|
1 | 1 | import { CR_Type, Organization, Scope_CR_Why_Type, User, WBS_Element_Status } from '@prisma/client'; |
2 | 2 | import { createTestOrganization, createTestUser, resetUsers } from '../test-utils'; |
3 | 3 | import ChangeRequestsService from '../../src/services/change-requests.services'; |
4 | | -import { supermanAdmin } from '../test-data/users.test-data'; |
| 4 | +import { |
| 5 | + supermanAdmin, |
| 6 | + aquamanLeadership, |
| 7 | + greenlanternHead, |
| 8 | + flashAdmin, |
| 9 | + robinMember |
| 10 | +} from '../test-data/users.test-data'; |
5 | 11 | import { ProjectProposedChangesCreateArgs, WorkPackageProposedChangesCreateArgs } from 'shared'; |
6 | 12 | import prisma from '../../src/prisma/prisma'; |
| 13 | +import { AccessDeniedException } from '../../src/utils/errors.utils'; |
7 | 14 |
|
8 | 15 | describe('Change Request Tests', () => { |
9 | 16 | let orgId: string; |
@@ -284,4 +291,192 @@ describe('Change Request Tests', () => { |
284 | 291 | expect(wbsElement?.workPackageNumber).toEqual(14); |
285 | 292 | }); |
286 | 293 | }); |
| 294 | + |
| 295 | + describe('Review Change Request with Requested Reviewers', () => { |
| 296 | + let submitterUser: User; |
| 297 | + let leadershipUser1: User; |
| 298 | + let leadershipUser2: User; |
| 299 | + let nonRequestedLeadership: User; |
| 300 | + let memberUser: User; |
| 301 | + let changeRequestId: string; |
| 302 | + |
| 303 | + beforeEach(async () => { |
| 304 | + submitterUser = await createTestUser(supermanAdmin, orgId); |
| 305 | + leadershipUser1 = await createTestUser(aquamanLeadership, orgId); |
| 306 | + leadershipUser2 = await createTestUser(greenlanternHead, orgId); |
| 307 | + nonRequestedLeadership = await createTestUser(flashAdmin, orgId); |
| 308 | + memberUser = await createTestUser(robinMember, orgId); |
| 309 | + |
| 310 | + const projPropChanges: ProjectProposedChangesCreateArgs = { |
| 311 | + name: 'Test Project', |
| 312 | + descriptionBullets: [], |
| 313 | + links: [], |
| 314 | + budget: 10, |
| 315 | + summary: 'Test Summary', |
| 316 | + teamIds: [], |
| 317 | + workPackageProposedChanges: [] |
| 318 | + }; |
| 319 | + |
| 320 | + const cr = await ChangeRequestsService.createStandardChangeRequest( |
| 321 | + submitterUser, |
| 322 | + 12, |
| 323 | + 13, |
| 324 | + 14, |
| 325 | + CR_Type.DEFINITION_CHANGE, |
| 326 | + 'What is being changed', |
| 327 | + [{ type: Scope_CR_Why_Type.COMPETITION, explain: 'Why it is being changed' }], |
| 328 | + [], |
| 329 | + organization, |
| 330 | + projPropChanges, |
| 331 | + null |
| 332 | + ); |
| 333 | + |
| 334 | + changeRequestId = cr.crId; |
| 335 | + }); |
| 336 | + |
| 337 | + it('allows any leadership to review when no reviewers are requested', async () => { |
| 338 | + const reviewResult = await ChangeRequestsService.reviewChangeRequest( |
| 339 | + nonRequestedLeadership, |
| 340 | + changeRequestId, |
| 341 | + 'Looks good', |
| 342 | + true, |
| 343 | + organization, |
| 344 | + null |
| 345 | + ); |
| 346 | + |
| 347 | + expect(reviewResult).toBe(changeRequestId); |
| 348 | + |
| 349 | + const updatedCR = await prisma.change_Request.findUnique({ |
| 350 | + where: { crId: changeRequestId } |
| 351 | + }); |
| 352 | + |
| 353 | + expect(updatedCR?.reviewerId).toBe(nonRequestedLeadership.userId); |
| 354 | + expect(updatedCR?.accepted).toBe(true); |
| 355 | + }); |
| 356 | + |
| 357 | + it('allows requested reviewer to review when reviewers are requested', async () => { |
| 358 | + await ChangeRequestsService.requestCRReview( |
| 359 | + submitterUser, |
| 360 | + [leadershipUser1.userId, leadershipUser2.userId], |
| 361 | + changeRequestId, |
| 362 | + organization |
| 363 | + ); |
| 364 | + |
| 365 | + const reviewResult = await ChangeRequestsService.reviewChangeRequest( |
| 366 | + leadershipUser1, |
| 367 | + changeRequestId, |
| 368 | + 'Approved', |
| 369 | + true, |
| 370 | + organization, |
| 371 | + null |
| 372 | + ); |
| 373 | + |
| 374 | + expect(reviewResult).toBe(changeRequestId); |
| 375 | + |
| 376 | + const updatedCR = await prisma.change_Request.findUnique({ |
| 377 | + where: { crId: changeRequestId } |
| 378 | + }); |
| 379 | + |
| 380 | + expect(updatedCR?.reviewerId).toBe(leadershipUser1.userId); |
| 381 | + expect(updatedCR?.accepted).toBe(true); |
| 382 | + }); |
| 383 | + |
| 384 | + it('rejects non-requested leadership when reviewers are requested', async () => { |
| 385 | + await ChangeRequestsService.requestCRReview( |
| 386 | + submitterUser, |
| 387 | + [leadershipUser1.userId, leadershipUser2.userId], |
| 388 | + changeRequestId, |
| 389 | + organization |
| 390 | + ); |
| 391 | + |
| 392 | + await expect( |
| 393 | + ChangeRequestsService.reviewChangeRequest( |
| 394 | + nonRequestedLeadership, |
| 395 | + changeRequestId, |
| 396 | + 'I want to review this', |
| 397 | + true, |
| 398 | + organization, |
| 399 | + null |
| 400 | + ) |
| 401 | + ).rejects.toThrow(AccessDeniedException); |
| 402 | + |
| 403 | + await expect( |
| 404 | + ChangeRequestsService.reviewChangeRequest( |
| 405 | + nonRequestedLeadership, |
| 406 | + changeRequestId, |
| 407 | + 'I want to review this', |
| 408 | + true, |
| 409 | + organization, |
| 410 | + null |
| 411 | + ) |
| 412 | + ).rejects.toThrow('Only requested reviewers can review this change request!'); |
| 413 | + }); |
| 414 | + |
| 415 | + it('allows second requested reviewer to review when reviewers are requested', async () => { |
| 416 | + await ChangeRequestsService.requestCRReview( |
| 417 | + submitterUser, |
| 418 | + [leadershipUser1.userId, leadershipUser2.userId], |
| 419 | + changeRequestId, |
| 420 | + organization |
| 421 | + ); |
| 422 | + |
| 423 | + const reviewResult = await ChangeRequestsService.reviewChangeRequest( |
| 424 | + leadershipUser2, |
| 425 | + changeRequestId, |
| 426 | + 'Approved by second reviewer', |
| 427 | + true, |
| 428 | + organization, |
| 429 | + null |
| 430 | + ); |
| 431 | + |
| 432 | + expect(reviewResult).toBe(changeRequestId); |
| 433 | + |
| 434 | + const updatedCR = await prisma.change_Request.findUnique({ |
| 435 | + where: { crId: changeRequestId } |
| 436 | + }); |
| 437 | + |
| 438 | + expect(updatedCR?.reviewerId).toBe(leadershipUser2.userId); |
| 439 | + expect(updatedCR?.accepted).toBe(true); |
| 440 | + }); |
| 441 | + |
| 442 | + it('rejects member user even when they are in requested reviewers', async () => { |
| 443 | + await ChangeRequestsService.requestCRReview( |
| 444 | + submitterUser, |
| 445 | + [leadershipUser1.userId, memberUser.userId], |
| 446 | + changeRequestId, |
| 447 | + organization |
| 448 | + ); |
| 449 | + |
| 450 | + await expect( |
| 451 | + ChangeRequestsService.reviewChangeRequest( |
| 452 | + memberUser, |
| 453 | + changeRequestId, |
| 454 | + 'I want to review', |
| 455 | + false, |
| 456 | + organization, |
| 457 | + null |
| 458 | + ) |
| 459 | + ).rejects.toThrow(); |
| 460 | + }); |
| 461 | + |
| 462 | + it('allows rejection by non-requested leadership when reviewers are requested', async () => { |
| 463 | + await ChangeRequestsService.requestCRReview( |
| 464 | + submitterUser, |
| 465 | + [leadershipUser1.userId], |
| 466 | + changeRequestId, |
| 467 | + organization |
| 468 | + ); |
| 469 | + |
| 470 | + await expect( |
| 471 | + ChangeRequestsService.reviewChangeRequest( |
| 472 | + nonRequestedLeadership, |
| 473 | + changeRequestId, |
| 474 | + 'Rejecting this', |
| 475 | + false, |
| 476 | + organization, |
| 477 | + null |
| 478 | + ) |
| 479 | + ).rejects.toThrow(AccessDeniedException); |
| 480 | + }); |
| 481 | + }); |
287 | 482 | }); |
0 commit comments