debian-mirror-gitlab/spec/lib/sidebars/projects/menus/infrastructure_menu_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

172 lines
5 KiB
Ruby
Raw Normal View History

2021-09-30 23:02:18 +05:30
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Sidebars::Projects::Menus::InfrastructureMenu do
let(:project) { build(:project) }
2022-04-04 11:22:00 +05:30
let(:user) { project.first_owner }
2021-09-30 23:02:18 +05:30
let(:context) { Sidebars::Projects::Context.new(current_user: user, container: project, show_cluster_hint: false) }
describe '#render?' do
subject { described_class.new(context) }
context 'when menu does not have any menu items' do
it 'returns false' do
allow(subject).to receive(:has_renderable_items?).and_return(false)
expect(subject.render?).to be false
end
end
context 'when menu has menu items' do
it 'returns true' do
expect(subject.render?).to be true
end
end
2023-01-13 00:05:48 +05:30
describe 'behavior based on access level setting' do
using RSpec::Parameterized::TableSyntax
let_it_be(:project) { create(:project) }
let(:enabled) { Featurable::PRIVATE }
let(:disabled) { Featurable::DISABLED }
where(:operations_access_level, :infrastructure_access_level, :render) do
ref(:disabled) | ref(:enabled) | true
ref(:disabled) | ref(:disabled) | false
ref(:enabled) | ref(:enabled) | true
ref(:enabled) | ref(:disabled) | false
end
with_them do
it 'renders based on the infrastructure access level' do
project.project_feature.update!(operations_access_level: operations_access_level)
project.project_feature.update!(infrastructure_access_level: infrastructure_access_level)
expect(subject.render?).to be render
end
end
context 'when `split_operations_visibility_permissions` feature flag is disabled' do
before do
stub_feature_flags(split_operations_visibility_permissions: false)
end
where(:operations_access_level, :infrastructure_access_level, :render) do
ref(:disabled) | ref(:enabled) | false
ref(:disabled) | ref(:disabled) | false
ref(:enabled) | ref(:enabled) | true
ref(:enabled) | ref(:disabled) | true
end
with_them do
it 'renders based on the operations access level' do
project.project_feature.update!(operations_access_level: operations_access_level)
project.project_feature.update!(infrastructure_access_level: infrastructure_access_level)
expect(subject.render?).to be render
end
end
end
end
2021-09-30 23:02:18 +05:30
end
describe '#link' do
subject { described_class.new(context) }
context 'when Kubernetes menu item is visible' do
it 'menu link points to Kubernetes page' do
expect(subject.link).to eq find_menu_item(:kubernetes).link
end
end
context 'when Kubernetes menu item is not visible' do
before do
subject.renderable_items.delete(find_menu_item(:kubernetes))
end
2022-07-16 23:28:13 +05:30
it 'menu link points to Terraform page' do
expect(subject.link).to eq find_menu_item(:terraform).link
2021-09-30 23:02:18 +05:30
end
2022-07-16 23:28:13 +05:30
context 'when Terraform menu is not visible' do
2021-09-30 23:02:18 +05:30
before do
2022-07-16 23:28:13 +05:30
subject.renderable_items.delete(find_menu_item(:terraform))
2021-09-30 23:02:18 +05:30
end
2022-07-16 23:28:13 +05:30
it 'menu link points to Google Cloud page' do
expect(subject.link).to eq find_menu_item(:google_cloud).link
2021-12-11 22:18:48 +05:30
end
2021-09-30 23:02:18 +05:30
end
end
def find_menu_item(menu_item)
subject.renderable_items.find { |i| i.item_id == menu_item }
end
end
describe 'Menu Items' do
subject { described_class.new(context).renderable_items.index { |e| e.item_id == item_id } }
shared_examples 'access rights checks' do
specify { is_expected.not_to be_nil }
describe 'when the user does not have access' do
let(:user) { nil }
specify { is_expected.to be_nil }
end
end
describe 'Kubernetes' do
let(:item_id) { :kubernetes }
it_behaves_like 'access rights checks'
end
describe 'Terraform' do
let(:item_id) { :terraform }
it_behaves_like 'access rights checks'
end
2021-12-11 22:18:48 +05:30
describe 'Google Cloud' do
let(:item_id) { :google_cloud }
it_behaves_like 'access rights checks'
2022-06-21 17:19:12 +05:30
context 'when feature flag is turned off globally' do
before do
stub_feature_flags(incubation_5mp_google_cloud: false)
end
it { is_expected.to be_nil }
context 'when feature flag is enabled for specific project' do
before do
stub_feature_flags(incubation_5mp_google_cloud: project)
end
it_behaves_like 'access rights checks'
end
context 'when feature flag is enabled for specific group' do
before do
stub_feature_flags(incubation_5mp_google_cloud: project.group)
end
it_behaves_like 'access rights checks'
end
context 'when feature flag is enabled for specific project' do
before do
stub_feature_flags(incubation_5mp_google_cloud: user)
end
it_behaves_like 'access rights checks'
end
end
2021-12-11 22:18:48 +05:30
end
2021-09-30 23:02:18 +05:30
end
end