2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec . describe ProjectsHelper do
2018-03-17 18:26:18 +05:30
include ProjectForksHelper
2021-03-11 19:13:27 +05:30
include AfterNextHelpers
2018-03-17 18:26:18 +05:30
2021-01-03 14:25:43 +05:30
let_it_be_with_reload ( :project ) { create ( :project ) }
let_it_be_with_refind ( :project_with_repo ) { create ( :project , :repository ) }
2020-06-23 00:09:42 +05:30
let_it_be ( :user ) { create ( :user ) }
2021-01-03 14:25:43 +05:30
before do
helper . instance_variable_set ( :@project , project )
end
2020-03-13 15:44:24 +05:30
2021-01-03 14:25:43 +05:30
describe '#project_incident_management_setting' do
2020-03-13 15:44:24 +05:30
context 'when incident_management_setting exists' do
let ( :project_incident_management_setting ) do
create ( :project_incident_management_setting , project : project )
end
it 'return project_incident_management_setting' do
expect ( helper . project_incident_management_setting ) . to (
eq ( project_incident_management_setting )
)
end
end
context 'when incident_management_setting does not exist' do
it 'builds incident_management_setting' do
setting = helper . project_incident_management_setting
expect ( setting ) . not_to be_persisted
2020-06-23 00:09:42 +05:30
expect ( setting . create_issue ) . to be_falsey
2020-03-13 15:44:24 +05:30
expect ( setting . send_email ) . to be_falsey
expect ( setting . issue_template_key ) . to be_nil
end
end
end
2019-07-07 11:18:12 +05:30
describe '#error_tracking_setting_project_json' do
context 'error tracking setting does not exist' do
it 'returns nil' do
expect ( helper . error_tracking_setting_project_json ) . to be_nil
end
end
context 'error tracking setting exists' do
2021-01-03 14:25:43 +05:30
let_it_be ( :error_tracking_setting ) { create ( :project_error_tracking_setting , project : project ) }
2019-07-07 11:18:12 +05:30
context 'api_url present' do
let ( :json ) do
{
2022-07-01 11:34:44 +05:30
sentry_project_id : error_tracking_setting . sentry_project_id ,
2019-07-07 11:18:12 +05:30
name : error_tracking_setting . project_name ,
organization_name : error_tracking_setting . organization_name ,
organization_slug : error_tracking_setting . organization_slug ,
slug : error_tracking_setting . project_slug
} . to_json
end
it 'returns error tracking json' do
expect ( helper . error_tracking_setting_project_json ) . to eq ( json )
end
end
context 'api_url not present' do
2021-01-03 14:25:43 +05:30
it 'returns nil' do
2019-07-07 11:18:12 +05:30
project . error_tracking_setting . api_url = nil
project . error_tracking_setting . enabled = false
expect ( helper . error_tracking_setting_project_json ) . to be_nil
end
end
end
end
2015-04-26 12:48:37 +05:30
describe " # project_status_css_class " do
it " returns appropriate class " do
2018-11-08 19:23:39 +05:30
expect ( project_status_css_class ( " started " ) ) . to eq ( " table-active " )
expect ( project_status_css_class ( " failed " ) ) . to eq ( " table-danger " )
expect ( project_status_css_class ( " finished " ) ) . to eq ( " table-success " )
2014-09-02 18:07:02 +05:30
end
end
2015-09-11 14:41:01 +05:30
describe " can_change_visibility_level? " do
2021-01-03 14:25:43 +05:30
let_it_be ( :user ) { create ( :project_member , :reporter , user : create ( :user ) , project : project ) . user }
2021-04-29 21:17:54 +05:30
2018-03-17 18:26:18 +05:30
let ( :forked_project ) { fork_project ( project , user ) }
2015-09-11 14:41:01 +05:30
it " returns false if there are no appropriate permissions " do
allow ( helper ) . to receive ( :can? ) { false }
expect ( helper . can_change_visibility_level? ( project , user ) ) . to be_falsey
end
2021-03-08 18:12:59 +05:30
it " returns true if there are permissions " do
2015-09-11 14:41:01 +05:30
allow ( helper ) . to receive ( :can? ) { true }
expect ( helper . can_change_visibility_level? ( project , user ) ) . to be_truthy
end
end
2019-10-12 21:52:04 +05:30
describe '#can_disable_emails?' do
2021-01-03 14:25:43 +05:30
let_it_be ( :user ) { create ( :project_member , :maintainer , user : create ( :user ) , project : project ) . user }
2019-10-12 21:52:04 +05:30
it 'returns true for the project owner' do
allow ( helper ) . to receive ( :can? ) . with ( project . owner , :set_emails_disabled , project ) { true }
expect ( helper . can_disable_emails? ( project , project . owner ) ) . to be_truthy
end
it 'returns false for anyone else' do
allow ( helper ) . to receive ( :can? ) . with ( user , :set_emails_disabled , project ) { false }
expect ( helper . can_disable_emails? ( project , user ) ) . to be_falsey
end
it 'returns false if group emails disabled' do
project = create ( :project , group : create ( :group ) )
allow ( project . group ) . to receive ( :emails_disabled? ) . and_return ( true )
expect ( helper . can_disable_emails? ( project , project . owner ) ) . to be_falsey
end
end
2015-09-11 14:41:01 +05:30
describe " readme_cache_key " do
2021-01-03 14:25:43 +05:30
let ( :project ) { project_with_repo }
2015-09-11 14:41:01 +05:30
it " returns a valid cach key " do
2017-09-10 17:25:29 +05:30
expect ( helper . send ( :readme_cache_key ) ) . to eq ( " #{ project . full_path } - #{ project . commit . id } -readme " )
2015-09-11 14:41:01 +05:30
end
it " returns a valid cache key if HEAD does not exist " do
allow ( project ) . to receive ( :commit ) { nil }
2017-09-10 17:25:29 +05:30
expect ( helper . send ( :readme_cache_key ) ) . to eq ( " #{ project . full_path } -nil-readme " )
2015-10-24 18:46:33 +05:30
end
end
2021-09-30 23:02:18 +05:30
describe " # project_list_cache_key " , :clean_gitlab_redis_cache do
2021-01-03 14:25:43 +05:30
let ( :project ) { project_with_repo }
2018-03-27 19:54:05 +05:30
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
allow ( helper ) . to receive ( :can? ) . with ( user , :read_cross_project ) { true }
2018-11-08 19:23:39 +05:30
allow ( user ) . to receive ( :max_member_access_for_project ) . and_return ( 40 )
2020-01-01 13:55:28 +05:30
allow ( Gitlab :: I18n ) . to receive ( :locale ) . and_return ( 'es' )
2018-03-27 19:54:05 +05:30
end
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
it " includes the route " do
expect ( helper . project_list_cache_key ( project ) ) . to include ( project . route . cache_key )
2017-08-17 22:00:37 +05:30
end
it " includes the project " do
expect ( helper . project_list_cache_key ( project ) ) . to include ( project . cache_key )
end
2018-11-08 19:23:39 +05:30
it " includes the last activity date " do
expect ( helper . project_list_cache_key ( project ) ) . to include ( project . last_activity_date )
end
2017-08-17 22:00:37 +05:30
it " includes the controller name " do
expect ( helper . controller ) . to receive ( :controller_name ) . and_return ( " testcontroller " )
expect ( helper . project_list_cache_key ( project ) ) . to include ( " testcontroller " )
end
it " includes the controller action " do
expect ( helper . controller ) . to receive ( :action_name ) . and_return ( " testaction " )
expect ( helper . project_list_cache_key ( project ) ) . to include ( " testaction " )
end
it " includes the application settings " do
settings = Gitlab :: CurrentSettings . current_application_settings
expect ( helper . project_list_cache_key ( project ) ) . to include ( settings . cache_key )
end
it " includes a version " do
expect ( helper . project_list_cache_key ( project ) . last ) . to start_with ( 'v' )
end
2020-03-13 15:44:24 +05:30
it 'includes whether or not the user can read cross project' do
2018-03-27 19:54:05 +05:30
expect ( helper . project_list_cache_key ( project ) ) . to include ( 'cross-project:true' )
end
2017-08-17 22:00:37 +05:30
it " includes the pipeline status when there is a status " do
create ( :ci_pipeline , :success , project : project , sha : project . commit . sha )
expect ( helper . project_list_cache_key ( project ) ) . to include ( " pipeline-status/ #{ project . commit . sha } -success " )
end
2018-11-08 19:23:39 +05:30
2020-01-01 13:55:28 +05:30
it " includes the user locale " do
expect ( helper . project_list_cache_key ( project ) ) . to include ( 'es' )
end
2018-11-08 19:23:39 +05:30
it " includes the user max member access " do
expect ( helper . project_list_cache_key ( project ) ) . to include ( 'access:40' )
end
2017-08-17 22:00:37 +05:30
end
describe '#load_pipeline_status' do
it 'loads the pipeline status in batch' do
helper . load_pipeline_status ( [ project ] )
# Skip lazy loading of the `pipeline_status` attribute
pipeline_status = project . instance_variable_get ( '@pipeline_status' )
expect ( pipeline_status ) . to be_a ( Gitlab :: Cache :: Ci :: ProjectPipelineStatus )
end
end
2017-09-10 17:25:29 +05:30
describe '#show_no_ssh_key_message?' do
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
end
context 'user has no keys' do
it 'returns true' do
expect ( helper . show_no_ssh_key_message? ) . to be_truthy
end
end
context 'user has an ssh key' do
it 'returns false' do
create ( :personal_key , user : user )
expect ( helper . show_no_ssh_key_message? ) . to be_falsey
end
end
end
describe '#show_no_password_message?' do
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
end
context 'user has password set' do
it 'returns false' do
expect ( helper . show_no_password_message? ) . to be_falsey
end
end
2018-03-17 18:26:18 +05:30
context 'user has hidden the message' do
it 'returns false' do
allow ( helper ) . to receive ( :cookies ) . and_return ( hide_no_password_message : true )
expect ( helper . show_no_password_message? ) . to be_falsey
end
end
2017-09-10 17:25:29 +05:30
2018-03-17 18:26:18 +05:30
context 'user requires a password for Git' do
2017-09-10 17:25:29 +05:30
it 'returns true' do
2018-03-17 18:26:18 +05:30
allow ( user ) . to receive ( :require_password_creation_for_git? ) . and_return ( true )
2017-09-10 17:25:29 +05:30
expect ( helper . show_no_password_message? ) . to be_truthy
end
end
2018-03-17 18:26:18 +05:30
context 'user requires a personal access token for Git' do
2017-09-10 17:25:29 +05:30
it 'returns true' do
2018-03-17 18:26:18 +05:30
allow ( user ) . to receive ( :require_password_creation_for_git? ) . and_return ( false )
allow ( user ) . to receive ( :require_personal_access_token_creation_for_git_auth? ) . and_return ( true )
2017-09-10 17:25:29 +05:30
expect ( helper . show_no_password_message? ) . to be_truthy
end
end
end
2021-12-11 22:18:48 +05:30
describe '#no_password_message' do
2018-03-17 18:26:18 +05:30
let ( :user ) { create ( :user , password_automatically_set : true ) }
2017-09-10 17:25:29 +05:30
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
end
2018-03-17 18:26:18 +05:30
context 'password authentication is enabled for Git' do
2021-12-11 22:18:48 +05:30
it 'returns message prompting user to set password or set up a PAT' do
2018-03-17 18:26:18 +05:30
stub_application_setting ( password_authentication_enabled_for_git? : true )
2022-07-16 23:28:13 +05:30
expect ( helper . no_password_message ) . to eq ( 'Your account is authenticated with SSO or SAML. To <a href="/help/topics/git/terminology#pull-and-push" target="_blank" rel="noopener noreferrer">push and pull</a> over HTTP with Git using this account, you must <a href="/-/profile/password/edit">set a password</a> or <a href="/-/profile/personal_access_tokens">set up a Personal Access Token</a> to use instead of a password. For more information, see <a href="/help/gitlab-basics/start-using-git#clone-with-https" target="_blank" rel="noopener noreferrer">Clone with HTTPS</a>.' )
2017-09-10 17:25:29 +05:30
end
end
2018-03-17 18:26:18 +05:30
context 'password authentication is disabled for Git' do
2021-12-11 22:18:48 +05:30
it 'returns message prompting user to set up a PAT' do
2018-03-17 18:26:18 +05:30
stub_application_setting ( password_authentication_enabled_for_git? : false )
2017-09-10 17:25:29 +05:30
2022-07-16 23:28:13 +05:30
expect ( helper . no_password_message ) . to eq ( 'Your account is authenticated with SSO or SAML. To <a href="/help/topics/git/terminology#pull-and-push" target="_blank" rel="noopener noreferrer">push and pull</a> over HTTP with Git using this account, you must <a href="/-/profile/personal_access_tokens">set up a Personal Access Token</a> to use instead of a password. For more information, see <a href="/help/gitlab-basics/start-using-git#clone-with-https" target="_blank" rel="noopener noreferrer">Clone with HTTPS</a>.' )
2017-09-10 17:25:29 +05:30
end
end
end
2019-02-15 15:39:39 +05:30
describe '#link_to_project' do
let ( :group ) { create ( :group , name : 'group name with space' ) }
let ( :project ) { create ( :project , group : group , name : 'project name with space' ) }
2020-01-01 13:55:28 +05:30
2019-02-15 15:39:39 +05:30
subject { link_to_project ( project ) }
it 'returns an HTML link to the project' do
expect ( subject ) . to match ( %r{ / #{ group . full_path } / #{ project . path } } )
expect ( subject ) . to include ( 'group name with space /' )
expect ( subject ) . to include ( 'project name with space' )
end
end
2018-03-17 18:26:18 +05:30
describe '#link_to_member_avatar' do
let ( :user ) { build_stubbed ( :user ) }
let ( :expected ) { double }
before do
2018-03-27 19:54:05 +05:30
expect ( helper ) . to receive ( :avatar_icon_for_user ) . with ( user , 16 ) . and_return ( expected )
2018-03-17 18:26:18 +05:30
end
it 'returns image tag for member avatar' do
2021-11-18 22:05:49 +05:30
expect ( helper ) . to receive ( :image_tag ) . with ( expected , { width : 16 , class : %w[ avatar avatar-inline s16 ] , alt : " " } )
2018-03-17 18:26:18 +05:30
helper . link_to_member_avatar ( user )
end
it 'returns image tag with avatar class' do
2021-11-18 22:05:49 +05:30
expect ( helper ) . to receive ( :image_tag ) . with ( expected , { width : 16 , class : %w[ avatar avatar-inline s16 any-avatar-class ] , alt : " " } )
2018-03-17 18:26:18 +05:30
helper . link_to_member_avatar ( user , avatar_class : " any-avatar-class " )
end
end
describe '#link_to_member' do
let ( :group ) { build_stubbed ( :group ) }
let ( :project ) { build_stubbed ( :project , group : group ) }
2018-06-27 16:04:02 +05:30
let ( :user ) { build_stubbed ( :user , name : '<h1>Administrator</h1>' ) }
2015-10-24 18:46:33 +05:30
describe 'using the default options' do
it 'returns an HTML link to the user' do
link = helper . link_to_member ( project , user )
2016-11-03 12:29:30 +05:30
expect ( link ) . to match ( %r{ / #{ user . username } } )
2015-10-24 18:46:33 +05:30
end
2018-06-27 16:04:02 +05:30
it 'HTML escapes the name of the user' do
link = helper . link_to_member ( project , user )
expect ( link ) . to include ( ERB :: Util . html_escape ( user . name ) )
expect ( link ) . not_to include ( user . name )
end
2015-09-11 14:41:01 +05:30
end
2022-04-04 11:22:00 +05:30
context 'when user is nil' do
it 'returns "(deleted)"' do
link = helper . link_to_member ( project , nil )
expect ( link ) . to eq ( " (deleted) " )
end
end
2015-09-11 14:41:01 +05:30
end
2016-06-02 11:05:42 +05:30
describe 'default_clone_protocol' do
context 'when user is not logged in and gitlab protocol is HTTP' do
it 'returns HTTP' do
allow ( helper ) . to receive ( :current_user ) . and_return ( nil )
expect ( helper . send ( :default_clone_protocol ) ) . to eq ( 'http' )
end
end
context 'when user is not logged in and gitlab protocol is HTTPS' do
it 'returns HTTPS' do
stub_config_setting ( protocol : 'https' )
allow ( helper ) . to receive ( :current_user ) . and_return ( nil )
expect ( helper . send ( :default_clone_protocol ) ) . to eq ( 'https' )
end
end
end
2016-09-13 17:45:13 +05:30
describe '#last_push_event' do
let ( :user ) { double ( :user , fork_of : nil ) }
let ( :project ) { double ( :project , id : 1 ) }
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
end
context 'when there is no current_user' do
let ( :user ) { nil }
it 'returns nil' do
expect ( helper . last_push_event ) . to eq ( nil )
end
end
it 'returns recent push on the current project' do
event = double ( :event )
2018-03-17 18:26:18 +05:30
expect ( user ) . to receive ( :recent_push ) . with ( project ) . and_return ( event )
2016-09-13 17:45:13 +05:30
expect ( helper . last_push_event ) . to eq ( event )
end
end
2016-09-29 09:46:39 +05:30
2018-03-17 18:26:18 +05:30
describe '#show_projects' do
2017-09-10 17:25:29 +05:30
let ( :projects ) do
Project . all
end
2019-07-31 22:56:46 +05:30
before do
stub_feature_flags ( project_list_filter_bar : false )
end
2017-09-10 17:25:29 +05:30
it 'returns true when there are projects' do
2018-03-17 18:26:18 +05:30
expect ( helper . show_projects? ( projects , { } ) ) . to eq ( true )
2017-09-10 17:25:29 +05:30
end
it 'returns true when there are no projects but a name is given' do
2018-03-17 18:26:18 +05:30
expect ( helper . show_projects? ( Project . none , name : 'foo' ) ) . to eq ( true )
end
it 'returns true when there are no projects but personal is present' do
expect ( helper . show_projects? ( Project . none , personal : 'true' ) ) . to eq ( true )
2017-09-10 17:25:29 +05:30
end
it 'returns false when there are no projects and there is no name' do
2018-03-17 18:26:18 +05:30
expect ( helper . show_projects? ( Project . none , { } ) ) . to eq ( false )
2017-09-10 17:25:29 +05:30
end
end
2021-01-03 14:25:43 +05:30
describe '#push_to_create_project_command' do
let ( :user ) { build_stubbed ( :user , username : 'john' ) }
2018-03-27 19:54:05 +05:30
it 'returns the command to push to create project over HTTP' do
allow ( Gitlab :: CurrentSettings . current_application_settings ) . to receive ( :enabled_git_access_protocol ) { 'http' }
expect ( helper . push_to_create_project_command ( user ) ) . to eq ( 'git push --set-upstream http://test.host/john/$(git rev-parse --show-toplevel | xargs basename).git $(git rev-parse --abbrev-ref HEAD)' )
end
it 'returns the command to push to create project over SSH' do
allow ( Gitlab :: CurrentSettings . current_application_settings ) . to receive ( :enabled_git_access_protocol ) { 'ssh' }
2019-12-04 20:38:33 +05:30
expect ( helper . push_to_create_project_command ( user ) ) . to eq ( " git push --set-upstream #{ Gitlab . config . gitlab . user } @localhost:john/$(git rev-parse --show-toplevel | xargs basename).git $(git rev-parse --abbrev-ref HEAD) " )
2018-03-27 19:54:05 +05:30
end
end
2017-09-10 17:25:29 +05:30
describe '#any_projects?' do
it 'returns true when projects will be returned' do
expect ( helper . any_projects? ( Project . all ) ) . to eq ( true )
end
it 'returns false when no projects will be returned' do
expect ( helper . any_projects? ( Project . none ) ) . to eq ( false )
end
it 'returns true when using a non-empty Array' do
expect ( helper . any_projects? ( [ project ] ) ) . to eq ( true )
end
it 'returns false when using an empty Array' do
expect ( helper . any_projects? ( [ ] ) ) . to eq ( false )
end
it 'only executes a single query when a LIMIT is applied' do
relation = Project . limit ( 1 )
recorder = ActiveRecord :: QueryRecorder . new do
2 . times do
helper . any_projects? ( relation )
end
end
expect ( recorder . count ) . to eq ( 1 )
end
end
2018-03-17 18:26:18 +05:30
describe '#git_user_name' do
2021-01-03 14:25:43 +05:30
let ( :user ) { build_stubbed ( :user , name : 'John "A" Doe53' ) }
2020-01-01 13:55:28 +05:30
2018-03-17 18:26:18 +05:30
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
end
it 'parses quotes in name' do
expect ( helper . send ( :git_user_name ) ) . to eq ( 'John \"A\" Doe53' )
end
end
2018-11-08 19:23:39 +05:30
2019-12-04 20:38:33 +05:30
describe '#git_user_email' do
context 'not logged-in' do
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( nil )
end
it 'returns your@email.com' do
expect ( helper . send ( :git_user_email ) ) . to eq ( 'your@email.com' )
end
end
context 'user logged in' do
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
end
context 'user has no configured commit email' do
it 'returns the primary email' do
expect ( helper . send ( :git_user_email ) ) . to eq ( user . email )
end
end
context 'user has a configured commit email' do
before do
confirmed_email = create ( :email , :confirmed , user : user )
2021-11-11 11:23:49 +05:30
user . update! ( commit_email : confirmed_email . email )
2019-12-04 20:38:33 +05:30
end
it 'returns the commit email' do
expect ( helper . send ( :git_user_email ) ) . to eq ( user . commit_email )
end
end
end
end
2018-11-08 19:23:39 +05:30
describe 'show_xcode_link' do
let ( :mac_ua ) { 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36' }
let ( :ios_ua ) { 'Mozilla/5.0 (iPad; CPU OS 5_1_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9B206 Safari/7534.48.3' }
context 'when the repository is xcode compatible' do
before do
allow ( project . repository ) . to receive ( :xcode_project? ) . and_return ( true )
end
it 'returns false if the visitor is not using macos' do
allow ( helper ) . to receive ( :browser ) . and_return ( Browser . new ( ios_ua ) )
expect ( helper . show_xcode_link? ( project ) ) . to eq ( false )
end
it 'returns true if the visitor is using macos' do
allow ( helper ) . to receive ( :browser ) . and_return ( Browser . new ( mac_ua ) )
expect ( helper . show_xcode_link? ( project ) ) . to eq ( true )
end
end
context 'when the repository is not xcode compatible' do
before do
allow ( project . repository ) . to receive ( :xcode_project? ) . and_return ( false )
end
it 'returns false if the visitor is not using macos' do
allow ( helper ) . to receive ( :browser ) . and_return ( Browser . new ( ios_ua ) )
expect ( helper . show_xcode_link? ( project ) ) . to eq ( false )
end
it 'returns false if the visitor is using macos' do
allow ( helper ) . to receive ( :browser ) . and_return ( Browser . new ( mac_ua ) )
expect ( helper . show_xcode_link? ( project ) ) . to eq ( false )
end
end
end
2018-11-20 20:47:30 +05:30
2019-02-15 15:39:39 +05:30
describe '#explore_projects_tab?' do
subject { helper . explore_projects_tab? }
it 'returns true when on the "All" tab under "Explore projects"' do
allow ( @request ) . to receive ( :path ) { explore_projects_path }
expect ( subject ) . to be_truthy
end
it 'returns true when on the "Trending" tab under "Explore projects"' do
allow ( @request ) . to receive ( :path ) { trending_explore_projects_path }
expect ( subject ) . to be_truthy
end
it 'returns true when on the "Starred" tab under "Explore projects"' do
allow ( @request ) . to receive ( :path ) { starred_explore_projects_path }
expect ( subject ) . to be_truthy
end
it 'returns false when on the "Your projects" tab' do
allow ( @request ) . to receive ( :path ) { dashboard_projects_path }
expect ( subject ) . to be_falsey
end
end
describe '#show_merge_request_count' do
2020-05-24 23:13:21 +05:30
context 'enabled flag' do
2019-02-15 15:39:39 +05:30
it 'returns true if compact mode is disabled' do
expect ( helper . show_merge_request_count? ) . to be_truthy
end
it 'returns false if compact mode is enabled' do
expect ( helper . show_merge_request_count? ( compact_mode : true ) ) . to be_falsey
end
end
context 'disabled flag' do
it 'returns false if disabled flag is true' do
expect ( helper . show_merge_request_count? ( disabled : true ) ) . to be_falsey
end
it 'returns true if disabled flag is false' do
expect ( helper . show_merge_request_count? ) . to be_truthy
end
end
end
describe '#show_issue_count?' do
2020-05-24 23:13:21 +05:30
context 'enabled flag' do
2019-02-15 15:39:39 +05:30
it 'returns true if compact mode is disabled' do
expect ( helper . show_issue_count? ) . to be_truthy
end
it 'returns false if compact mode is enabled' do
expect ( helper . show_issue_count? ( compact_mode : true ) ) . to be_falsey
end
end
context 'disabled flag' do
it 'returns false if disabled flag is true' do
expect ( helper . show_issue_count? ( disabled : true ) ) . to be_falsey
end
it 'returns true if disabled flag is false' do
expect ( helper . show_issue_count? ) . to be_truthy
end
end
end
describe '#show_auto_devops_implicitly_enabled_banner?' do
using RSpec :: Parameterized :: TableSyntax
2021-01-03 14:25:43 +05:30
let_it_be_with_reload ( :project_with_auto_devops ) { create ( :project , :repository , :auto_devops ) }
2019-02-15 15:39:39 +05:30
let ( :feature_visibilities ) do
{
enabled : ProjectFeature :: ENABLED ,
disabled : ProjectFeature :: DISABLED
}
end
where ( :global_setting , :project_setting , :builds_visibility , :gitlab_ci_yml , :user_access , :result ) do
# With ADO implicitly enabled scenarios
true | nil | :disabled | true | :developer | false
true | nil | :disabled | true | :maintainer | false
true | nil | :disabled | true | :owner | false
true | nil | :disabled | false | :developer | false
true | nil | :disabled | false | :maintainer | false
true | nil | :disabled | false | :owner | false
true | nil | :enabled | true | :developer | false
true | nil | :enabled | true | :maintainer | false
true | nil | :enabled | true | :owner | false
true | nil | :enabled | false | :developer | false
true | nil | :enabled | false | :maintainer | true
true | nil | :enabled | false | :owner | true
# With ADO enabled scenarios
true | true | :disabled | true | :developer | false
true | true | :disabled | true | :maintainer | false
true | true | :disabled | true | :owner | false
true | true | :disabled | false | :developer | false
true | true | :disabled | false | :maintainer | false
true | true | :disabled | false | :owner | false
true | true | :enabled | true | :developer | false
true | true | :enabled | true | :maintainer | false
true | true | :enabled | true | :owner | false
true | true | :enabled | false | :developer | false
true | true | :enabled | false | :maintainer | false
true | true | :enabled | false | :owner | false
# With ADO disabled scenarios
true | false | :disabled | true | :developer | false
true | false | :disabled | true | :maintainer | false
true | false | :disabled | true | :owner | false
true | false | :disabled | false | :developer | false
true | false | :disabled | false | :maintainer | false
true | false | :disabled | false | :owner | false
true | false | :enabled | true | :developer | false
true | false | :enabled | true | :maintainer | false
true | false | :enabled | true | :owner | false
true | false | :enabled | false | :developer | false
true | false | :enabled | false | :maintainer | false
true | false | :enabled | false | :owner | false
end
def grant_user_access ( project , user , access )
case access
when :developer , :maintainer
project . add_user ( user , access )
when :owner
2020-10-24 23:57:45 +05:30
project . namespace . update! ( owner : user )
2019-02-15 15:39:39 +05:30
end
end
with_them do
let ( :project ) do
if project_setting . nil?
2021-01-03 14:25:43 +05:30
project_with_repo
2019-02-15 15:39:39 +05:30
else
2021-01-03 14:25:43 +05:30
project_with_auto_devops
2019-02-15 15:39:39 +05:30
end
end
before do
stub_application_setting ( auto_devops_enabled : global_setting )
allow_any_instance_of ( Repository ) . to receive ( :gitlab_ci_yml ) . and_return ( gitlab_ci_yml )
grant_user_access ( project , user , user_access )
project . project_feature . update_attribute ( :builds_access_level , feature_visibilities [ builds_visibility ] )
project . auto_devops . update_attribute ( :enabled , project_setting ) unless project_setting . nil?
end
subject { helper . show_auto_devops_implicitly_enabled_banner? ( project , user ) }
it { is_expected . to eq ( result ) }
end
end
2019-09-04 21:01:54 +05:30
2021-10-27 15:23:28 +05:30
describe '#can_admin_project_member?' do
2021-03-11 19:13:27 +05:30
context 'when user is project owner' do
before do
allow ( helper ) . to receive ( :current_user ) { project . owner }
end
2019-09-04 21:01:54 +05:30
2021-03-11 19:13:27 +05:30
it 'returns true for owner of project' do
2021-10-27 15:23:28 +05:30
expect ( helper . can_admin_project_member? ( project ) ) . to eq true
2021-03-11 19:13:27 +05:30
end
2019-09-04 21:01:54 +05:30
end
2021-03-11 19:13:27 +05:30
context 'when user is not a project owner' do
using RSpec :: Parameterized :: TableSyntax
2021-10-27 15:23:28 +05:30
where ( :user_project_role , :can_admin ) do
2021-03-11 19:13:27 +05:30
:maintainer | true
:developer | false
:reporter | false
:guest | false
end
with_them do
before do
project . add_role ( user , user_project_role )
allow ( helper ) . to receive ( :current_user ) { user }
end
it 'resolves if the user can import members' do
2021-10-27 15:23:28 +05:30
expect ( helper . can_admin_project_member? ( project ) ) . to eq can_admin
2021-03-11 19:13:27 +05:30
end
end
2019-09-04 21:01:54 +05:30
end
end
describe '#metrics_external_dashboard_url' do
context 'metrics_setting exists' do
it 'returns external_dashboard_url' do
metrics_setting = create ( :project_metrics_setting , project : project )
expect ( helper . metrics_external_dashboard_url ) . to eq ( metrics_setting . external_dashboard_url )
end
end
context 'metrics_setting does not exist' do
it 'returns nil' do
expect ( helper . metrics_external_dashboard_url ) . to eq ( nil )
end
end
end
2019-12-21 20:55:43 +05:30
describe '#grafana_integration_url' do
subject { helper . grafana_integration_url }
it { is_expected . to eq ( nil ) }
context 'grafana integration exists' do
let! ( :grafana_integration ) { create ( :grafana_integration , project : project ) }
it { is_expected . to eq ( grafana_integration . grafana_url ) }
end
end
describe '#grafana_integration_token' do
2020-02-01 01:16:34 +05:30
subject { helper . grafana_integration_masked_token }
2019-12-21 20:55:43 +05:30
it { is_expected . to eq ( nil ) }
context 'grafana integration exists' do
let! ( :grafana_integration ) { create ( :grafana_integration , project : project ) }
2020-02-01 01:16:34 +05:30
it { is_expected . to eq ( grafana_integration . masked_token ) }
2019-12-21 20:55:43 +05:30
end
end
2019-12-26 22:10:19 +05:30
describe '#grafana_integration_enabled?' do
subject { helper . grafana_integration_enabled? }
it { is_expected . to eq ( nil ) }
context 'grafana integration exists' do
let! ( :grafana_integration ) { create ( :grafana_integration , project : project ) }
it { is_expected . to eq ( grafana_integration . enabled ) }
end
end
2020-04-08 14:13:33 +05:30
2020-07-28 23:09:34 +05:30
describe '#project_license_name(project)' , :request_store do
2020-04-08 14:13:33 +05:30
let_it_be ( :repository ) { project . repository }
subject { project_license_name ( project ) }
2020-07-28 23:09:34 +05:30
def license_name
project_license_name ( project )
end
2020-04-08 14:13:33 +05:30
context 'gitaly is working appropriately' do
2020-07-28 23:09:34 +05:30
let ( :license ) { Licensee :: License . new ( 'mit' ) }
2020-04-08 14:13:33 +05:30
2020-07-28 23:09:34 +05:30
before do
expect ( repository ) . to receive ( :license ) . and_return ( license )
end
it 'returns the license name' do
2020-04-08 14:13:33 +05:30
expect ( subject ) . to eq ( license . name )
end
2020-07-28 23:09:34 +05:30
it 'memoizes the value' do
expect do
2 . times { expect ( license_name ) . to eq ( license . name ) }
end . to change { Gitlab :: GitalyClient . get_request_count } . by_at_most ( 1 )
end
2020-04-08 14:13:33 +05:30
end
context 'gitaly is unreachable' do
shared_examples 'returns nil and tracks exception' do
it { is_expected . to be_nil }
it 'tracks the exception' do
expect ( Gitlab :: ErrorTracking ) . to receive ( :track_exception ) . with (
an_instance_of ( exception )
)
subject
end
2020-07-28 23:09:34 +05:30
it 'memoizes the nil value' do
expect do
2 . times { expect ( license_name ) . to be_nil }
end . to change { Gitlab :: GitalyClient . get_request_count } . by_at_most ( 1 )
end
2020-04-08 14:13:33 +05:30
end
before do
2020-07-28 23:09:34 +05:30
expect ( repository ) . to receive ( :license ) . and_raise ( exception )
2020-04-08 14:13:33 +05:30
end
context " Gitlab::Git::CommandError " do
let ( :exception ) { Gitlab :: Git :: CommandError }
it_behaves_like 'returns nil and tracks exception'
end
context " GRPC::Unavailable " do
let ( :exception ) { GRPC :: Unavailable }
it_behaves_like 'returns nil and tracks exception'
end
context " GRPC::DeadlineExceeded " do
let ( :exception ) { GRPC :: DeadlineExceeded }
it_behaves_like 'returns nil and tracks exception'
end
end
end
2021-01-29 00:20:46 +05:30
2021-09-30 23:02:18 +05:30
describe '#show_terraform_banner?' do
let_it_be ( :ruby ) { create ( :programming_language , name : 'Ruby' ) }
let_it_be ( :hcl ) { create ( :programming_language , name : 'HCL' ) }
subject { helper . show_terraform_banner? ( project ) }
before do
create ( :repository_language , project : project , programming_language : language , share : 1 )
end
context 'the project does not contain terraform files' do
let ( :language ) { ruby }
it { is_expected . to be_falsey }
end
context 'the project contains terraform files' do
let ( :language ) { hcl }
it { is_expected . to be_truthy }
context 'the project already has a terraform state' do
before do
create ( :terraform_state , project : project )
end
it { is_expected . to be_falsey }
end
2021-11-18 22:05:49 +05:30
context 'the :show_terraform_banner feature flag is disabled' do
before do
stub_feature_flags ( show_terraform_banner : false )
end
it { is_expected . to be_falsey }
end
2021-09-30 23:02:18 +05:30
end
end
2021-01-29 00:20:46 +05:30
describe '#project_title' do
subject { helper . project_title ( project ) }
it 'enqueues the elements in the breadcrumb schema list' do
expect ( helper ) . to receive ( :push_to_schema_breadcrumb ) . with ( project . namespace . name , user_path ( project . owner ) )
expect ( helper ) . to receive ( :push_to_schema_breadcrumb ) . with ( project . name , project_path ( project ) )
subject
end
end
2021-02-22 17:27:13 +05:30
2021-10-27 15:23:28 +05:30
describe '#project_permissions_panel_data' do
subject { helper . project_permissions_panel_data ( project ) }
2021-02-22 17:27:13 +05:30
2021-10-27 15:23:28 +05:30
before do
allow ( helper ) . to receive ( :can? ) { true }
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
2021-02-22 17:27:13 +05:30
end
2021-10-27 15:23:28 +05:30
it 'includes project_permissions_settings' do
settings = subject . dig ( :currentSettings )
expect ( settings ) . to include (
packagesEnabled : ! ! project . packages_enabled ,
visibilityLevel : project . visibility_level ,
requestAccessEnabled : ! ! project . request_access_enabled ,
issuesAccessLevel : project . project_feature . issues_access_level ,
repositoryAccessLevel : project . project_feature . repository_access_level ,
forkingAccessLevel : project . project_feature . forking_access_level ,
mergeRequestsAccessLevel : project . project_feature . merge_requests_access_level ,
buildsAccessLevel : project . project_feature . builds_access_level ,
wikiAccessLevel : project . project_feature . wiki_access_level ,
snippetsAccessLevel : project . project_feature . snippets_access_level ,
pagesAccessLevel : project . project_feature . pages_access_level ,
analyticsAccessLevel : project . project_feature . analytics_access_level ,
containerRegistryEnabled : ! ! project . container_registry_enabled ,
lfsEnabled : ! ! project . lfs_enabled ,
emailsDisabled : project . emails_disabled? ,
metricsDashboardAccessLevel : project . project_feature . metrics_dashboard_access_level ,
operationsAccessLevel : project . project_feature . operations_access_level ,
showDefaultAwardEmojis : project . show_default_award_emojis? ,
securityAndComplianceAccessLevel : project . security_and_compliance_access_level ,
containerRegistryAccessLevel : project . project_feature . container_registry_access_level
)
2021-02-22 17:27:13 +05:30
end
end
2021-10-29 20:43:33 +05:30
describe '#project_classes' do
subject { helper . project_classes ( project ) }
it { is_expected . to be_a ( String ) }
context 'PUC highlighting enabled' do
before do
project . warn_about_potentially_unwanted_characters = true
end
it { is_expected . to include ( 'project-highlight-puc' ) }
end
context 'PUC highlighting disabled' do
before do
project . warn_about_potentially_unwanted_characters = false
end
it { is_expected . not_to include ( 'project-highlight-puc' ) }
end
end
2021-12-11 22:18:48 +05:30
describe " # delete_confirm_phrase " do
subject { helper . delete_confirm_phrase ( project ) }
it 'includes the project path with namespace' do
expect ( subject ) . to eq ( project . path_with_namespace )
end
end
2022-01-26 12:08:38 +05:30
2022-06-21 17:19:12 +05:30
context 'fork security helpers' do
using RSpec :: Parameterized :: TableSyntax
describe " # able_to_see_merge_requests? " do
subject { helper . able_to_see_merge_requests? ( project , user ) }
where ( :can_read_merge_request , :merge_requests_enabled , :expected ) do
false | false | false
true | false | false
false | true | false
true | true | true
end
with_them do
before do
allow ( project ) . to receive ( :merge_requests_enabled? ) . and_return ( merge_requests_enabled )
allow ( helper ) . to receive ( :can? ) . with ( user , :read_merge_request , project ) . and_return ( can_read_merge_request )
end
it 'returns the correct response' do
expect ( subject ) . to eq ( expected )
end
end
end
describe " # able_to_see_issues? " do
subject { helper . able_to_see_issues? ( project , user ) }
where ( :can_read_issues , :issues_enabled , :expected ) do
false | false | false
true | false | false
false | true | false
true | true | true
end
with_them do
before do
allow ( project ) . to receive ( :issues_enabled? ) . and_return ( issues_enabled )
allow ( helper ) . to receive ( :can? ) . with ( user , :read_issue , project ) . and_return ( can_read_issues )
end
it 'returns the correct response' do
expect ( subject ) . to eq ( expected )
end
end
end
end
2022-01-26 12:08:38 +05:30
describe '#fork_button_disabled_tooltip' do
using RSpec :: Parameterized :: TableSyntax
subject { helper . fork_button_disabled_tooltip ( project ) }
where ( :has_user , :can_fork_project , :can_create_fork , :expected ) do
false | false | false | nil
true | true | true | nil
true | false | true | 'You don\'t have permission to fork this project'
true | true | false | 'You have reached your project limit'
end
with_them do
before do
current_user = user if has_user
allow ( helper ) . to receive ( :current_user ) . and_return ( current_user )
allow ( user ) . to receive ( :can? ) . with ( :fork_project , project ) . and_return ( can_fork_project )
allow ( user ) . to receive ( :can? ) . with ( :create_fork ) . and_return ( can_create_fork )
end
it 'returns tooltip text when user lacks privilege' do
expect ( subject ) . to eq ( expected )
end
end
end
2022-04-04 11:22:00 +05:30
2022-05-07 20:08:51 +05:30
shared_examples 'configure import method modal' do
2022-04-04 11:22:00 +05:30
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( user )
end
context 'as a user' do
it 'returns a link to contact an administrator' do
allow ( user ) . to receive ( :admin? ) . and_return ( false )
2022-05-07 20:08:51 +05:30
expect ( subject ) . to have_text ( " To enable importing projects from #{ import_method } , ask your GitLab administrator to configure OAuth integration " )
2022-04-04 11:22:00 +05:30
end
end
context 'as an administrator' do
it 'returns a link to configure bitbucket' do
allow ( user ) . to receive ( :admin? ) . and_return ( true )
2022-05-07 20:08:51 +05:30
expect ( subject ) . to have_text ( " To enable importing projects from #{ import_method } , as administrator you need to configure OAuth integration " )
2022-04-04 11:22:00 +05:30
end
end
end
2022-05-07 20:08:51 +05:30
describe '#import_from_bitbucket_message' do
let ( :import_method ) { 'Bitbucket' }
subject { helper . import_from_bitbucket_message }
it_behaves_like 'configure import method modal'
end
describe '#import_from_gitlab_message' do
let ( :import_method ) { 'GitLab.com' }
subject { helper . import_from_gitlab_message }
it_behaves_like 'configure import method modal'
end
2022-07-23 23:45:48 +05:30
describe '#show_inactive_project_deletion_banner?' do
shared_examples 'does not show the banner' do | pass_project : true |
it { expect ( helper . show_inactive_project_deletion_banner? ( pass_project ? project : nil ) ) . to be ( false ) }
end
context 'with no project' do
it_behaves_like 'does not show the banner' , pass_project : false
end
context 'with unsaved project' do
let_it_be ( :project ) { build ( :project ) }
it_behaves_like 'does not show the banner'
end
context 'with the setting disabled' do
before do
stub_application_setting ( delete_inactive_projects : false )
end
it_behaves_like 'does not show the banner'
end
context 'with the setting enabled' do
before do
stub_application_setting ( delete_inactive_projects : true )
end
context 'with the feature flag disabled' do
before do
stub_feature_flags ( inactive_projects_deletion : false )
end
it_behaves_like 'does not show the banner'
end
context 'with the feature flag enabled' do
before do
stub_feature_flags ( inactive_projects_deletion : true )
stub_application_setting ( inactive_projects_min_size_mb : 0 )
stub_application_setting ( inactive_projects_send_warning_email_after_months : 1 )
end
context 'with an active project' do
it_behaves_like 'does not show the banner'
end
context 'with an inactive project' do
before do
project . statistics . storage_size = 1 . megabyte
project . last_activity_at = 1 . year . ago
project . save!
end
it 'shows the banner' do
expect ( helper . show_inactive_project_deletion_banner? ( project ) ) . to be ( true )
end
end
end
end
end
describe '#inactive_project_deletion_date' do
let ( :tracker ) { instance_double ( :: Gitlab :: InactiveProjectsDeletionWarningTracker ) }
before do
stub_application_setting ( inactive_projects_delete_after_months : 2 )
stub_application_setting ( inactive_projects_send_warning_email_after_months : 1 )
allow ( :: Gitlab :: InactiveProjectsDeletionWarningTracker ) . to receive ( :new ) . with ( project . id ) . and_return ( tracker )
allow ( tracker ) . to receive ( :scheduled_deletion_date ) . and_return ( '2022-03-01' )
end
it 'returns the deletion date' do
expect ( helper . inactive_project_deletion_date ( project ) ) . to eq ( '2022-03-01' )
end
end
describe '#can_admin_associated_clusters?' do
let_it_be ( :current_user ) { create ( :user ) }
let_it_be_with_reload ( :project ) { create ( :project ) }
subject { helper . send ( :can_admin_associated_clusters? , project ) }
before do
allow ( helper ) . to receive ( :current_user ) . and_return ( current_user )
allow ( helper )
. to receive ( :can? )
. with ( current_user , :admin_cluster , namespace )
. and_return ( user_can_admin_cluster )
end
context 'when project has a cluster' do
let_it_be ( :namespace ) { project }
before do
create ( :cluster , projects : [ namespace ] )
end
context 'if user can admin cluster' do
let_it_be ( :user_can_admin_cluster ) { true }
it { is_expected . to be_truthy }
end
context 'if user can not admin cluster' do
let_it_be ( :user_can_admin_cluster ) { false }
it { is_expected . to be_falsey }
end
end
context 'when project has a group cluster' do
let_it_be ( :namespace ) { create ( :group ) }
before do
project . update! ( namespace : namespace )
create ( :cluster , :group , groups : [ namespace ] )
end
context 'if user can admin cluster' do
let_it_be ( :user_can_admin_cluster ) { true }
it { is_expected . to be_truthy }
end
context 'if user can not admin cluster' do
let_it_be ( :user_can_admin_cluster ) { false }
it { is_expected . to be_falsey }
end
end
context 'when project doesn\'t have a cluster' do
let_it_be ( :namespace ) { project }
context 'if user can admin cluster' do
let_it_be ( :user_can_admin_cluster ) { true }
it { is_expected . to be_falsey }
end
context 'if user can not admin cluster' do
let_it_be ( :user_can_admin_cluster ) { false }
it { is_expected . to be_falsey }
end
end
end
describe '#show_clusters_alert?' do
using RSpec :: Parameterized :: TableSyntax
subject { helper . show_clusters_alert? ( project ) }
where ( :is_gitlab_com , :user_can_admin_cluster , :expected ) do
false | false | false
false | true | false
true | false | false
true | true | true
end
with_them do
before do
allow ( :: Gitlab ) . to receive ( :com? ) . and_return ( is_gitlab_com )
allow ( helper ) . to receive ( :can_admin_associated_clusters? ) . and_return ( user_can_admin_cluster )
end
it { is_expected . to eq ( expected ) }
end
end
describe '#clusters_deprecation_alert_message' do
subject { helper . clusters_deprecation_alert_message }
before do
allow ( helper ) . to receive ( :has_active_license? ) . and_return ( has_active_license )
end
context 'if user has an active licence' do
let_it_be ( :has_active_license ) { true }
it 'displays the correct messagee' do
expect ( subject ) . to eq ( s_ ( 'Clusters|The certificate-based Kubernetes integration has been deprecated and will be turned off at the end of November 2022. Please %{linkStart}migrate to the GitLab agent for Kubernetes%{linkEnd} or reach out to GitLab support.' ) )
end
end
context 'if user doesn\'t have an active licence' do
let_it_be ( :has_active_license ) { false }
it 'displays the correct message' do
expect ( subject ) . to eq ( s_ ( 'Clusters|The certificate-based Kubernetes integration has been deprecated and will be turned off at the end of November 2022. Please %{linkStart}migrate to the GitLab agent for Kubernetes%{linkEnd}.' ) )
end
end
end
2014-09-02 18:07:02 +05:30
end