debian-mirror-gitlab/spec/presenters/ci/pipeline_presenter_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

400 lines
12 KiB
Ruby
Raw Normal View History

2019-12-26 22:10:19 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Ci::PipelinePresenter do
2019-07-07 11:18:12 +05:30
include Gitlab::Routing
2021-01-03 14:25:43 +05:30
let_it_be(:user) { create(:user) }
let_it_be_with_reload(:project) { create(:project, :test_repo) }
let_it_be_with_reload(:pipeline) { create(:ci_pipeline, project: project) }
2021-06-08 01:23:25 +05:30
2020-03-07 23:17:34 +05:30
let(:current_user) { user }
2017-08-17 22:00:37 +05:30
subject(:presenter) do
described_class.new(pipeline)
end
2021-01-03 14:25:43 +05:30
before_all do
2019-07-07 11:18:12 +05:30
project.add_developer(user)
2021-01-03 14:25:43 +05:30
end
before do
2020-03-07 23:17:34 +05:30
allow(presenter).to receive(:current_user) { current_user }
2019-07-07 11:18:12 +05:30
end
2017-08-17 22:00:37 +05:30
it 'inherits from Gitlab::View::Presenter::Delegated' do
expect(described_class.superclass).to eq(Gitlab::View::Presenter::Delegated)
end
describe '#initialize' do
it 'takes a pipeline and optional params' do
expect { presenter }.not_to raise_error
end
it 'exposes pipeline' do
expect(presenter.pipeline).to eq(pipeline)
end
it 'forwards missing methods to pipeline' do
expect(presenter.ref).to eq(pipeline.ref)
end
end
describe '#status_title' do
context 'when pipeline is auto-canceled' do
before do
expect(pipeline).to receive(:auto_canceled?).and_return(true)
expect(pipeline).to receive(:auto_canceled_by_id).and_return(1)
end
it 'shows that the pipeline is auto-canceled' do
status_title = presenter.status_title
expect(status_title).to include('auto-canceled')
expect(status_title).to include('Pipeline #1')
end
end
context 'when pipeline is not auto-canceled' do
before do
expect(pipeline).to receive(:auto_canceled?).and_return(false)
end
it 'does not have a status title' do
expect(presenter.status_title).to be_nil
end
end
end
2018-03-17 18:26:18 +05:30
2020-01-01 13:55:28 +05:30
describe '#failure_reason' do
context 'when pipeline has a failure reason' do
2020-11-24 15:15:51 +05:30
Enums::Ci::Pipeline.failure_reasons.keys.each do |failure_reason|
2020-01-01 13:55:28 +05:30
context "when failure reason is #{failure_reason}" do
before do
pipeline.failure_reason = failure_reason
end
it 'represents a failure reason sentence' do
expect(presenter.failure_reason).to be_an_instance_of(String)
expect(presenter.failure_reason).not_to eq(failure_reason.to_s)
end
end
2018-03-17 18:26:18 +05:30
end
end
context 'when pipeline does not have failure reason' do
it 'returns nil' do
expect(presenter.failure_reason).to be_nil
end
end
end
2019-07-07 11:18:12 +05:30
2019-12-04 20:38:33 +05:30
describe '#name' do
2020-04-22 19:07:51 +05:30
before do
allow(pipeline).to receive(:merge_request_event_type) { event_type }
end
2019-12-04 20:38:33 +05:30
subject { presenter.name }
2020-04-22 19:07:51 +05:30
context 'for a detached merge request pipeline' do
let(:event_type) { :detached }
2019-12-04 20:38:33 +05:30
it { is_expected.to eq('Detached merge request pipeline') }
end
2020-04-22 19:07:51 +05:30
context 'for a merged result pipeline' do
let(:event_type) { :merged_result }
2019-12-04 20:38:33 +05:30
it { is_expected.to eq('Merged result pipeline') }
end
2020-04-22 19:07:51 +05:30
context 'for a merge train pipeline' do
let(:event_type) { :merge_train }
2019-12-04 20:38:33 +05:30
it { is_expected.to eq('Merge train pipeline') }
end
context 'when pipeline is branch pipeline' do
2020-04-22 19:07:51 +05:30
let(:event_type) { nil }
2019-12-04 20:38:33 +05:30
it { is_expected.to eq('Pipeline') }
end
end
2022-01-26 12:08:38 +05:30
describe '#coverage' do
subject { presenter.coverage }
context 'when pipeline has coverage' do
before do
allow(pipeline).to receive(:coverage).and_return(35.0)
end
it 'formats coverage into 2 decimal points' do
expect(subject).to eq('35.00')
end
end
context 'when pipeline does not have coverage' do
before do
allow(pipeline).to receive(:coverage).and_return(nil)
end
it 'returns nil' do
expect(subject).to be_nil
end
end
end
2019-07-07 11:18:12 +05:30
describe '#ref_text' do
subject { presenter.ref_text }
context 'when pipeline is detached merge request pipeline' do
let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline) }
let(:pipeline) { merge_request.all_pipelines.last }
it 'returns a correct ref text' do
is_expected.to eq("for <a class=\"mr-iid\" href=\"#{project_merge_request_path(merge_request.project, merge_request)}\">#{merge_request.to_reference}</a> " \
"with <a class=\"ref-name\" href=\"#{project_commits_path(merge_request.source_project, merge_request.source_branch)}\">#{merge_request.source_branch}</a>")
end
end
context 'when pipeline is merge request pipeline' do
let(:merge_request) { create(:merge_request, :with_merge_request_pipeline) }
let(:pipeline) { merge_request.all_pipelines.last }
it 'returns a correct ref text' do
is_expected.to eq("for <a class=\"mr-iid\" href=\"#{project_merge_request_path(merge_request.project, merge_request)}\">#{merge_request.to_reference}</a> " \
"with <a class=\"ref-name\" href=\"#{project_commits_path(merge_request.source_project, merge_request.source_branch)}\">#{merge_request.source_branch}</a> " \
"into <a class=\"ref-name\" href=\"#{project_commits_path(merge_request.target_project, merge_request.target_branch)}\">#{merge_request.target_branch}</a>")
end
end
context 'when pipeline is branch pipeline' do
context 'when ref exists in the repository' do
before do
allow(pipeline).to receive(:ref_exists?) { true }
end
it 'returns a correct ref text' do
is_expected.to eq("for <a class=\"ref-name\" href=\"#{project_commits_path(pipeline.project, pipeline.ref)}\">#{pipeline.ref}</a>")
end
context 'when ref contains malicious script' do
let(:pipeline) { create(:ci_pipeline, ref: "<script>alter('1')</script>", project: project) }
it 'does not include the malicious script' do
is_expected.not_to include("<script>alter('1')</script>")
end
end
end
2020-04-22 19:07:51 +05:30
context 'when ref does not exist in the repository' do
2019-07-07 11:18:12 +05:30
before do
allow(pipeline).to receive(:ref_exists?) { false }
end
it 'returns a correct ref text' do
is_expected.to eq("for <span class=\"ref-name\">#{pipeline.ref}</span>")
end
context 'when ref contains malicious script' do
let(:pipeline) { create(:ci_pipeline, ref: "<script>alter('1')</script>", project: project) }
it 'does not include the malicious script' do
is_expected.not_to include("<script>alter('1')</script>")
end
end
end
end
end
2019-12-21 20:55:43 +05:30
describe '#all_related_merge_request_text' do
subject { presenter.all_related_merge_request_text }
2021-01-03 14:25:43 +05:30
let_it_be(:mr_1) { create(:merge_request) }
let_it_be(:mr_2) { create(:merge_request) }
2020-04-22 19:07:51 +05:30
2019-12-21 20:55:43 +05:30
context 'with zero related merge requests (branch pipeline)' do
it { is_expected.to eq('No related merge requests found.') }
end
context 'with one related merge request' do
2020-04-22 19:07:51 +05:30
before do
allow(pipeline).to receive(:all_merge_requests).and_return(MergeRequest.where(id: mr_1.id))
end
2019-12-21 20:55:43 +05:30
it {
is_expected.to eq("1 related merge request: " \
"<a class=\"mr-iid\" href=\"#{merge_request_path(mr_1)}\">#{mr_1.to_reference} #{mr_1.title}</a>")
}
end
context 'with two related merge requests' do
2020-04-22 19:07:51 +05:30
before do
allow(pipeline).to receive(:all_merge_requests).and_return(MergeRequest.where(id: [mr_1.id, mr_2.id]))
end
2019-12-21 20:55:43 +05:30
it {
is_expected.to eq("2 related merge requests: " \
"<a class=\"mr-iid\" href=\"#{merge_request_path(mr_2)}\">#{mr_2.to_reference} #{mr_2.title}</a>, " \
"<a class=\"mr-iid\" href=\"#{merge_request_path(mr_1)}\">#{mr_1.to_reference} #{mr_1.title}</a>")
}
2020-03-13 15:44:24 +05:30
context 'with a limit passed' do
subject { presenter.all_related_merge_request_text(limit: 1) }
it {
is_expected.to eq("2 related merge requests: " \
"<a class=\"mr-iid\" href=\"#{merge_request_path(mr_2)}\">#{mr_2.to_reference} #{mr_2.title}</a>")
}
end
2019-12-21 20:55:43 +05:30
end
end
describe '#all_related_merge_requests' do
2020-04-22 19:07:51 +05:30
subject(:all_related_merge_requests) do
presenter.send(:all_related_merge_requests)
end
2019-12-21 20:55:43 +05:30
it 'memoizes the returned relation' do
2020-04-22 19:07:51 +05:30
expect(pipeline).to receive(:all_merge_requests_by_recency).exactly(1).time.and_call_original
2.times { presenter.send(:all_related_merge_requests).count }
end
context 'for a branch pipeline with two open MRs' do
let!(:one) { create(:merge_request, source_project: project, source_branch: pipeline.ref) }
let!(:two) { create(:merge_request, source_project: project, source_branch: pipeline.ref, target_branch: 'fix') }
2019-12-21 20:55:43 +05:30
2020-04-22 19:07:51 +05:30
it { is_expected.to contain_exactly(one, two) }
2020-03-07 23:17:34 +05:30
end
context 'permissions' do
2021-01-03 14:25:43 +05:30
let_it_be_with_refind(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) }
2021-06-08 01:23:25 +05:30
2020-04-22 19:07:51 +05:30
let(:pipeline) { merge_request.all_pipelines.take }
2020-03-07 23:17:34 +05:30
shared_examples 'private merge requests' do
context 'when not logged in' do
let(:current_user) {}
it { is_expected.to be_empty }
end
context 'when logged in as a non_member' do
let(:current_user) { create(:user) }
it { is_expected.to be_empty }
end
context 'when logged in as a guest' do
let(:current_user) { create(:user) }
before do
project.add_guest(current_user)
end
it { is_expected.to be_empty }
end
context 'when logged in as a developer' do
it { is_expected.to contain_exactly(merge_request) }
end
context 'when logged in as a maintainer' do
let(:current_user) { create(:user) }
before do
project.add_maintainer(current_user)
end
it { is_expected.to contain_exactly(merge_request) }
end
end
context 'with a private project' do
it_behaves_like 'private merge requests'
end
context 'with a public project with private merge requests' do
before do
project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
project
.project_feature
.update!(merge_requests_access_level: ProjectFeature::PRIVATE)
end
it_behaves_like 'private merge requests'
end
context 'with a public project with public merge requests' do
before do
project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
project
.project_feature
.update!(merge_requests_access_level: ProjectFeature::ENABLED)
end
context 'when not logged in' do
let(:current_user) {}
it { is_expected.to contain_exactly(merge_request) }
end
end
2019-12-21 20:55:43 +05:30
end
end
2019-07-07 11:18:12 +05:30
describe '#link_to_merge_request' do
subject { presenter.link_to_merge_request }
2020-04-22 19:07:51 +05:30
context 'with a related merge request' do
let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) }
let(:pipeline) { merge_request.all_pipelines.take }
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
it 'returns a correct link' do
is_expected.to include(project_merge_request_path(project, merge_request))
end
2019-07-07 11:18:12 +05:30
end
context 'when pipeline is branch pipeline' do
2020-04-22 19:07:51 +05:30
it { is_expected.to be_nil }
2019-07-07 11:18:12 +05:30
end
end
describe '#link_to_merge_request_source_branch' do
subject { presenter.link_to_merge_request_source_branch }
2020-04-22 19:07:51 +05:30
context 'with a related merge request' do
let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) }
let(:pipeline) { merge_request.all_pipelines.take }
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
it 'returns a correct link' do
is_expected.to include(project_commits_path(project, merge_request.source_branch))
end
2019-07-07 11:18:12 +05:30
end
context 'when pipeline is branch pipeline' do
2020-04-22 19:07:51 +05:30
it { is_expected.to be_nil }
2019-07-07 11:18:12 +05:30
end
end
describe '#link_to_merge_request_target_branch' do
subject { presenter.link_to_merge_request_target_branch }
2020-04-22 19:07:51 +05:30
context 'with a related merge request' do
let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) }
let(:pipeline) { merge_request.all_pipelines.take }
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
it 'returns a correct link' do
is_expected.to include(project_commits_path(project, merge_request.target_branch))
end
2019-07-07 11:18:12 +05:30
end
context 'when pipeline is branch pipeline' do
2020-04-22 19:07:51 +05:30
it { is_expected.to be_nil }
2019-07-07 11:18:12 +05:30
end
end
2017-08-17 22:00:37 +05:30
end