Commit fba9cd07 authored by Gabriel Mazetto's avatar Gabriel Mazetto

Merge branch 'philipcunningham-clean-up-graphql-errors' into 'master'

Replace GraphQL error string with constant

See merge request gitlab-org/gitlab!72562
parents 1e83b773 f551a45a
...@@ -11,7 +11,7 @@ module Boards ...@@ -11,7 +11,7 @@ module Boards
def execute def execute
return ServiceResponse.error(message: 'This feature is not available') unless available? return ServiceResponse.error(message: 'This feature is not available') unless available?
return ServiceResponse.error(message: "The resource that you are attempting to access does not exist or you don't have permission to perform this action") unless allowed? return ServiceResponse.error(message: Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR) unless allowed?
error = check_arguments error = check_arguments
if error if error
......
...@@ -222,7 +222,7 @@ RSpec.describe Mutations::IncidentManagement::OncallRotation::Update do ...@@ -222,7 +222,7 @@ RSpec.describe Mutations::IncidentManagement::OncallRotation::Update do
context 'when resource is not accessible to the user' do context 'when resource is not accessible to the user' do
it 'raises an error' do it 'raises an error' do
expect { resolve }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, "The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect { resolve }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
end end
......
...@@ -43,7 +43,7 @@ RSpec.describe 'Reposition and move epic between board lists' do ...@@ -43,7 +43,7 @@ RSpec.describe 'Reposition and move epic between board lists' do
it 'raises resource not available error' do it 'raises resource not available error' do
subject subject
message = "The resource that you are attempting to access does not exist or you don't have permission to perform this action" message = Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
expect(graphql_errors).to include(a_hash_including('message' => message)) expect(graphql_errors).to include(a_hash_including('message' => message))
end end
end end
......
...@@ -27,7 +27,7 @@ RSpec.describe 'Delete a compliance framework' do ...@@ -27,7 +27,7 @@ RSpec.describe 'Delete a compliance framework' do
end end
it_behaves_like 'a mutation that returns top-level errors', it_behaves_like 'a mutation that returns top-level errors',
errors: ["The resource that you are attempting to access does not exist or you don't have permission to perform this action"] errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
end end
context 'when licensed' do context 'when licensed' do
...@@ -57,7 +57,7 @@ RSpec.describe 'Delete a compliance framework' do ...@@ -57,7 +57,7 @@ RSpec.describe 'Delete a compliance framework' do
end end
it_behaves_like 'a mutation that returns top-level errors', it_behaves_like 'a mutation that returns top-level errors',
errors: ["The resource that you are attempting to access does not exist or you don't have permission to perform this action"] errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
end end
end end
end end
...@@ -31,7 +31,7 @@ RSpec.describe 'Update a compliance framework' do ...@@ -31,7 +31,7 @@ RSpec.describe 'Update a compliance framework' do
end end
it_behaves_like 'a mutation that returns top-level errors', it_behaves_like 'a mutation that returns top-level errors',
errors: ["The resource that you are attempting to access does not exist or you don't have permission to perform this action"] errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
end end
context 'feature is licensed but disabled' do context 'feature is licensed but disabled' do
...@@ -40,7 +40,7 @@ RSpec.describe 'Update a compliance framework' do ...@@ -40,7 +40,7 @@ RSpec.describe 'Update a compliance framework' do
end end
it_behaves_like 'a mutation that returns top-level errors', it_behaves_like 'a mutation that returns top-level errors',
errors: ["The resource that you are attempting to access does not exist or you don't have permission to perform this action"] errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
end end
context 'feature is licensed' do context 'feature is licensed' do
...@@ -97,7 +97,7 @@ RSpec.describe 'Update a compliance framework' do ...@@ -97,7 +97,7 @@ RSpec.describe 'Update a compliance framework' do
let_it_be(:current_user) { create(:user) } let_it_be(:current_user) { create(:user) }
it_behaves_like 'a mutation that returns top-level errors', it_behaves_like 'a mutation that returns top-level errors',
errors: ["The resource that you are attempting to access does not exist or you don't have permission to perform this action"] errors: [Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR]
end end
end end
......
...@@ -42,7 +42,7 @@ RSpec.describe 'Update Environment Canary Ingress', :clean_gitlab_redis_cache do ...@@ -42,7 +42,7 @@ RSpec.describe 'Update Environment Canary Ingress', :clean_gitlab_redis_cache do
post_graphql_mutation(mutation, current_user: actor) post_graphql_mutation(mutation, current_user: actor)
expect(graphql_errors.first) expect(graphql_errors.first)
.to include('message' => "The resource that you are attempting to access does not exist or you don't have permission to perform this action") .to include('message' => Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
end end
...@@ -66,7 +66,7 @@ RSpec.describe 'creating escalation policy' do ...@@ -66,7 +66,7 @@ RSpec.describe 'creating escalation policy' do
it 'raises an error' do it 'raises an error' do
resolve resolve
expect_graphql_errors_to_include("The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect_graphql_errors_to_include(Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
......
...@@ -29,7 +29,7 @@ RSpec.describe Mutations::CustomerRelations::Contacts::Create do ...@@ -29,7 +29,7 @@ RSpec.describe Mutations::CustomerRelations::Contacts::Create do
it 'raises an error' do it 'raises an error' do
expect { resolve_mutation }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) expect { resolve_mutation }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable)
.with_message("The resource that you are attempting to access does not exist or you don't have permission to perform this action") .with_message(Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
......
...@@ -10,7 +10,7 @@ RSpec.describe Mutations::CustomerRelations::Contacts::Update do ...@@ -10,7 +10,7 @@ RSpec.describe Mutations::CustomerRelations::Contacts::Update do
let(:last_name) { 'Smith' } let(:last_name) { 'Smith' }
let(:email) { 'ls@gitlab.com' } let(:email) { 'ls@gitlab.com' }
let(:description) { 'VIP' } let(:description) { 'VIP' }
let(:does_not_exist_or_no_permission) { "The resource that you are attempting to access does not exist or you don't have permission to perform this action" } let(:does_not_exist_or_no_permission) { Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR }
let(:contact) { create(:contact, group: group) } let(:contact) { create(:contact, group: group) }
let(:attributes) do let(:attributes) do
{ {
......
...@@ -30,7 +30,7 @@ RSpec.describe Mutations::CustomerRelations::Organizations::Create do ...@@ -30,7 +30,7 @@ RSpec.describe Mutations::CustomerRelations::Organizations::Create do
it 'raises an error' do it 'raises an error' do
expect { resolve_mutation }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) expect { resolve_mutation }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable)
.with_message("The resource that you are attempting to access does not exist or you don't have permission to perform this action") .with_message(Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
......
...@@ -9,7 +9,7 @@ RSpec.describe Mutations::CustomerRelations::Organizations::Update do ...@@ -9,7 +9,7 @@ RSpec.describe Mutations::CustomerRelations::Organizations::Update do
let(:name) { 'GitLab' } let(:name) { 'GitLab' }
let(:default_rate) { 1000.to_f } let(:default_rate) { 1000.to_f }
let(:description) { 'VIP' } let(:description) { 'VIP' }
let(:does_not_exist_or_no_permission) { "The resource that you are attempting to access does not exist or you don't have permission to perform this action" } let(:does_not_exist_or_no_permission) { Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR }
let(:organization) { create(:organization, group: group) } let(:organization) { create(:organization, group: group) }
let(:attributes) do let(:attributes) do
{ {
......
...@@ -26,7 +26,7 @@ RSpec.describe Mutations::Discussions::ToggleResolve do ...@@ -26,7 +26,7 @@ RSpec.describe Mutations::Discussions::ToggleResolve do
it 'raises an error if the resource is not accessible to the user' do it 'raises an error if the resource is not accessible to the user' do
expect { subject }.to raise_error( expect { subject }.to raise_error(
Gitlab::Graphql::Errors::ResourceNotAvailable, Gitlab::Graphql::Errors::ResourceNotAvailable,
"The resource that you are attempting to access does not exist or you don't have permission to perform this action" Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
) )
end end
end end
...@@ -40,7 +40,7 @@ RSpec.describe Mutations::Discussions::ToggleResolve do ...@@ -40,7 +40,7 @@ RSpec.describe Mutations::Discussions::ToggleResolve do
it 'raises an error' do it 'raises an error' do
expect { subject }.to raise_error( expect { subject }.to raise_error(
Gitlab::Graphql::Errors::ResourceNotAvailable, Gitlab::Graphql::Errors::ResourceNotAvailable,
"The resource that you are attempting to access does not exist or you don't have permission to perform this action" Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
) )
end end
end end
......
...@@ -60,7 +60,7 @@ RSpec.describe Mutations::Environments::CanaryIngress::Update do ...@@ -60,7 +60,7 @@ RSpec.describe Mutations::Environments::CanaryIngress::Update do
let(:user) { reporter } let(:user) { reporter }
it 'raises an error' do it 'raises an error' do
expect { subject }.to raise_error("The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect { subject }.to raise_error(Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
end end
......
...@@ -29,7 +29,7 @@ RSpec.describe Mutations::Notes::RepositionImageDiffNote do ...@@ -29,7 +29,7 @@ RSpec.describe Mutations::Notes::RepositionImageDiffNote do
it 'raises an error if the resource is not accessible to the user' do it 'raises an error if the resource is not accessible to the user' do
expect { subject }.to raise_error( expect { subject }.to raise_error(
Gitlab::Graphql::Errors::ResourceNotAvailable, Gitlab::Graphql::Errors::ResourceNotAvailable,
"The resource that you are attempting to access does not exist or you don't have permission to perform this action" Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
) )
end end
end end
......
...@@ -28,7 +28,7 @@ RSpec.describe Mutations::Releases::Delete do ...@@ -28,7 +28,7 @@ RSpec.describe Mutations::Releases::Delete do
shared_examples 'unauthorized or not found error' do shared_examples 'unauthorized or not found error' do
it 'raises a Gitlab::Graphql::Errors::ResourceNotAvailable error' do it 'raises a Gitlab::Graphql::Errors::ResourceNotAvailable error' do
expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, "The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
......
...@@ -232,7 +232,7 @@ RSpec.describe Mutations::Releases::Update do ...@@ -232,7 +232,7 @@ RSpec.describe Mutations::Releases::Update do
let(:mutation_arguments) { super().merge(project_path: 'not/a/real/path') } let(:mutation_arguments) { super().merge(project_path: 'not/a/real/path') }
it 'raises an error' do it 'raises an error' do
expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, "The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
end end
...@@ -242,7 +242,7 @@ RSpec.describe Mutations::Releases::Update do ...@@ -242,7 +242,7 @@ RSpec.describe Mutations::Releases::Update do
let(:current_user) { reporter } let(:current_user) { reporter }
it 'raises an error' do it 'raises an error' do
expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, "The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable, Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
end end
......
...@@ -15,7 +15,7 @@ RSpec.describe 'RunnersRegistrationTokenReset' do ...@@ -15,7 +15,7 @@ RSpec.describe 'RunnersRegistrationTokenReset' do
subject subject
expect(graphql_errors).not_to be_empty expect(graphql_errors).not_to be_empty
expect(graphql_errors).to include(a_hash_including('message' => "The resource that you are attempting to access does not exist or you don't have permission to perform this action")) expect(graphql_errors).to include(a_hash_including('message' => Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR))
expect(mutation_response).to be_nil expect(mutation_response).to be_nil
end end
end end
......
...@@ -33,7 +33,7 @@ RSpec.describe 'Moving an issue' do ...@@ -33,7 +33,7 @@ RSpec.describe 'Moving an issue' do
context 'when the user is not allowed to read source project' do context 'when the user is not allowed to read source project' do
it 'returns an error' do it 'returns an error' do
error = "The resource that you are attempting to access does not exist or you don't have permission to perform this action" error = Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
post_graphql_mutation(mutation, current_user: user) post_graphql_mutation(mutation, current_user: user)
expect(response).to have_gitlab_http_status(:success) expect(response).to have_gitlab_http_status(:success)
......
...@@ -36,7 +36,7 @@ RSpec.describe 'Setting an issue as confidential' do ...@@ -36,7 +36,7 @@ RSpec.describe 'Setting an issue as confidential' do
end end
it 'returns an error if the user is not allowed to update the issue' do it 'returns an error if the user is not allowed to update the issue' do
error = "The resource that you are attempting to access does not exist or you don't have permission to perform this action" error = Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
post_graphql_mutation(mutation, current_user: create(:user)) post_graphql_mutation(mutation, current_user: create(:user))
expect(graphql_errors).to include(a_hash_including('message' => error)) expect(graphql_errors).to include(a_hash_including('message' => error))
......
...@@ -36,7 +36,7 @@ RSpec.describe 'Setting Due Date of an issue' do ...@@ -36,7 +36,7 @@ RSpec.describe 'Setting Due Date of an issue' do
end end
it 'returns an error if the user is not allowed to update the issue' do it 'returns an error if the user is not allowed to update the issue' do
error = "The resource that you are attempting to access does not exist or you don't have permission to perform this action" error = Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
post_graphql_mutation(mutation, current_user: create(:user)) post_graphql_mutation(mutation, current_user: create(:user))
expect(graphql_errors).to include(a_hash_including('message' => error)) expect(graphql_errors).to include(a_hash_including('message' => error))
......
...@@ -35,7 +35,7 @@ RSpec.describe 'Setting severity level of an incident' do ...@@ -35,7 +35,7 @@ RSpec.describe 'Setting severity level of an incident' do
context 'when the user is not allowed to update the incident' do context 'when the user is not allowed to update the incident' do
it 'returns an error' do it 'returns an error' do
error = "The resource that you are attempting to access does not exist or you don't have permission to perform this action" error = Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
post_graphql_mutation(mutation, current_user: user) post_graphql_mutation(mutation, current_user: user)
expect(response).to have_gitlab_http_status(:success) expect(response).to have_gitlab_http_status(:success)
......
...@@ -342,7 +342,7 @@ RSpec.describe 'Creation of a new release' do ...@@ -342,7 +342,7 @@ RSpec.describe 'Creation of a new release' do
end end
context "when the current user doesn't have access to create releases" do context "when the current user doesn't have access to create releases" do
expected_error_message = "The resource that you are attempting to access does not exist or you don't have permission to perform this action" expected_error_message = Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
context 'when the current user is a Reporter' do context 'when the current user is a Reporter' do
let(:current_user) { reporter } let(:current_user) { reporter }
......
...@@ -50,7 +50,7 @@ RSpec.describe 'Deleting a release' do ...@@ -50,7 +50,7 @@ RSpec.describe 'Deleting a release' do
expect(mutation_response).to be_nil expect(mutation_response).to be_nil
expect(graphql_errors.count).to eq(1) expect(graphql_errors.count).to eq(1)
expect(graphql_errors.first['message']).to eq("The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect(graphql_errors.first['message']).to eq(Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
......
...@@ -218,13 +218,13 @@ RSpec.describe 'Updating an existing release' do ...@@ -218,13 +218,13 @@ RSpec.describe 'Updating an existing release' do
context 'when the project does not exist' do context 'when the project does not exist' do
let(:mutation_arguments) { super().merge(projectPath: 'not/a/real/path') } let(:mutation_arguments) { super().merge(projectPath: 'not/a/real/path') }
it_behaves_like 'top-level error with message', "The resource that you are attempting to access does not exist or you don't have permission to perform this action" it_behaves_like 'top-level error with message', Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
end end
end end
end end
context "when the current user doesn't have access to update releases" do context "when the current user doesn't have access to update releases" do
expected_error_message = "The resource that you are attempting to access does not exist or you don't have permission to perform this action" expected_error_message = Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR
context 'when the current user is a Reporter' do context 'when the current user is a Reporter' do
let(:current_user) { reporter } let(:current_user) { reporter }
......
...@@ -28,7 +28,7 @@ RSpec.shared_examples 'board lists destroy request' do ...@@ -28,7 +28,7 @@ RSpec.shared_examples 'board lists destroy request' do
it 'returns an error' do it 'returns an error' do
subject subject
expect(graphql_errors.first['message']).to include("The resource that you are attempting to access does not exist or you don't have permission to perform this action") expect(graphql_errors.first['message']).to include(Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
end end
end end
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment