }.to change { Todo.count }.from(5).to(2) expect(user.todos).to be_empty expect(user2.todos) .to match_array([todo_issue_user2, todo_subproject_user2]) end end end context 'when group is not private' do before do issue.update!(confidential: true) group.update!(visibility_level: Gitlab::VisibilityLevel::INTERNAL) project.update!(visibility_level: Gitlab::VisibilityLevel::INTERNAL) end it 'removes only confidential issues todos' do expect { subject }.to change { Todo.count }.from(3).to(2) end end end context 'when entity type is not valid' do it 'raises an exception' do expect { described_class.new(user.id, group.id, 'GroupWrongly').execute } .to raise_error(ArgumentError) end end context 'when entity was not found' do it 'does not remove any todos' do expect { described_class.new(user.id, 999999, 'Group').execute } .not_to change { Todo.count } end end end end