Justin Dalrymple 502d8180a7
Update service typing and peripheral endpoints (#1768)
* Dependency and Configuration updates
* CHANGELOG and README updates
* Added support for camel case and snake case response types in the request helper and base service
* Added support for the Dockerfile Templates API
* Added support for the Issue Note Award Emojis API
* Removed redundant Group Projects service
* Updated types for a variety of services
* Added type updates and removed protect and unprotect endpoints from the Branches API 
* Added type updates and signature endpoint to the Commits API
* Added type updates and edit support to the Deployments API
* Added type updates and a showRepository function to the Container Registry API
* Added type updates and updated the service support to include create, edit, show and remove for the Feature Flags API
* Added type updates and support for the removal of geonodes with the Geo Nodes API
* Renamed UserKeys to UserSSHKeys and added type updates for the User SSH Keys API
* Added type updates for the License Templates API and renamed the export to fix the spelling error
* Added type updates and support for the transfer projects endpoint for the Groups API
* Added type updates and removed removed events endpoint on the Projects API
* Added type updates and modified the create function to require a resource name in the Todos API
2021-05-14 10:07:11 -04:00

65 lines
1.8 KiB
TypeScript

import { PushRules } from '../../../src';
import { RequestHelper } from '../../../src/infrastructure';
jest.mock(
'../../../src/infrastructure/RequestHelper',
() => require('../../__mocks__/RequestHelper').default,
);
let service: PushRules;
beforeEach(() => {
service = new PushRules({
requesterFn: jest.fn(),
token: 'abcdefg',
requestTimeout: 3000,
});
});
// the feature is not available for CE users https://gitlab.com/gitlab-org/gitlab-ee/issues/3825
describe('Instantiating PushRules service', () => {
it('should create a valid service object', async () => {
expect(service).toBeInstanceOf(PushRules);
expect(service.url).toBeDefined();
expect(service.rejectUnauthorized).toBeTruthy();
expect(service.headers).toMatchObject({ 'private-token': 'abcdefg' });
});
});
describe('PushRules.create', () => {
it('should request PUT projects/:id/push_rule', async () => {
await service.create(1, { prop: 1 });
expect(RequestHelper.post()).toHaveBeenCalledWith(service, 'projects/1/push_rule', { prop: 1 });
});
});
describe('PushRules.edit', () => {
it('should request PUT projects/:id/push_rule', async () => {
await service.edit(1, {
memberCheck: true,
});
expect(RequestHelper.put()).toHaveBeenCalledWith(service, 'projects/1/push_rule', {
memberCheck: true,
});
});
});
describe('PushRules.remove', () => {
it('should request DELETE projects/:id/push_rule', async () => {
await service.remove(1);
expect(RequestHelper.del()).toHaveBeenCalledWith(service, 'projects/1/push_rule', undefined);
});
});
describe('PushRules.show', () => {
it('should request GET projects/:id/push_rule', async () => {
await service.show(1);
expect(RequestHelper.get()).toHaveBeenCalledWith(service, 'projects/1/push_rule', undefined);
});
});