X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/2e437823d2d19edf5c6be392f3604a499308cd6e..4cacfe7a9566d7ea6f53be24daf83cf9e441aebb:/services/api/test/functional/arvados/v1/repositories_controller_test.rb diff --git a/services/api/test/functional/arvados/v1/repositories_controller_test.rb b/services/api/test/functional/arvados/v1/repositories_controller_test.rb index 71b528e72a..56dd57ce7c 100644 --- a/services/api/test/functional/arvados/v1/repositories_controller_test.rb +++ b/services/api/test/functional/arvados/v1/repositories_controller_test.rb @@ -43,9 +43,8 @@ class Arvados::V1::RepositoriesControllerTest < ActionController::TestCase end test "get_all_permissions takes into account is_active flag" do - r = nil act_as_user users(:active) do - r = Repository.create! name: 'active/testrepo' + Repository.create! name: 'active/testrepo' end act_as_system_user do u = users(:active) @@ -170,19 +169,19 @@ class Arvados::V1::RepositoriesControllerTest < ActionController::TestCase u = User.find_by_uuid(user_uuid) if perms['can_read'] assert u.can? read: repo['uuid'] - assert_match /R/, perms['gitolite_permissions'] + assert_match(/R/, perms['gitolite_permissions']) else - refute_match /R/, perms['gitolite_permissions'] + refute_match(/R/, perms['gitolite_permissions']) end if perms['can_write'] assert u.can? write: repo['uuid'] - assert_match /RW\+/, perms['gitolite_permissions'] + assert_match(/RW\+/, perms['gitolite_permissions']) else - refute_match /W/, perms['gitolite_permissions'] + refute_match(/W/, perms['gitolite_permissions']) end if perms['can_manage'] assert u.can? manage: repo['uuid'] - assert_match /RW\+/, perms['gitolite_permissions'] + assert_match(/RW\+/, perms['gitolite_permissions']) end end end