OpenProject is the leading open source project management software.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 
openproject/spec/requests/api/v3/work_package_resource_spec.rb

1168 lines
35 KiB

#-- copyright
# OpenProject is a project management system.
# Copyright (C) 2012-2018 the OpenProject Foundation (OPF)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2017 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
#
# See docs/COPYRIGHT.rdoc for more details.
#++
require 'spec_helper'
require 'rack/test'
describe 'API v3 Work package resource',
type: :request,
content_type: :json do
include Rack::Test::Methods
include Capybara::RSpecMatchers
include API::V3::Utilities::PathHelper
let(:closed_status) { FactoryBot.create(:closed_status) }
let(:work_package) do
FactoryBot.create(:work_package, project_id: project.id,
description: 'lorem ipsum'
)
end
let(:project) do
FactoryBot.create(:project, identifier: 'test_project', is_public: false)
end
let(:role) { FactoryBot.create(:role, permissions: permissions) }
let(:permissions) { %i[view_work_packages edit_work_packages] }
let(:current_user) do
user = FactoryBot.create(:user, member_in_project: project, member_through_role: role)
FactoryBot.create(:user_preference, user: user, others: { no_self_notified: false })
user
end
let(:watcher) do
FactoryBot
.create(:user, member_in_project: project, member_through_role: role)
.tap do |user|
work_package.add_watcher(user)
end
end
let(:unauthorize_user) { FactoryBot.create(:user) }
let(:type) { FactoryBot.create(:type) }
before do
login_as(current_user)
end
describe '#get list' do
subject { last_response }
before(:each) do
work_package.save!
get api_v3_paths.work_packages
end
it 'succeeds' do
expect(subject.status).to eql 200
end
it 'returns visible work packages' do
FactoryBot.create(:work_package, project: project)
expect(subject.body).to be_json_eql(1.to_json).at_path('total')
end
it 'embedds the work package schemas' do
FactoryBot.create(:work_package, project: project)
expect(subject.body)
.to be_json_eql(api_v3_paths.work_package_schema(project.id, work_package.type.id).to_json)
.at_path('_embedded/schemas/_embedded/elements/0/_links/self/href')
end
context 'user not seeing any work packages' do
include_context 'with non-member permissions from non_member_permissions'
let(:current_user) { FactoryBot.create(:user) }
let(:non_member_permissions) { [:view_work_packages] }
it 'succeeds' do
expect(subject.status).to eql 200
end
it 'returns no work packages' do
FactoryBot.create(:work_package, project: project)
expect(subject.body).to be_json_eql(0.to_json).at_path('total')
end
context 'because he is not allowed to see work packages in general' do
let(:non_member_permissions) { [] }
it_behaves_like 'unauthorized access'
end
end
end
describe '#get' do
let(:get_path) { api_v3_paths.work_package work_package.id }
context 'when acting as a user with permission to view work package' do
before(:each) do
allow(User).to receive(:current).and_return current_user
get get_path
end
it 'should respond with 200' do
expect(last_response.status).to eq(200)
end
describe 'response body' do
subject(:parsed_response) { JSON.parse(last_response.body) }
let!(:other_wp) do
FactoryBot.create(:work_package, project_id: project.id,
status: closed_status)
end
let(:work_package) do
FactoryBot.create(:work_package, project_id: project.id,
description: description)
end
let(:description) do
<<~DESCRIPTION
<macro class="toc"><macro>
# OpenProject Masterplan for 2015
## three point plan
1) One ###{other_wp.id}
2) Two
3) Three
### random thoughts
### things we like
* Pointed
* Relaxed
* Debonaire
DESCRIPTION
end
it 'should respond with work package in HAL+JSON format' do
expect(parsed_response['id']).to eq(work_package.id)
end
describe "['description']" do
subject { super()['description'] }
it { is_expected.to have_selector('h1') }
end
describe "['description']" do
subject { super()['description'] }
it { is_expected.to have_selector('h2') }
end
it 'should resolve links' do
expect(parsed_response['description']['html'])
.to have_selector("a[href='/work_packages/#{other_wp.id}']")
end
it 'should resolve simple macros' do
expect(parsed_response['description']).to have_text('Table of contents')
end
end
context 'requesting nonexistent work package' do
let(:get_path) { api_v3_paths.work_package 909090 }
it_behaves_like 'not found'
end
end
context 'when acting as an user without permission to view work package' do
before(:each) do
allow(User).to receive(:current).and_return unauthorize_user
get get_path
end
it_behaves_like 'not found'
end
context 'when acting as an anonymous user' do
before(:each) do
allow(User).to receive(:current).and_return User.anonymous
get get_path
end
it_behaves_like 'not found'
end
end
describe '#patch' do
let(:patch_path) { api_v3_paths.work_package work_package.id }
let(:valid_params) do
{
_type: 'WorkPackage',
lockVersion: work_package.lock_version
}
end
subject(:response) { last_response }
shared_context 'patch request' do
before(:each) do
allow(User).to receive(:current).and_return current_user
patch patch_path, params.to_json, 'CONTENT_TYPE' => 'application/json'
end
end
context 'user without needed permissions' do
context 'no permission to see the work package' do
let(:work_package) { FactoryBot.create(:work_package) }
let(:current_user) { FactoryBot.create :user }
let(:params) { valid_params }
include_context 'patch request'
it_behaves_like 'not found'
end
context 'no permission to edit the work package' do
let(:role) { FactoryBot.create(:role, permissions: [:view_work_packages]) }
let(:current_user) do
FactoryBot.create(:user,
member_in_project: work_package.project,
member_through_role: role)
end
let(:params) { valid_params }
include_context 'patch request'
it_behaves_like 'unauthorized access'
end
end
context 'user with needed permissions' do
shared_examples_for 'lock version updated' do
it {
expect(subject.body).to be_json_eql(work_package.reload.lock_version)
.at_path('lockVersion')
}
end
describe 'notification' do
let(:update_params) { valid_params.merge(subject: 'Updated subject') }
before(:each) do
allow(User).to receive(:current).and_return current_user
work_package
ActionMailer::Base.deliveries.clear # throw away mails due to work package creation
end
include_context 'patch request'
subject { ActionMailer::Base.deliveries }
context 'not set' do
let(:params) { update_params }
it { expect(subject.count).to eq(1) }
end
context 'disabled' do
let(:patch_path) { "#{api_v3_paths.work_package work_package.id}?notify=false" }
let(:params) { update_params }
it { expect(subject).to be_empty }
end
context 'enabled' do
let(:patch_path) { "#{api_v3_paths.work_package work_package.id}?notify=Something" }
let(:params) { update_params }
it { expect(subject.count).to eq(1) }
end
end
context 'subject' do
let(:params) { valid_params.merge(subject: 'Updated subject') }
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with updated work package subject' do
expect(subject.body).to be_json_eql('Updated subject'.to_json).at_path('subject')
end
it_behaves_like 'lock version updated'
end
context 'description' do
shared_examples_for 'description updated' do
it_behaves_like 'API V3 formattable', 'description' do
let(:format) { 'markdown' }
subject { response.body }
end
it_behaves_like 'lock version updated'
end
context 'w/o value (empty)' do
let(:raw) { nil }
let(:html) { '' }
let(:params) { valid_params.merge(description: { raw: nil }) }
include_context 'patch request'
it { expect(response.status).to eq(200) }
it_behaves_like 'description updated'
end
context 'with value' do
let(:raw) { '**Some text** *describing* **something**...' }
let(:html) do
'<p><strong>Some text</strong> <em>describing</em> <strong>something</strong>...</p>'
end
let(:params) { valid_params.merge(description: { raw: raw }) }
include_context 'patch request'
it { expect(response.status).to eq(200) }
it_behaves_like 'description updated'
end
end
context 'start date' do
let(:dateString) { Date.today.to_date.iso8601 }
let(:params) { valid_params.merge(startDate: dateString) }
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with updated start date' do
expect(subject.body).to be_json_eql(dateString.to_json).at_path('startDate')
end
it_behaves_like 'lock version updated'
end
context 'finish date' do
let(:dateString) { Date.today.to_date.iso8601 }
let(:params) { valid_params.merge(dueDate: dateString) }
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with updated finish date' do
expect(subject.body).to be_json_eql(dateString.to_json).at_path('dueDate')
end
it_behaves_like 'lock version updated'
end
context 'status' do
let(:target_status) { FactoryBot.create(:status) }
let(:status_link) { api_v3_paths.status target_status.id }
let(:status_parameter) { { _links: { status: { href: status_link } } } }
let(:params) { valid_params.merge(status_parameter) }
before { allow(User).to receive(:current).and_return current_user }
context 'valid status' do
let!(:workflow) do
FactoryBot.create(:workflow,
type_id: work_package.type.id,
old_status: work_package.status,
new_status: target_status,
role: current_user.memberships[0].roles[0])
end
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with updated work package status' do
expect(subject.body).to be_json_eql(target_status.name.to_json)
.at_path('_embedded/status/name')
end
it_behaves_like 'lock version updated'
end
context 'invalid status' do
include_context 'patch request'
it_behaves_like 'constraint violation' do
let(:message) do
'Status ' + I18n.t('activerecord.errors.models.' \
'work_package.attributes.status_id.status_transition_invalid')
end
end
end
context 'wrong resource' do
let(:status_link) { api_v3_paths.user current_user.id }
include_context 'patch request'
it_behaves_like 'invalid resource link' do
let(:message) do
I18n.t('api_v3.errors.invalid_resource',
property: 'status',
expected: '/api/v3/statuses/:id',
actual: status_link)
end
end
end
end
context 'type' do
let(:target_type) { FactoryBot.create(:type) }
let(:type_link) { api_v3_paths.type target_type.id }
let(:type_parameter) { { _links: { type: { href: type_link } } } }
let(:params) { valid_params.merge(type_parameter) }
before { allow(User).to receive(:current).and_return current_user }
context 'valid type' do
before do
project.types << target_type
end
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with updated work package type' do
expect(subject.body).to be_json_eql(target_type.name.to_json)
.at_path('_embedded/type/name')
end
it_behaves_like 'lock version updated'
end
context 'valid type changing custom fields' do
let(:custom_field) { FactoryBot.create(:work_package_custom_field) }
let(:custom_field_parameter) { { :"customField#{custom_field.id}" => true } }
let(:params) { valid_params.merge(type_parameter).merge(custom_field_parameter) }
before do
project.types << target_type
project.work_package_custom_fields << custom_field
target_type.custom_fields << custom_field
end
include_context 'patch request'
it 'responds with the new custom field having the desired value' do
expect(subject.body)
.to be_json_eql(true.to_json)
.at_path("customField#{custom_field.id}")
end
end
context 'invalid type' do
include_context 'patch request'
it_behaves_like 'constraint violation' do
let(:message) { "Type #{I18n.t('activerecord.errors.messages.inclusion')}" }
end
end
context 'wrong resource' do
let(:type_link) { api_v3_paths.user current_user.id }
include_context 'patch request'
it_behaves_like 'invalid resource link' do
let(:message) do
I18n.t('api_v3.errors.invalid_resource',
property: 'type',
expected: '/api/v3/types/:id',
actual: type_link)
end
end
end
end
context 'project' do
let(:target_project) do
FactoryBot.create(:project, is_public: false)
end
let(:project_link) { api_v3_paths.project target_project.id }
let(:project_parameter) { { _links: { project: { href: project_link } } } }
let(:params) { valid_params.merge(project_parameter) }
before do
FactoryBot.create :member,
user: current_user,
project: target_project,
roles: [FactoryBot.create(:role, permissions: [:move_work_packages])]
allow(User).to receive(:current).and_return current_user
end
context 'is changed' do
include_context 'patch request'
it 'is successful' do
expect(response.status).to eq(200)
end
it_behaves_like 'lock version updated'
it 'responds with the project changed' do
href = {
href: project_link,
title: target_project.name
}
expect(response.body).to be_json_eql(href.to_json).at_path('_links/project')
end
end
context 'with a custom field defined on the target project' do
let(:custom_field) { FactoryBot.create(:work_package_custom_field) }
let(:custom_field_parameter) { { :"customField#{custom_field.id}" => true } }
let(:params) { valid_params.merge(project_parameter).merge(custom_field_parameter) }
before do
target_project.work_package_custom_fields << custom_field
work_package.type.custom_fields << custom_field
end
include_context 'patch request'
it 'responds with the new custom field having the desired value' do
expect(subject.body)
.to be_json_eql(true.to_json)
.at_path("customField#{custom_field.id}")
end
end
end
context 'assignee and responsible' do
let(:user) { FactoryBot.create(:user, member_in_project: project) }
let(:params) { valid_params.merge(user_parameter) }
let(:work_package) do
FactoryBot.create(:work_package,
project: project,
assigned_to: current_user,
responsible: current_user)
end
before { allow(User).to receive(:current).and_return current_user }
shared_context 'setup group membership' do |group_assignment|
let(:group) { FactoryBot.create(:group) }
let(:group_role) { FactoryBot.create(:role) }
let(:group_member) do
FactoryBot.create(:member,
principal: group,
project: project,
roles: [group_role])
end
before do
allow(Setting).to receive(:work_package_group_assignment?).and_return(group_assignment)
group_member
end
end
shared_examples_for 'handling people' do |property|
let(:user_parameter) { { _links: { property => { href: user_href } } } }
let(:href_path) { "_links/#{property}/href" }
describe 'nil' do
let(:user_href) { nil }
include_context 'patch request'
it { expect(response.status).to eq(200) }
it { expect(response.body).to be_json_eql(nil.to_json).at_path(href_path) }
it_behaves_like 'lock version updated'
end
describe 'valid' do
shared_examples_for 'valid user assignment' do
let(:title) { "#{assigned_user.name}".to_json }
it { expect(response.status).to eq(200) }
it {
expect(response.body).to be_json_eql(title)
.at_path("_links/#{property}/title")
}
it_behaves_like 'lock version updated'
end
context 'user' do
let(:user_href) { api_v3_paths.user user.id }
include_context 'patch request'
it_behaves_like 'valid user assignment' do
let(:assigned_user) { user }
end
end
context 'group' do
let(:user_href) { api_v3_paths.user group.id }
include_context 'setup group membership', true
include_context 'patch request'
it_behaves_like 'valid user assignment' do
let(:assigned_user) { group }
end
end
end
describe 'invalid' do
include_context 'patch request'
context 'user doesn\'t exist' do
let(:user_href) { api_v3_paths.user 909090 }
it_behaves_like 'constraint violation' do
let(:message) do
I18n.t('api_v3.errors.validation.' \
'invalid_user_assigned_to_work_package',
property: WorkPackage.human_attribute_name(property))
end
end
end
context 'user is not visible' do
let(:invalid_user) { FactoryBot.create(:user) }
let(:user_href) { api_v3_paths.user invalid_user.id }
it_behaves_like 'constraint violation' do
let(:message) do
I18n.t('api_v3.errors.validation.invalid_user_assigned_to_work_package',
property: WorkPackage.human_attribute_name(property))
end
end
end
context 'wrong resource' do
let(:user_href) { api_v3_paths.status work_package.status.id }
include_context 'patch request'
it_behaves_like 'invalid resource link' do
let(:message) do
I18n.t('api_v3.errors.invalid_resource',
property: property,
expected: "/api/v3/groups/:id' or '/api/v3/users/:id",
actual: user_href)
end
end
end
context 'group assignment disabled' do
let(:user_href) { api_v3_paths.user group.id }
include_context 'setup group membership', false
include_context 'patch request'
it_behaves_like 'constraint violation' do
let(:message) do
I18n.t('api_v3.errors.validation.invalid_user_assigned_to_work_package',
property: WorkPackage.human_attribute_name(property))
end
end
end
end
end
context 'assingee' do
it_behaves_like 'handling people', 'assignee'
end
context 'responsible' do
it_behaves_like 'handling people', 'responsible'
end
end
context 'version' do
let(:target_version) { FactoryBot.create(:version, project: project) }
let(:version_link) { api_v3_paths.version target_version.id }
let(:version_parameter) { { _links: { version: { href: version_link } } } }
let(:params) { valid_params.merge(version_parameter) }
before { allow(User).to receive(:current).and_return current_user }
context 'valid' do
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with the work package assigned to the version' do
expect(subject.body).to be_json_eql(target_version.name.to_json)
.at_path('_embedded/version/name')
end
it_behaves_like 'lock version updated'
end
end
context 'category' do
let(:target_category) { FactoryBot.create(:category, project: project) }
let(:category_link) { api_v3_paths.category target_category.id }
let(:category_parameter) { { _links: { category: { href: category_link } } } }
let(:params) { valid_params.merge(category_parameter) }
before { allow(User).to receive(:current).and_return current_user }
context 'valid' do
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with the work package assigned to the category' do
expect(subject.body).to be_json_eql(target_category.name.to_json)
.at_path('_embedded/category/name')
end
it_behaves_like 'lock version updated'
end
end
context 'priority' do
let(:target_priority) { FactoryBot.create(:priority) }
let(:priority_link) { api_v3_paths.priority target_priority.id }
let(:priority_parameter) { { _links: { priority: { href: priority_link } } } }
let(:params) { valid_params.merge(priority_parameter) }
before { allow(User).to receive(:current).and_return current_user }
context 'valid' do
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with the work package assigned to the priority' do
expect(subject.body).to be_json_eql(target_priority.name.to_json)
.at_path('_embedded/priority/name')
end
it_behaves_like 'lock version updated'
end
end
context 'list custom field' do
let(:custom_field) do
FactoryBot.create(:list_wp_custom_field)
end
let(:target_value) { custom_field.possible_values.last }
let(:value_link) do
api_v3_paths.custom_option target_value.id
end
let(:value_parameter) do
{ _links: { custom_field.accessor_name.camelize(:lower) => { href: value_link } } }
end
let(:params) { valid_params.merge(value_parameter) }
before do
allow(User).to receive(:current).and_return current_user
work_package.project.work_package_custom_fields << custom_field
work_package.type.custom_fields << custom_field
end
context 'valid' do
include_context 'patch request'
it { expect(response.status).to eq(200) }
it 'should respond with the work package assigned to the new value' do
expect(subject.body).to be_json_eql(value_link.to_json)
.at_path("_links/#{custom_field.accessor_name.camelize(:lower)}/href")
end
it_behaves_like 'lock version updated'
end
end
describe 'update with read-only attributes' do
describe 'single read-only violation' do
context 'created and updated' do
let(:tomorrow) { (DateTime.now + 1.day).utc.iso8601 }
include_context 'patch request'
context 'created_at' do
let(:params) { valid_params.merge(createdAt: tomorrow) }
it_behaves_like 'read-only violation', 'createdAt'
end
context 'updated_at' do
let(:params) { valid_params.merge(updatedAt: tomorrow) }
it_behaves_like 'read-only violation', 'updatedAt'
end
end
end
context 'multiple read-only attributes' do
let(:params) do
valid_params.merge(createdAt: Date.today.iso8601, updatedAt: Date.today.iso8601)
end
include_context 'patch request'
it_behaves_like 'multiple errors', 422
it_behaves_like 'multiple errors of the same type', 2, 'PropertyIsReadOnly'
it_behaves_like 'multiple errors of the same type with details',
'attribute',
'attribute' => ['createdAt', 'updatedAt']
end
end
context 'invalid update' do
context 'single invalid attribute' do
let(:params) { valid_params.tap { |h| h[:subject] = '' } }
include_context 'patch request'
it_behaves_like 'constraint violation' do
let(:message) { "Subject can't be blank" }
end
end
context 'multiple invalid attributes' do
let(:params) do
valid_params
.tap { |h| h[:subject] = '' }
.merge(
_links: {
parent: {
href: api_v3_paths.work_package("-123")
}
}
)
end
before do
role.add_permission!(:manage_subtasks)
end
include_context 'patch request'
it_behaves_like 'multiple errors', 422
it_behaves_like 'multiple errors of the same type', 2, 'PropertyConstraintViolation'
it_behaves_like 'multiple errors of the same type with messages' do
let(:message) { ['Subject can\'t be blank.', 'Parent does not exist.'] }
end
end
context 'missing lock version' do
let(:params) { valid_params.except(:lockVersion) }
include_context 'patch request'
it_behaves_like 'update conflict'
end
context 'stale object' do
let(:params) { valid_params.merge(subject: 'Updated subject') }
before do
params
work_package.subject = 'I am the first!'
work_package.save!
expect(valid_params[:lockVersion]).not_to eq(work_package.lock_version)
end
include_context 'patch request'
it_behaves_like 'update conflict'
end
end
context 'claiming attachments' do
let(:old_attachment) { FactoryBot.create(:attachment, container: work_package) }
let(:attachment) { FactoryBot.create(:attachment, container: nil, author: current_user) }
let(:params) do
{
lockVersion: work_package.lock_version,
_links: {
attachments: [
href: api_v3_paths.attachment(attachment.id)
]
}
}
end
before do
old_attachment
end
include_context 'patch request'
it 'replaces the current with the provided attachments' do
work_package.reload
expect(work_package.attachments)
.to match_array(attachment)
end
end
end
end
describe '#delete' do
let(:path) { api_v3_paths.work_package work_package.id }
before do
delete path
end
subject { last_response }
context 'with required permissions' do
let(:permissions) { %i[view_work_packages delete_work_packages] }
it 'responds with HTTP No Content' do
expect(subject.status).to eq 204
end
it 'deletes the work package' do
expect(WorkPackage.exists?(work_package.id)).to be_falsey
end
context 'for a non-existent work package' do
let(:path) { api_v3_paths.work_package 1337 }
it_behaves_like 'not found' do
let(:id) { 1337 }
let(:type) { 'WorkPackage' }
end
end
end
context 'without permission to see work packages' do
let(:permissions) { [] }
it_behaves_like 'not found'
end
context 'without permission to delete work packages' do
let(:permissions) { [:view_work_packages] }
it_behaves_like 'unauthorized access'
it 'does not delete the work package' do
expect(WorkPackage.exists?(work_package.id)).to be_truthy
end
end
end
describe '#post' do
let(:path) { api_v3_paths.work_packages }
let(:permissions) { %i[add_work_packages view_project] }
let(:status) { FactoryBot.build(:status, is_default: true) }
let(:priority) { FactoryBot.build(:priority, is_default: true) }
let(:type) { project.types.first }
let(:parameters) do
{
subject: 'new work packages',
_links: {
type: {
href: api_v3_paths.type(type.id)
},
project: {
href: api_v3_paths.project(project.id)
}
}
}
end
before do
status.save!
priority.save!
FactoryBot.create(:user_preference, user: current_user, others: { no_self_notified: false })
post path, parameters.to_json, 'CONTENT_TYPE' => 'application/json'
end
context 'notifications' do
let(:permissions) { %i[add_work_packages view_project view_work_packages] }
it 'sends a mail by default' do
expect(ActionMailer::Base.deliveries.count).to eq(1)
end
context 'without notifications' do
let(:path) { "#{api_v3_paths.work_packages}?notify=false" }
it 'should not send a mail' do
expect(ActionMailer::Base.deliveries.count).to eq(0)
end
end
context 'with notifications' do
let(:path) { "#{api_v3_paths.work_packages}?notify=true" }
it 'should send a mail' do
expect(ActionMailer::Base.deliveries.count).to eq(1)
end
end
end
it 'should return Created(201)' do
expect(last_response.status).to eq(201)
end
it 'should create a work package' do
expect(WorkPackage.all.count).to eq(1)
end
it 'should use the given parameters' do
expect(WorkPackage.first.subject).to eq(parameters[:subject])
end
it 'should be associated with the provided project' do
expect(WorkPackage.first.project).to eq(project)
end
it 'should be associated with the provided type' do
expect(WorkPackage.first.type).to eq(type)
end
context 'no permissions' do
let(:current_user) { FactoryBot.create(:user) }
it 'should hide the endpoint' do
expect(last_response.status).to eq(403)
end
end
context 'view_project permission' do
# Note that this just removes the add_work_packages permission
# view_project is actually provided by being a member of the project
let(:permissions) { [:view_project] }
it 'should point out the missing permission' do
expect(last_response.status).to eq(403)
end
end
context 'empty parameters' do
let(:parameters) { {} }
it_behaves_like 'multiple errors', 422
it 'should not create a work package' do
expect(WorkPackage.all.count).to eq(0)
end
end
context 'bogus parameters' do
let(:parameters) do
{
bogus: 'bogus',
_links: {
type: {
href: api_v3_paths.type(project.types.first.id)
},
project: {
href: api_v3_paths.project(project.id)
}
}
}
end
it_behaves_like 'constraint violation' do
let(:message) { "Subject can't be blank" }
end
it 'should not create a work package' do
expect(WorkPackage.all.count).to eq(0)
end
end
context 'invalid value' do
let(:parameters) do
{
subject: nil,
_links: {
type: {
href: api_v3_paths.type(project.types.first.id)
},
project: {
href: api_v3_paths.project(project.id)
}
}
}
end
it_behaves_like 'constraint violation' do
let(:message) { "Subject can't be blank" }
end
it 'should not create a work package' do
expect(WorkPackage.all.count).to eq(0)
end
end
context 'claiming attachments' do
let(:attachment) { FactoryBot.create(:attachment, container: nil, author: current_user) }
let(:parameters) do
{
subject: 'subject',
_links: {
type: {
href: api_v3_paths.type(project.types.first.id)
},
project: {
href: api_v3_paths.project(project.id)
},
attachments: [
href: api_v3_paths.attachment(attachment.id)
]
}
}
end
it 'creates the work package and assigns the attachments' do
expect(WorkPackage.all.count).to eq(1)
work_package = WorkPackage.last
expect(work_package.attachments)
.to match_array(attachment)
end
end
end
end