BigW Consortium Gitlab

Commit ab0cfc00 by Dmitriy Zaporozhets

fixing tests after refactoring

parent 2a1fac9e
......@@ -7,7 +7,7 @@ describe Gitlab::ProjectMover do
FileUtils.rm_rf base_path if File.exists? base_path
FileUtils.mkdir_p base_path
Gitlab.config.gitolite.stub(repos_path: base_path)
Gitlab.config.gitlab_shell.stub(repos_path: base_path)
@project = create(:project)
end
......
......@@ -2,7 +2,7 @@ require 'spec_helper'
describe Gitlab::Shell do
let(:project) { double('Project', id: 7, path: 'diaspora') }
let(:gitolite) { Gitlab::Shell.new }
let(:gitlab_shell) { Gitlab::Shell.new }
before do
Project.stub(find: project)
......@@ -13,5 +13,5 @@ describe Gitlab::Shell do
it { should respond_to :add_repository }
it { should respond_to :remove_repository }
it { gitolite.url_to_repo('diaspora').should == Gitlab.config.gitolite.ssh_path_prefix + "diaspora.git" }
it { gitlab_shell.url_to_repo('diaspora').should == Gitlab.config.gitlab_shell.ssh_path_prefix + "diaspora.git" }
end
......@@ -66,11 +66,6 @@ describe Project do
project.should_not be_valid
project.errors[:base].first.should match(/Your own projects limit is 1/)
end
it "should not allow 'gitolite-admin' as repo name" do
should allow_value("blah").for(:path)
should_not allow_value("gitolite-admin").for(:path)
end
end
describe "Respond to" do
......@@ -91,7 +86,7 @@ describe Project do
it "should return valid url to repo" do
project = Project.new(path: "somewhere")
project.url_to_repo.should == Gitlab.config.gitolite.ssh_path_prefix + "somewhere.git"
project.url_to_repo.should == Gitlab.config.gitlab_shell.ssh_path_prefix + "somewhere.git"
end
it "returns the full web URL for this repo" do
......
......@@ -14,14 +14,14 @@ describe KeyObserver do
context :after_save do
it do
GitoliteWorker.should_receive(:perform_async).with(:add_key, @key.shell_id, @key.key)
GitlabShellWorker.should_receive(:perform_async).with(:add_key, @key.shell_id, @key.key)
@observer.after_save(@key)
end
end
context :after_destroy do
it do
GitoliteWorker.should_receive(:perform_async).with(:remove_key, @key.shell_id, @key.key)
GitlabShellWorker.should_receive(:perform_async).with(:remove_key, @key.shell_id, @key.key)
@observer.after_destroy(@key)
end
end
......
......@@ -39,6 +39,6 @@ describe PostReceive do
end
def pwd(project)
File.join(Gitlab.config.gitolite.repos_path, project.path_with_namespace)
File.join(Gitlab.config.gitlab_shell.repos_path, project.path_with_namespace)
end
end
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment