Commit 13ad9a74 authored by Robert Speicher's avatar Robert Speicher

Speed up Project security access specs

Prior, every single test was creating four `ProjectMember` objects, each
of which created one `User` record, even though each test only used
_one_ of those Users, if any.

Now each test only creates the single user record it needs, if it needs
one. This shaves minutes off of each spec file changed here.
parent eff24047
...@@ -7,7 +7,7 @@ module AccessMatchers ...@@ -7,7 +7,7 @@ module AccessMatchers
extend RSpec::Matchers::DSL extend RSpec::Matchers::DSL
include Warden::Test::Helpers include Warden::Test::Helpers
def emulate_user(user) def emulate_user(user, project = nil)
case user case user
when :user when :user
login_as(create(:user)) login_as(create(:user))
...@@ -18,6 +18,18 @@ module AccessMatchers ...@@ -18,6 +18,18 @@ module AccessMatchers
when :external when :external
login_as(create(:user, external: true)) login_as(create(:user, external: true))
when User when User
login_as(user)
when :owner
raise ArgumentError, "cannot emulate owner without project" unless project
login_as(project.owner)
when *Gitlab::Access.sym_options.keys
raise ArgumentError, "cannot emulate user #{user} without project" unless project
role = user
user = create(:user)
project.public_send(:"add_#{role}", user)
login_as(user) login_as(user)
else else
raise ArgumentError, "cannot emulate user #{user}" raise ArgumentError, "cannot emulate user #{user}"
...@@ -26,8 +38,7 @@ module AccessMatchers ...@@ -26,8 +38,7 @@ module AccessMatchers
def description_for(user, type) def description_for(user, type)
if user.kind_of?(User) if user.kind_of?(User)
# User#inspect displays too much information for RSpec's description # User#inspect displays too much information for RSpec's descriptions
# messages
"be #{type} for the specified user" "be #{type} for the specified user"
else else
"be #{type} for #{user}" "be #{type} for #{user}"
...@@ -36,21 +47,31 @@ module AccessMatchers ...@@ -36,21 +47,31 @@ module AccessMatchers
matcher :be_allowed_for do |user| matcher :be_allowed_for do |user|
match do |url| match do |url|
emulate_user(user) emulate_user(user, @project)
visit url visit(url)
status_code != 404 && current_path != new_user_session_path status_code != 404 && current_path != new_user_session_path
end end
chain :of do |project|
@project = project
end
description { description_for(user, 'allowed') } description { description_for(user, 'allowed') }
end end
matcher :be_denied_for do |user| matcher :be_denied_for do |user|
match do |url| match do |url|
emulate_user(user) emulate_user(user, @project)
visit url visit(url)
status_code == 404 || current_path == new_user_session_path status_code == 404 || current_path == new_user_session_path
end end
chain :of do |project|
@project = project
end
description { description_for(user, 'denied') } description { description_for(user, 'denied') }
end end
end end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment