Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
52aa21b1
Commit
52aa21b1
authored
Jun 22, 2015
by
Stan Hu
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix Style/IndentationWidth cop violations
parent
3446bea7
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
8 additions
and
8 deletions
+8
-8
spec/lib/file_size_validator_spec.rb
spec/lib/file_size_validator_spec.rb
+3
-3
spec/lib/gitlab/backend/grack_auth_spec.rb
spec/lib/gitlab/backend/grack_auth_spec.rb
+1
-1
spec/lib/gitlab/markdown/label_reference_filter_spec.rb
spec/lib/gitlab/markdown/label_reference_filter_spec.rb
+1
-1
spec/services/projects/update_service_spec.rb
spec/services/projects/update_service_spec.rb
+3
-3
No files found.
spec/lib/file_size_validator_spec.rb
View file @
52aa21b1
...
...
@@ -9,9 +9,9 @@ describe 'Gitlab::FileSizeValidatorSpec' do
let
(
:options
)
{
{
maximum:
10
,
attributes:
{
attachment:
attachment
}
}
}
it
'attachment exceeds maximum limit'
do
allow
(
attachment
).
to
receive
(
:size
)
{
100
}
validator
.
validate_each
(
note
,
:attachment
,
attachment
)
expect
(
note
.
errors
).
to
have_key
(
:attachment
)
allow
(
attachment
).
to
receive
(
:size
)
{
100
}
validator
.
validate_each
(
note
,
:attachment
,
attachment
)
expect
(
note
.
errors
).
to
have_key
(
:attachment
)
end
it
'attachment under maximum limit'
do
...
...
spec/lib/gitlab/backend/grack_auth_spec.rb
View file @
52aa21b1
...
...
@@ -121,7 +121,7 @@ describe Grack::Auth do
context
"when the user isn't blocked"
do
before
do
expect
(
Rack
::
Attack
::
Allow2Ban
).
to
receive
(
:reset
)
expect
(
Rack
::
Attack
::
Allow2Ban
).
to
receive
(
:reset
)
end
it
"responds with status 200"
do
...
...
spec/lib/gitlab/markdown/label_reference_filter_spec.rb
View file @
52aa21b1
...
...
@@ -127,7 +127,7 @@ module Gitlab::Markdown
it
'gracefully handles non-references matching the pattern'
do
exp
=
act
=
'(format nil "~0f" 3.0) ; 3.0'
expect
(
filter
(
act
).
to_html
).
to
eq
exp
end
end
end
end
end
spec/services/projects/update_service_spec.rb
View file @
52aa21b1
...
...
@@ -11,10 +11,10 @@ describe Projects::UpdateService do
context
'should be private when updated to private'
do
before
do
@created_private
=
@project
.
private?
@created_private
=
@project
.
private?
@opts
.
merge!
(
visibility_level:
Gitlab
::
VisibilityLevel
::
PRIVATE
)
update_project
(
@project
,
@user
,
@opts
)
@opts
.
merge!
(
visibility_level:
Gitlab
::
VisibilityLevel
::
PRIVATE
)
update_project
(
@project
,
@user
,
@opts
)
end
it
{
expect
(
@created_private
).
to
be_truthy
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment