111 lines
3 KiB
Ruby
111 lines
3 KiB
Ruby
# frozen_string_literal: true
|
||
|
||
require 'spec_helper'
|
||
|
||
describe Groups::CreateService, '#execute' do
|
||
let!(:user) { create(:user) }
|
||
let!(:group_params) { { path: "group_path", visibility_level: Gitlab::VisibilityLevel::PUBLIC } }
|
||
|
||
subject { service.execute }
|
||
|
||
describe 'visibility level restrictions' do
|
||
let!(:service) { described_class.new(user, group_params) }
|
||
|
||
context "create groups without restricted visibility level" do
|
||
it { is_expected.to be_persisted }
|
||
end
|
||
|
||
context "cannot create group with restricted visibility level" do
|
||
before do
|
||
allow_any_instance_of(ApplicationSetting).to receive(:restricted_visibility_levels).and_return([Gitlab::VisibilityLevel::PUBLIC])
|
||
end
|
||
|
||
it { is_expected.not_to be_persisted }
|
||
end
|
||
end
|
||
|
||
describe 'creating a top level group' do
|
||
let(:service) { described_class.new(user, group_params) }
|
||
|
||
context 'when user can create a group' do
|
||
before do
|
||
user.update_attribute(:can_create_group, true)
|
||
end
|
||
|
||
it { is_expected.to be_persisted }
|
||
end
|
||
|
||
context 'when user can not create a group' do
|
||
before do
|
||
user.update_attribute(:can_create_group, false)
|
||
end
|
||
|
||
it { is_expected.not_to be_persisted }
|
||
end
|
||
end
|
||
|
||
describe 'creating subgroup' do
|
||
let!(:group) { create(:group) }
|
||
let!(:service) { described_class.new(user, group_params.merge(parent_id: group.id)) }
|
||
|
||
context 'as group owner' do
|
||
before do
|
||
group.add_owner(user)
|
||
end
|
||
|
||
it { is_expected.to be_persisted }
|
||
end
|
||
|
||
context 'as guest' do
|
||
it 'does not save group and returns an error' do
|
||
is_expected.not_to be_persisted
|
||
|
||
expect(subject.errors[:parent_id].first).to eq(s_('CreateGroup|You don’t have permission to create a subgroup in this group.'))
|
||
expect(subject.parent_id).to be_nil
|
||
end
|
||
end
|
||
|
||
context 'as owner' do
|
||
before do
|
||
group.add_owner(user)
|
||
end
|
||
|
||
it { is_expected.to be_persisted }
|
||
end
|
||
|
||
context 'as maintainer' do
|
||
before do
|
||
group.add_maintainer(user)
|
||
end
|
||
|
||
it { is_expected.to be_persisted }
|
||
end
|
||
end
|
||
|
||
describe "when visibility level is passed as a string" do
|
||
let(:service) { described_class.new(user, group_params) }
|
||
let(:group_params) { { path: 'group_path', visibility: 'public' } }
|
||
|
||
it "assigns the correct visibility level" do
|
||
group = service.execute
|
||
|
||
expect(group.visibility_level).to eq(Gitlab::VisibilityLevel::PUBLIC)
|
||
end
|
||
end
|
||
|
||
describe 'creating a mattermost team' do
|
||
let!(:params) { group_params.merge(create_chat_team: "true") }
|
||
let!(:service) { described_class.new(user, params) }
|
||
|
||
before do
|
||
stub_mattermost_setting(enabled: true)
|
||
end
|
||
|
||
it 'create the chat team with the group' do
|
||
allow_any_instance_of(Mattermost::Team).to receive(:create)
|
||
.and_return({ 'name' => 'tanuki', 'id' => 'lskdjfwlekfjsdifjj' })
|
||
|
||
expect { subject }.to change { ChatTeam.count }.from(0).to(1)
|
||
end
|
||
end
|
||
end
|