Commit bfb46c29 authored by Timothy Andrew's avatar Timothy Andrew

Implement last round of review comments from !4892.

1. Fix typos, minor styling errors.

2. Use single quotes rather than double quotes in `user_access_spec`.

3. Test formatting.
parent bc85d07d
......@@ -8,7 +8,7 @@
.table-responsive
%table.table.protected-branches-list
%colgroup
%col{ width: "27%" }
%col{ width: "20%" }
%col{ width: "30%" }
%col{ width: "25%" }
%col{ width: "25%" }
......@@ -19,7 +19,7 @@
%th Protected Branch
%th Commit
%th Developers Can Push
%th Developers can Merge
%th Developers Can Merge
- if can_admin_project
%th
%tbody
......
......@@ -7,40 +7,38 @@ describe Gitlab::UserAccess, lib: true do
describe 'can_push_to_branch?' do
describe 'push to none protected branch' do
it "returns true if user is a master" do
it 'returns true if user is a master' do
project.team << [user, :master]
expect(access.can_push_to_branch?("random_branch")).to be_truthy
expect(access.can_push_to_branch?('random_branch')).to be_truthy
end
it "returns true if user is a developer" do
it 'returns true if user is a developer' do
project.team << [user, :developer]
expect(access.can_push_to_branch?("random_branch")).to be_truthy
expect(access.can_push_to_branch?('random_branch')).to be_truthy
end
it "returns false if user is a reporter" do
it 'returns false if user is a reporter' do
project.team << [user, :reporter]
expect(access.can_push_to_branch?("random_branch")).to be_falsey
expect(access.can_push_to_branch?('random_branch')).to be_falsey
end
end
describe 'push to protected branch' do
before do
@branch = create :protected_branch, project: project
end
let(:branch) { create :protected_branch, project: project }
it "returns true if user is a master" do
it 'returns true if user is a master' do
project.team << [user, :master]
expect(access.can_push_to_branch?(@branch.name)).to be_truthy
expect(access.can_push_to_branch?(branch.name)).to be_truthy
end
it "returns false if user is a developer" do
it 'returns false if user is a developer' do
project.team << [user, :developer]
expect(access.can_push_to_branch?(@branch.name)).to be_falsey
expect(access.can_push_to_branch?(branch.name)).to be_falsey
end
it "returns false if user is a reporter" do
it 'returns false if user is a reporter' do
project.team << [user, :reporter]
expect(access.can_push_to_branch?(@branch.name)).to be_falsey
expect(access.can_push_to_branch?(branch.name)).to be_falsey
end
end
......@@ -49,17 +47,17 @@ describe Gitlab::UserAccess, lib: true do
@branch = create :protected_branch, project: project, developers_can_push: true
end
it "returns true if user is a master" do
it 'returns true if user is a master' do
project.team << [user, :master]
expect(access.can_push_to_branch?(@branch.name)).to be_truthy
end
it "returns true if user is a developer" do
it 'returns true if user is a developer' do
project.team << [user, :developer]
expect(access.can_push_to_branch?(@branch.name)).to be_truthy
end
it "returns false if user is a reporter" do
it 'returns false if user is a reporter' do
project.team << [user, :reporter]
expect(access.can_push_to_branch?(@branch.name)).to be_falsey
end
......@@ -70,17 +68,17 @@ describe Gitlab::UserAccess, lib: true do
@branch = create :protected_branch, project: project, developers_can_merge: true
end
it "returns true if user is a master" do
it 'returns true if user is a master' do
project.team << [user, :master]
expect(access.can_merge_to_branch?(@branch.name)).to be_truthy
end
it "returns true if user is a developer" do
it 'returns true if user is a developer' do
project.team << [user, :developer]
expect(access.can_merge_to_branch?(@branch.name)).to be_truthy
end
it "returns false if user is a reporter" do
it 'returns false if user is a reporter' do
project.team << [user, :reporter]
expect(access.can_merge_to_branch?(@branch.name)).to be_falsey
end
......
......@@ -259,7 +259,8 @@ describe GitPushService, services: true do
expect(project).to receive(:execute_hooks)
expect(project.default_branch).to eq("master")
expect(project.protected_branches).to receive(:create).with({ name: "master", developers_can_push: true, developers_can_merge: false })
execute_service(project, user, @blankrev, 'newrev', 'refs/heads/master' )
execute_service(project, user, @blankrev, 'newrev', 'refs/heads/master')
end
it "when pushing a branch for the first time with default branch protection set to 'developers can merge'" do
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment