Skip to content
Snippets Groups Projects
Commit a6ec5121 authored by Robert Speicher's avatar Robert Speicher
Browse files

Correct RSpec/SingleLineHook cop offenses

parent 69ad827e
No related branches found
No related tags found
No related merge requests found
Showing
with 274 additions and 89 deletions
Loading
Loading
@@ -2,7 +2,10 @@ require 'spec_helper'
 
describe Admin::IdentitiesController do
let(:admin) { create(:admin) }
before { sign_in(admin) }
before do
sign_in(admin)
end
 
describe 'UPDATE identity' do
let(:user) { create(:omniauth_user, provider: 'ldapmain', extern_uid: 'uid=myuser,ou=people,dc=example,dc=com') }
Loading
Loading
Loading
Loading
@@ -3,7 +3,9 @@ require 'spec_helper'
describe Admin::ServicesController do
let(:admin) { create(:admin) }
 
before { sign_in(admin) }
before do
sign_in(admin)
end
 
describe 'GET #edit' do
let!(:project) { create(:empty_project) }
Loading
Loading
Loading
Loading
@@ -200,7 +200,9 @@ describe AutocompleteController do
end
 
context 'skip_users parameter included' do
before { sign_in(user) }
before do
sign_in(user)
end
 
it 'skips the user IDs passed' do
get(:users, skip_users: [user, user2].map(&:id))
Loading
Loading
Loading
Loading
@@ -16,10 +16,14 @@ describe Groups::GroupMembersController do
describe 'POST create' do
let(:group_user) { create(:user) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when user does not have enough rights' do
before { group.add_developer(user) }
before do
group.add_developer(user)
end
 
it 'returns 403' do
post :create, group_id: group,
Loading
Loading
@@ -32,7 +36,9 @@ describe Groups::GroupMembersController do
end
 
context 'when user has enough rights' do
before { group.add_owner(user) }
before do
group.add_owner(user)
end
 
it 'adds user to members' do
post :create, group_id: group,
Loading
Loading
@@ -59,7 +65,9 @@ describe Groups::GroupMembersController do
describe 'DELETE destroy' do
let(:member) { create(:group_member, :developer, group: group) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when member is not found' do
it 'returns 403' do
Loading
Loading
@@ -71,7 +79,9 @@ describe Groups::GroupMembersController do
 
context 'when member is found' do
context 'when user does not have enough rights' do
before { group.add_developer(user) }
before do
group.add_developer(user)
end
 
it 'returns 403' do
delete :destroy, group_id: group, id: member
Loading
Loading
@@ -82,7 +92,9 @@ describe Groups::GroupMembersController do
end
 
context 'when user has enough rights' do
before { group.add_owner(user) }
before do
group.add_owner(user)
end
 
it '[HTML] removes user from members' do
delete :destroy, group_id: group, id: member
Loading
Loading
@@ -103,7 +115,9 @@ describe Groups::GroupMembersController do
end
 
describe 'DELETE leave' do
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when member is not found' do
it 'returns 404' do
Loading
Loading
@@ -115,7 +129,9 @@ describe Groups::GroupMembersController do
 
context 'when member is found' do
context 'and is not an owner' do
before { group.add_developer(user) }
before do
group.add_developer(user)
end
 
it 'removes user from members' do
delete :leave, group_id: group
Loading
Loading
@@ -134,7 +150,9 @@ describe Groups::GroupMembersController do
end
 
context 'and is an owner' do
before { group.add_owner(user) }
before do
group.add_owner(user)
end
 
it 'cannot removes himself from the group' do
delete :leave, group_id: group
Loading
Loading
@@ -144,7 +162,9 @@ describe Groups::GroupMembersController do
end
 
context 'and is a requester' do
before { group.request_access(user) }
before do
group.request_access(user)
end
 
it 'removes user from members' do
delete :leave, group_id: group
Loading
Loading
@@ -159,7 +179,9 @@ describe Groups::GroupMembersController do
end
 
describe 'POST request_access' do
before { sign_in(user) }
before do
sign_in(user)
end
 
it 'creates a new GroupMember that is not a team member' do
post :request_access, group_id: group
Loading
Loading
@@ -174,7 +196,9 @@ describe Groups::GroupMembersController do
describe 'POST approve_access_request' do
let(:member) { create(:group_member, :access_request, group: group) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when member is not found' do
it 'returns 403' do
Loading
Loading
@@ -186,7 +210,9 @@ describe Groups::GroupMembersController do
 
context 'when member is found' do
context 'when user does not have enough rights' do
before { group.add_developer(user) }
before do
group.add_developer(user)
end
 
it 'returns 403' do
post :approve_access_request, group_id: group, id: member
Loading
Loading
@@ -197,7 +223,9 @@ describe Groups::GroupMembersController do
end
 
context 'when user has enough rights' do
before { group.add_owner(user) }
before do
group.add_owner(user)
end
 
it 'adds user to members' do
post :approve_access_request, group_id: group, id: member
Loading
Loading
Loading
Loading
@@ -94,7 +94,10 @@ describe NotificationSettingsController do
 
context 'not authorized' do
let(:private_project) { create(:empty_project, :private) }
before { sign_in(user) }
before do
sign_in(user)
end
 
it 'returns 404' do
post :create,
Loading
Loading
@@ -120,7 +123,9 @@ describe NotificationSettingsController do
end
 
context 'when authorized' do
before{ sign_in(user) }
before do
sign_in(user)
end
 
it 'returns success' do
put :update,
Loading
Loading
@@ -152,7 +157,9 @@ describe NotificationSettingsController do
context 'not authorized' do
let(:other_user) { create(:user) }
 
before { sign_in(other_user) }
before do
sign_in(other_user)
end
 
it 'returns 404' do
put :update,
Loading
Loading
Loading
Loading
@@ -4,7 +4,9 @@ describe Profiles::PersonalAccessTokensController do
let(:user) { create(:user) }
let(:token_attributes) { attributes_for(:personal_access_token) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
describe '#create' do
def created_token
Loading
Loading
@@ -38,7 +40,9 @@ describe Profiles::PersonalAccessTokensController do
let!(:inactive_personal_access_token) { create(:personal_access_token, :revoked, user: user) }
let!(:impersonation_personal_access_token) { create(:personal_access_token, :impersonation, user: user) }
 
before { get :index }
before do
get :index
end
 
it "retrieves active personal access tokens" do
expect(assigns(:active_personal_access_tokens)).to include(active_personal_access_token)
Loading
Loading
Loading
Loading
@@ -281,7 +281,9 @@ describe Projects::CommitController do
end
 
context 'when the path does not exist in the diff' do
before { diff_for_path(id: commit.id, old_path: existing_path.succ, new_path: existing_path.succ) }
before do
diff_for_path(id: commit.id, old_path: existing_path.succ, new_path: existing_path.succ)
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
@@ -302,7 +304,9 @@ describe Projects::CommitController do
end
 
context 'when the commit does not exist' do
before { diff_for_path(id: commit.id.succ, old_path: existing_path, new_path: existing_path) }
before do
diff_for_path(id: commit.id.succ, old_path: existing_path, new_path: existing_path)
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
Loading
Loading
@@ -128,7 +128,9 @@ describe Projects::CompareController do
end
 
context 'when the path does not exist in the diff' do
before { diff_for_path(from: ref_from, to: ref_to, old_path: existing_path.succ, new_path: existing_path.succ) }
before do
diff_for_path(from: ref_from, to: ref_to, old_path: existing_path.succ, new_path: existing_path.succ)
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
@@ -149,7 +151,9 @@ describe Projects::CompareController do
end
 
context 'when the from ref does not exist' do
before { diff_for_path(from: ref_from.succ, to: ref_to, old_path: existing_path, new_path: existing_path) }
before do
diff_for_path(from: ref_from.succ, to: ref_to, old_path: existing_path, new_path: existing_path)
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
@@ -157,7 +161,9 @@ describe Projects::CompareController do
end
 
context 'when the to ref does not exist' do
before { diff_for_path(from: ref_from, to: ref_to.succ, old_path: existing_path, new_path: existing_path) }
before do
diff_for_path(from: ref_from, to: ref_to.succ, old_path: existing_path, new_path: existing_path)
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
Loading
Loading
@@ -14,7 +14,9 @@ describe Projects::ForksController do
end
 
context 'when fork is public' do
before { forked_project.update_attribute(:visibility_level, Project::PUBLIC) }
before do
forked_project.update_attribute(:visibility_level, Project::PUBLIC)
end
 
it 'is visible for non logged in users' do
get_forks
Loading
Loading
@@ -35,7 +37,9 @@ describe Projects::ForksController do
end
 
context 'when user is logged in' do
before { sign_in(project.creator) }
before do
sign_in(project.creator)
end
 
context 'when user is not a Project member neither a group member' do
it 'does not see the Project listed' do
Loading
Loading
@@ -46,7 +50,9 @@ describe Projects::ForksController do
end
 
context 'when user is a member of the Project' do
before { forked_project.team << [project.creator, :developer] }
before do
forked_project.team << [project.creator, :developer]
end
 
it 'sees the project listed' do
get_forks
Loading
Loading
@@ -56,7 +62,9 @@ describe Projects::ForksController do
end
 
context 'when user is a member of the Group' do
before { forked_project.group.add_developer(project.creator) }
before do
forked_project.group.add_developer(project.creator)
end
 
it 'sees the project listed' do
get_forks
Loading
Loading
Loading
Loading
@@ -22,7 +22,10 @@ describe Projects::GroupLinksController do
end
 
context 'when user has access to group he want to link project to' do
before { group.add_developer(user) }
before do
group.add_developer(user)
end
include_context 'link project to group'
 
it 'links project with selected group' do
Loading
Loading
Loading
Loading
@@ -212,7 +212,9 @@ describe Projects::IssuesController do
let(:another_project) { create(:empty_project, :private) }
 
context 'when user has access to move issue' do
before { another_project.team << [user, :reporter] }
before do
another_project.team << [user, :reporter]
end
 
it 'moves issue to another project' do
move_issue
Loading
Loading
@@ -250,14 +252,18 @@ describe Projects::IssuesController do
end
 
context 'when an issue is identified as spam' do
before { allow_any_instance_of(AkismetService).to receive(:is_spam?).and_return(true) }
before do
allow_any_instance_of(AkismetService).to receive(:is_spam?).and_return(true)
end
 
context 'when captcha is not verified' do
def update_spam_issue
update_issue(title: 'Spam Title', description: 'Spam lives here')
end
 
before { allow_any_instance_of(described_class).to receive(:verify_recaptcha).and_return(false) }
before do
allow_any_instance_of(described_class).to receive(:verify_recaptcha).and_return(false)
end
 
it 'rejects an issue recognized as a spam' do
expect(Gitlab::Recaptcha).to receive(:load_configurations!).and_return(true)
Loading
Loading
@@ -620,14 +626,18 @@ describe Projects::IssuesController do
end
 
context 'when an issue is identified as spam' do
before { allow_any_instance_of(AkismetService).to receive(:is_spam?).and_return(true) }
before do
allow_any_instance_of(AkismetService).to receive(:is_spam?).and_return(true)
end
 
context 'when captcha is not verified' do
def post_spam_issue
post_new_issue(title: 'Spam Title', description: 'Spam lives here')
end
 
before { allow_any_instance_of(described_class).to receive(:verify_recaptcha).and_return(false) }
before do
allow_any_instance_of(described_class).to receive(:verify_recaptcha).and_return(false)
end
 
it 'rejects an issue recognized as a spam' do
expect { post_spam_issue }.not_to change(Issue, :count)
Loading
Loading
@@ -739,7 +749,10 @@ describe Projects::IssuesController do
 
describe "DELETE #destroy" do
context "when the user is a developer" do
before { sign_in(user) }
before do
sign_in(user)
end
it "rejects a developer to destroy an issue" do
delete :destroy, namespace_id: project.namespace, project_id: project, id: issue.iid
expect(response).to have_http_status(404)
Loading
Loading
@@ -751,7 +764,9 @@ describe Projects::IssuesController do
let(:namespace) { create(:namespace, owner: owner) }
let(:project) { create(:empty_project, namespace: namespace) }
 
before { sign_in(owner) }
before do
sign_in(owner)
end
 
it "deletes the issue" do
delete :destroy, namespace_id: project.namespace, project_id: project, id: issue.iid
Loading
Loading
Loading
Loading
@@ -19,7 +19,10 @@ describe Projects::MergeRequestsController do
render_views
 
let(:fork_project) { create(:forked_project_with_submodules) }
before { fork_project.team << [user, :master] }
before do
fork_project.team << [user, :master]
end
 
context 'when rendering HTML response' do
it 'renders new merge request widget template' do
Loading
Loading
@@ -328,7 +331,9 @@ describe Projects::MergeRequestsController do
end
 
context 'when the sha parameter does not match the source SHA' do
before { post :merge, base_params.merge(sha: 'foo') }
before do
post :merge, base_params.merge(sha: 'foo')
end
 
it 'returns :sha_mismatch' do
expect(json_response).to eq('status' => 'sha_mismatch')
Loading
Loading
@@ -473,7 +478,9 @@ describe Projects::MergeRequestsController do
let(:namespace) { create(:namespace, owner: owner) }
let(:project) { create(:project, namespace: namespace) }
 
before { sign_in owner }
before do
sign_in owner
end
 
it "deletes the merge request" do
delete :destroy, namespace_id: project.namespace, project_id: project, id: merge_request.iid
Loading
Loading
@@ -505,7 +512,9 @@ describe Projects::MergeRequestsController do
 
context 'with default params' do
context 'as html' do
before { go(format: 'html') }
before do
go(format: 'html')
end
 
it 'renders the diff template' do
expect(response).to render_template('diffs')
Loading
Loading
@@ -513,7 +522,9 @@ describe Projects::MergeRequestsController do
end
 
context 'as json' do
before { go(format: 'json') }
before do
go(format: 'json')
end
 
it 'renders the diffs template to a string' do
expect(response).to render_template('projects/merge_requests/show/_diffs')
Loading
Loading
@@ -544,7 +555,9 @@ describe Projects::MergeRequestsController do
 
context 'with ignore_whitespace_change' do
context 'as html' do
before { go(format: 'html', w: 1) }
before do
go(format: 'html', w: 1)
end
 
it 'renders the diff template' do
expect(response).to render_template('diffs')
Loading
Loading
@@ -552,7 +565,9 @@ describe Projects::MergeRequestsController do
end
 
context 'as json' do
before { go(format: 'json', w: 1) }
before do
go(format: 'json', w: 1)
end
 
it 'renders the diffs template to a string' do
expect(response).to render_template('projects/merge_requests/show/_diffs')
Loading
Loading
@@ -562,7 +577,9 @@ describe Projects::MergeRequestsController do
end
 
context 'with view' do
before { go(view: 'parallel') }
before do
go(view: 'parallel')
end
 
it 'saves the preferred diff view in a cookie' do
expect(response.cookies['diff_view']).to eq('parallel')
Loading
Loading
@@ -605,7 +622,9 @@ describe Projects::MergeRequestsController do
end
 
context 'when the path does not exist in the diff' do
before { diff_for_path(id: merge_request.iid, old_path: 'files/ruby/nopen.rb', new_path: 'files/ruby/nopen.rb') }
before do
diff_for_path(id: merge_request.iid, old_path: 'files/ruby/nopen.rb', new_path: 'files/ruby/nopen.rb')
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
@@ -626,7 +645,9 @@ describe Projects::MergeRequestsController do
end
 
context 'when the merge request does not exist' do
before { diff_for_path(id: merge_request.iid.succ, old_path: existing_path, new_path: existing_path) }
before do
diff_for_path(id: merge_request.iid.succ, old_path: existing_path, new_path: existing_path)
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
@@ -670,7 +691,9 @@ describe Projects::MergeRequestsController do
context 'when the source branch is in a different project to the target' do
let(:other_project) { create(:project) }
 
before { other_project.team << [user, :master] }
before do
other_project.team << [user, :master]
end
 
context 'when the path exists in the diff' do
it 'disables diff notes' do
Loading
Loading
@@ -690,7 +713,9 @@ describe Projects::MergeRequestsController do
end
 
context 'when the path does not exist in the diff' do
before { diff_for_path(old_path: 'files/ruby/nopen.rb', new_path: 'files/ruby/nopen.rb', merge_request: { source_project: other_project, source_branch: 'feature', target_branch: 'master' }) }
before do
diff_for_path(old_path: 'files/ruby/nopen.rb', new_path: 'files/ruby/nopen.rb', merge_request: { source_project: other_project, source_branch: 'feature', target_branch: 'master' })
end
 
it 'returns a 404' do
expect(response).to have_http_status(404)
Loading
Loading
@@ -913,7 +938,9 @@ describe Projects::MergeRequestsController do
end
 
context 'when the file does not exist cannot be resolved in the UI' do
before { conflict_for_path('files/ruby/regexp.rb') }
before do
conflict_for_path('files/ruby/regexp.rb')
end
 
it 'returns a 404 status code' do
expect(response).to have_http_status(:not_found)
Loading
Loading
@@ -923,7 +950,9 @@ describe Projects::MergeRequestsController do
context 'with an existing file' do
let(:path) { 'files/ruby/regex.rb' }
 
before { conflict_for_path(path) }
before do
conflict_for_path(path)
end
 
it 'returns a 200 status code' do
expect(response).to have_http_status(:ok)
Loading
Loading
@@ -1195,7 +1224,9 @@ describe Projects::MergeRequestsController do
end
 
context 'when head_pipeline does not exist' do
before { get_pipeline_status }
before do
get_pipeline_status
end
 
it 'return empty' do
expect(response).to have_http_status(:ok)
Loading
Loading
Loading
Loading
@@ -16,10 +16,14 @@ describe Projects::ProjectMembersController do
describe 'POST create' do
let(:project_user) { create(:user) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when user does not have enough rights' do
before { project.team << [user, :developer] }
before do
project.team << [user, :developer]
end
 
it 'returns 404' do
post :create, namespace_id: project.namespace,
Loading
Loading
@@ -33,7 +37,9 @@ describe Projects::ProjectMembersController do
end
 
context 'when user has enough rights' do
before { project.team << [user, :master] }
before do
project.team << [user, :master]
end
 
it 'adds user to members' do
expect_any_instance_of(Members::CreateService).to receive(:execute).and_return(status: :success)
Loading
Loading
@@ -64,7 +70,9 @@ describe Projects::ProjectMembersController do
describe 'DELETE destroy' do
let(:member) { create(:project_member, :developer, project: project) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when member is not found' do
it 'returns 404' do
Loading
Loading
@@ -78,7 +86,9 @@ describe Projects::ProjectMembersController do
 
context 'when member is found' do
context 'when user does not have enough rights' do
before { project.team << [user, :developer] }
before do
project.team << [user, :developer]
end
 
it 'returns 404' do
delete :destroy, namespace_id: project.namespace,
Loading
Loading
@@ -91,7 +101,9 @@ describe Projects::ProjectMembersController do
end
 
context 'when user has enough rights' do
before { project.team << [user, :master] }
before do
project.team << [user, :master]
end
 
it '[HTML] removes user from members' do
delete :destroy, namespace_id: project.namespace,
Loading
Loading
@@ -117,7 +129,9 @@ describe Projects::ProjectMembersController do
end
 
describe 'DELETE leave' do
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when member is not found' do
it 'returns 404' do
Loading
Loading
@@ -130,7 +144,9 @@ describe Projects::ProjectMembersController do
 
context 'when member is found' do
context 'and is not an owner' do
before { project.team << [user, :developer] }
before do
project.team << [user, :developer]
end
 
it 'removes user from members' do
delete :leave, namespace_id: project.namespace,
Loading
Loading
@@ -145,7 +161,9 @@ describe Projects::ProjectMembersController do
context 'and is an owner' do
let(:project) { create(:empty_project, namespace: user.namespace) }
 
before { project.team << [user, :master] }
before do
project.team << [user, :master]
end
 
it 'cannot remove himself from the project' do
delete :leave, namespace_id: project.namespace,
Loading
Loading
@@ -156,7 +174,9 @@ describe Projects::ProjectMembersController do
end
 
context 'and is a requester' do
before { project.request_access(user) }
before do
project.request_access(user)
end
 
it 'removes user from members' do
delete :leave, namespace_id: project.namespace,
Loading
Loading
@@ -172,7 +192,9 @@ describe Projects::ProjectMembersController do
end
 
describe 'POST request_access' do
before { sign_in(user) }
before do
sign_in(user)
end
 
it 'creates a new ProjectMember that is not a team member' do
post :request_access, namespace_id: project.namespace,
Loading
Loading
@@ -190,7 +212,9 @@ describe Projects::ProjectMembersController do
describe 'POST approve' do
let(:member) { create(:project_member, :access_request, project: project) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when member is not found' do
it 'returns 404' do
Loading
Loading
@@ -204,7 +228,9 @@ describe Projects::ProjectMembersController do
 
context 'when member is found' do
context 'when user does not have enough rights' do
before { project.team << [user, :developer] }
before do
project.team << [user, :developer]
end
 
it 'returns 404' do
post :approve_access_request, namespace_id: project.namespace,
Loading
Loading
@@ -217,7 +243,9 @@ describe Projects::ProjectMembersController do
end
 
context 'when user has enough rights' do
before { project.team << [user, :master] }
before do
project.team << [user, :master]
end
 
it 'adds user to members' do
post :approve_access_request, namespace_id: project.namespace,
Loading
Loading
@@ -252,7 +280,10 @@ describe Projects::ProjectMembersController do
end
 
context 'when user can access source project members' do
before { another_project.team << [user, :guest] }
before do
another_project.team << [user, :guest]
end
include_context 'import applied'
 
it 'imports source project members' do
Loading
Loading
Loading
Loading
@@ -46,7 +46,9 @@ describe Projects::SnippetsController do
end
 
context 'when signed in as the author' do
before { sign_in(user) }
before do
sign_in(user)
end
 
it 'renders the snippet' do
get :index, namespace_id: project.namespace, project_id: project
Loading
Loading
@@ -57,7 +59,9 @@ describe Projects::SnippetsController do
end
 
context 'when signed in as a project member' do
before { sign_in(user2) }
before do
sign_in(user2)
end
 
it 'renders the snippet' do
get :index, namespace_id: project.namespace, project_id: project
Loading
Loading
@@ -317,7 +321,9 @@ describe Projects::SnippetsController do
end
 
context 'when signed in as the author' do
before { sign_in(user) }
before do
sign_in(user)
end
 
it 'renders the snippet' do
get action, namespace_id: project.namespace, project_id: project, id: project_snippet.to_param
Loading
Loading
@@ -328,7 +334,9 @@ describe Projects::SnippetsController do
end
 
context 'when signed in as a project member' do
before { sign_in(user2) }
before do
sign_in(user2)
end
 
it 'renders the snippet' do
get action, namespace_id: project.namespace, project_id: project, id: project_snippet.to_param
Loading
Loading
@@ -349,7 +357,9 @@ describe Projects::SnippetsController do
end
 
context 'when signed in' do
before { sign_in(user) }
before do
sign_in(user)
end
 
it 'responds with status 404' do
get action, namespace_id: project.namespace, project_id: project, id: 42
Loading
Loading
Loading
Loading
@@ -6,7 +6,9 @@ describe Projects::TagsController do
let!(:invalid_release) { create(:release, project: project, tag: 'does-not-exist') }
 
describe 'GET index' do
before { get :index, namespace_id: project.namespace.to_param, project_id: project }
before do
get :index, namespace_id: project.namespace.to_param, project_id: project
end
 
it 'returns the tags for the page' do
expect(assigns(:tags).map(&:name)).to eq(['v1.1.0', 'v1.0.0'])
Loading
Loading
@@ -19,7 +21,9 @@ describe Projects::TagsController do
end
 
describe 'GET show' do
before { get :show, namespace_id: project.namespace.to_param, project_id: project, id: id }
before do
get :show, namespace_id: project.namespace.to_param, project_id: project, id: id
end
 
context "valid tag" do
let(:id) { 'v1.0.0' }
Loading
Loading
Loading
Loading
@@ -29,7 +29,9 @@ describe ProjectsController do
 
describe "GET show" do
context "user not project member" do
before { sign_in(user) }
before do
sign_in(user)
end
 
context "user does not have access to project" do
let(:private_project) { create(:empty_project, :private) }
Loading
Loading
@@ -108,7 +110,9 @@ describe ProjectsController do
context "project with empty repo" do
let(:empty_project) { create(:project_empty_repo, :public) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
User.project_views.keys.each do |project_view|
context "with #{project_view} view set" do
Loading
Loading
@@ -128,7 +132,9 @@ describe ProjectsController do
context "project with broken repo" do
let(:empty_project) { create(:project_broken_repo, :public) }
 
before { sign_in(user) }
before do
sign_in(user)
end
 
User.project_views.keys.each do |project_view|
context "with #{project_view} view set" do
Loading
Loading
Loading
Loading
@@ -18,7 +18,9 @@ describe SearchController do
 
context 'on restricted projects' do
context 'when signed out' do
before { sign_out(user) }
before do
sign_out(user)
end
 
it "doesn't expose comments on issues" do
project = create(:empty_project, :public, :issues_private)
Loading
Loading
Loading
Loading
@@ -14,7 +14,9 @@ describe SentNotificationsController, type: :controller do
describe 'GET unsubscribe' do
context 'when the user is not logged in' do
context 'when the force param is passed' do
before { get(:unsubscribe, id: sent_notification.reply_key, force: true) }
before do
get(:unsubscribe, id: sent_notification.reply_key, force: true)
end
 
it 'unsubscribes the user' do
expect(issue.subscribed?(user, project)).to be_falsey
Loading
Loading
@@ -30,7 +32,9 @@ describe SentNotificationsController, type: :controller do
end
 
context 'when the force param is not passed' do
before { get(:unsubscribe, id: sent_notification.reply_key) }
before do
get(:unsubscribe, id: sent_notification.reply_key)
end
 
it 'does not unsubscribe the user' do
expect(issue.subscribed?(user, project)).to be_truthy
Loading
Loading
@@ -47,10 +51,14 @@ describe SentNotificationsController, type: :controller do
end
 
context 'when the user is logged in' do
before { sign_in(user) }
before do
sign_in(user)
end
 
context 'when the ID passed does not exist' do
before { get(:unsubscribe, id: sent_notification.reply_key.reverse) }
before do
get(:unsubscribe, id: sent_notification.reply_key.reverse)
end
 
it 'does not unsubscribe the user' do
expect(issue.subscribed?(user, project)).to be_truthy
Loading
Loading
@@ -66,7 +74,9 @@ describe SentNotificationsController, type: :controller do
end
 
context 'when the force param is passed' do
before { get(:unsubscribe, id: sent_notification.reply_key, force: true) }
before do
get(:unsubscribe, id: sent_notification.reply_key, force: true)
end
 
it 'unsubscribes the user' do
expect(issue.subscribed?(user, project)).to be_falsey
Loading
Loading
@@ -89,7 +99,10 @@ describe SentNotificationsController, type: :controller do
end
end
let(:sent_notification) { create(:sent_notification, project: project, noteable: merge_request, recipient: user) }
before { get(:unsubscribe, id: sent_notification.reply_key) }
before do
get(:unsubscribe, id: sent_notification.reply_key)
end
 
it 'unsubscribes the user' do
expect(merge_request.subscribed?(user, project)).to be_falsey
Loading
Loading
Loading
Loading
@@ -142,7 +142,9 @@ describe SessionsController do
end
 
context 'when OTP is invalid' do
before { authenticate_2fa(otp_attempt: 'invalid') }
before do
authenticate_2fa(otp_attempt: 'invalid')
end
 
it 'does not authenticate' do
expect(subject.current_user).not_to eq user
Loading
Loading
@@ -169,7 +171,9 @@ describe SessionsController do
end
 
context 'when OTP is invalid' do
before { authenticate_2fa(otp_attempt: 'invalid') }
before do
authenticate_2fa(otp_attempt: 'invalid')
end
 
it 'does not authenticate' do
expect(subject.current_user).not_to eq user
Loading
Loading
Loading
Loading
@@ -437,7 +437,9 @@ describe SnippetsController do
end
 
context 'when signed in user is the author' do
before { get :raw, id: personal_snippet.to_param }
before do
get :raw, id: personal_snippet.to_param
end
 
it 'responds with status 200' do
expect(assigns(:snippet)).to eq(personal_snippet)
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment