Commit c647540c authored by Timothy Andrew's avatar Timothy Andrew

Fix all specs related to changes in !5081.

1. Remove `Project#developers_can_push_to_protected_branch?` since it
   isn't used anymore.

2. Remove `Project#developers_can_merge_to_protected_branch?` since it
   isn't used anymore.
parent a9958ddc
...@@ -874,14 +874,6 @@ class Project < ActiveRecord::Base ...@@ -874,14 +874,6 @@ class Project < ActiveRecord::Base
ProtectedBranch.matching(branch_name, protected_branches: @protected_branches).present? ProtectedBranch.matching(branch_name, protected_branches: @protected_branches).present?
end end
def developers_can_push_to_protected_branch?(branch_name)
protected_branches.matching(branch_name).any?(&:developers_can_push)
end
def developers_can_merge_to_protected_branch?(branch_name)
protected_branches.matching(branch_name).any?(&:developers_can_merge)
end
def forked? def forked?
!(forked_project_link.nil? || forked_project_link.forked_from_project.nil?) !(forked_project_link.nil? || forked_project_link.forked_from_project.nil?)
end end
......
...@@ -8,7 +8,7 @@ class ProtectedBranch::MergeAccessLevel < ActiveRecord::Base ...@@ -8,7 +8,7 @@ class ProtectedBranch::MergeAccessLevel < ActiveRecord::Base
if masters? if masters?
user.can?(:push_code, project) if project.team.master?(user) user.can?(:push_code, project) if project.team.master?(user)
elsif developers? elsif developers?
user.can?(:push_code, project) if (project.team.master?(user) || project.team.developer?(user)) user.can?(:push_code, project) if project.team.master?(user) || project.team.developer?(user)
end end
end end
end end
...@@ -8,7 +8,7 @@ class ProtectedBranch::PushAccessLevel < ActiveRecord::Base ...@@ -8,7 +8,7 @@ class ProtectedBranch::PushAccessLevel < ActiveRecord::Base
if masters? if masters?
user.can?(:push_code, project) if project.team.master?(user) user.can?(:push_code, project) if project.team.master?(user)
elsif developers? elsif developers?
user.can?(:push_code, project) if (project.team.master?(user) || project.team.developer?(user)) user.can?(:push_code, project) if project.team.master?(user) || project.team.developer?(user)
elsif no_one? elsif no_one?
false false
end end
......
...@@ -25,7 +25,7 @@ class Spinach::Features::ProjectCommitsBranches < Spinach::FeatureSteps ...@@ -25,7 +25,7 @@ class Spinach::Features::ProjectCommitsBranches < Spinach::FeatureSteps
step 'project "Shop" has protected branches' do step 'project "Shop" has protected branches' do
project = Project.find_by(name: "Shop") project = Project.find_by(name: "Shop")
project.protected_branches.create(name: "stable") create(:protected_branch, project: project, name: "stable")
end end
step 'I click new branch link' do step 'I click new branch link' do
......
...@@ -230,7 +230,7 @@ describe Gitlab::GitAccess, lib: true do ...@@ -230,7 +230,7 @@ describe Gitlab::GitAccess, lib: true do
context "when the merge request is in progress" do context "when the merge request is in progress" do
before do before do
create(:merge_request, source_project: project, source_branch: unprotected_branch, target_branch: 'feature', create(:merge_request, source_project: project, source_branch: unprotected_branch, target_branch: 'feature',
state: 'locked', in_progress_merge_commit_sha: merge_into_protected_branch) state: 'locked', in_progress_merge_commit_sha: merge_into_protected_branch)
end end
context "when the merge request is not in progress" do context "when the merge request is not in progress" do
......
...@@ -1095,46 +1095,6 @@ describe Project, models: true do ...@@ -1095,46 +1095,6 @@ describe Project, models: true do
end end
end end
describe "#developers_can_push_to_protected_branch?" do
let(:project) { create(:empty_project) }
context "when the branch matches a protected branch via direct match" do
it "returns true if 'Developers can Push' is turned on" do
create(:protected_branch, name: "production", project: project, developers_can_push: true)
expect(project.developers_can_push_to_protected_branch?('production')).to be true
end
it "returns false if 'Developers can Push' is turned off" do
create(:protected_branch, name: "production", project: project, developers_can_push: false)
expect(project.developers_can_push_to_protected_branch?('production')).to be false
end
end
context "when the branch matches a protected branch via wilcard match" do
it "returns true if 'Developers can Push' is turned on" do
create(:protected_branch, name: "production/*", project: project, developers_can_push: true)
expect(project.developers_can_push_to_protected_branch?('production/some-branch')).to be true
end
it "returns false if 'Developers can Push' is turned off" do
create(:protected_branch, name: "production/*", project: project, developers_can_push: false)
expect(project.developers_can_push_to_protected_branch?('production/some-branch')).to be false
end
end
context "when the branch does not match a protected branch" do
it "returns false" do
create(:protected_branch, name: "production/*", project: project, developers_can_push: true)
expect(project.developers_can_push_to_protected_branch?('staging/some-branch')).to be false
end
end
end
describe '#container_registry_path_with_namespace' do describe '#container_registry_path_with_namespace' do
let(:project) { create(:empty_project, path: 'PROJECT') } let(:project) { create(:empty_project, path: 'PROJECT') }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment