debian-mirror-gitlab/spec/presenters/clusterable_presenter_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

131 lines
3.2 KiB
Ruby
Raw Permalink Normal View History

2018-12-13 13:39:08 +05:30
# frozen_string_literal: true
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe ClusterablePresenter do
2018-12-13 13:39:08 +05:30
include Gitlab::Routing.url_helpers
describe '.fabricate' do
let(:project) { create(:project) }
subject { described_class.fabricate(project) }
it 'creates an object from a descendant presenter' do
expect(subject).to be_kind_of(ProjectClusterablePresenter)
end
end
2019-02-15 15:39:39 +05:30
shared_examples 'appropriate member permissions' do
context 'with a developer' do
before do
clusterable.add_developer(user)
end
it { is_expected.to be_falsy }
end
context 'with a maintainer' do
before do
clusterable.add_maintainer(user)
end
it { is_expected.to be_truthy }
end
end
describe '#can_create_cluster?' do
let(:user) { create(:user) }
subject { described_class.new(clusterable).can_create_cluster? }
before do
allow(clusterable).to receive(:current_user).and_return(user)
end
context 'when clusterable is a group' do
let(:clusterable) { create(:group) }
it_behaves_like 'appropriate member permissions'
end
context 'when clusterable is a project' do
let(:clusterable) { create(:project, :repository) }
it_behaves_like 'appropriate member permissions'
end
end
describe '#can_add_cluster?' do
let(:user) { create(:user) }
subject { described_class.new(clusterable).can_add_cluster? }
before do
clusterable.add_maintainer(user)
allow(clusterable).to receive(:current_user).and_return(user)
end
context 'when clusterable is a group' do
2022-04-04 11:22:00 +05:30
let(:clusterable) { create(:group) }
it_behaves_like 'appropriate member permissions'
end
context 'when clusterable is a project' do
let(:clusterable) { create(:project, :repository) }
it_behaves_like 'appropriate member permissions'
end
end
describe '#can_admin_cluster?' do
let(:user) { create(:user) }
subject { described_class.new(clusterable).can_admin_cluster? }
before do
clusterable.add_maintainer(user)
allow(clusterable).to receive(:current_user).and_return(user)
end
context 'when clusterable is a group' do
2019-02-15 15:39:39 +05:30
let(:clusterable) { create(:group) }
it_behaves_like 'appropriate member permissions'
end
context 'when clusterable is a project' do
let(:clusterable) { create(:project, :repository) }
it_behaves_like 'appropriate member permissions'
end
end
2019-12-04 20:38:33 +05:30
describe '#environments_cluster_path' do
subject { described_class.new(clusterable).environments_cluster_path(cluster) }
let(:clusterable) { create(:group) }
let(:cluster) { create(:cluster_for_group, groups: [clusterable]) }
it { is_expected.to be_nil }
end
2020-05-24 23:13:21 +05:30
describe '#index_path' do
let(:clusterable) { create(:group) }
context 'without options' do
subject { described_class.new(clusterable).index_path }
it { is_expected.to eq(group_clusters_path(clusterable)) }
end
context 'with options' do
subject { described_class.new(clusterable).index_path(format: :json) }
it { is_expected.to eq(group_clusters_path(clusterable, format: :json)) }
end
end
2018-12-13 13:39:08 +05:30
end