debian-mirror-gitlab/spec/helpers/users/callouts_helper_spec.rb

226 lines
7.3 KiB
Ruby
Raw Normal View History

2019-12-21 20:55:43 +05:30
# frozen_string_literal: true
2018-03-17 18:26:18 +05:30
require "spec_helper"
2022-01-26 12:08:38 +05:30
RSpec.describe Users::CalloutsHelper do
2021-11-11 11:23:49 +05:30
let_it_be(:user, refind: true) { create(:user) }
2018-03-17 18:26:18 +05:30
before do
allow(helper).to receive(:current_user).and_return(user)
end
describe '.show_gke_cluster_integration_callout?' do
2020-07-28 23:09:34 +05:30
let_it_be(:project) { create(:project) }
2018-03-17 18:26:18 +05:30
subject { helper.show_gke_cluster_integration_callout?(project) }
context 'when user can create a cluster' do
before do
allow(helper).to receive(:can?).with(anything, :create_cluster, anything)
.and_return(true)
end
context 'when user has not dismissed' do
before do
allow(helper).to receive(:user_dismissed?).and_return(false)
end
2020-10-24 23:57:45 +05:30
context 'when active_nav_link is in the operations section' do
before do
allow(helper).to receive(:active_nav_link?).and_return(true)
end
it { is_expected.to be true }
end
context 'when active_nav_link is not in the operations section' do
before do
allow(helper).to receive(:active_nav_link?).and_return(false)
end
it { is_expected.to be false }
end
2018-03-17 18:26:18 +05:30
end
context 'when user dismissed' do
before do
allow(helper).to receive(:user_dismissed?).and_return(true)
end
it { is_expected.to be false }
end
end
context 'when user can not create a cluster' do
before do
allow(helper).to receive(:can?).with(anything, :create_cluster, anything)
.and_return(false)
end
it { is_expected.to be false }
end
end
2019-02-15 15:39:39 +05:30
describe '.render_flash_user_callout' do
it 'renders the flash_user_callout partial' do
expect(helper).to receive(:render)
.with(/flash_user_callout/, flash_type: :warning, message: 'foo', feature_name: 'bar')
helper.render_flash_user_callout(:warning, 'foo', 'bar')
end
end
2021-01-03 14:25:43 +05:30
describe '.show_feature_flags_new_version?' do
subject { helper.show_feature_flags_new_version? }
let(:user) { create(:user) }
before do
allow(helper).to receive(:current_user).and_return(user)
end
context 'when the feature flags new version info has not been dismissed' do
it { is_expected.to be_truthy }
end
context 'when the feature flags new version has been dismissed' do
before do
2022-01-26 12:08:38 +05:30
create(:callout, user: user, feature_name: described_class::FEATURE_FLAGS_NEW_VERSION)
2021-01-03 14:25:43 +05:30
end
it { is_expected.to be_falsy }
end
end
2021-01-29 00:20:46 +05:30
describe '.show_registration_enabled_user_callout?' do
let_it_be(:admin) { create(:user, :admin) }
subject { helper.show_registration_enabled_user_callout? }
2021-02-22 17:27:13 +05:30
context 'when on gitlab.com' do
before do
allow(::Gitlab).to receive(:com?).and_return(true)
allow(helper).to receive(:current_user).and_return(admin)
stub_application_setting(signup_enabled: true)
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
2022-05-07 20:08:51 +05:30
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
2021-02-22 17:27:13 +05:30
end
it { is_expected.to be false }
end
2021-01-29 00:20:46 +05:30
context 'when `current_user` is not an admin' do
before do
2021-02-22 17:27:13 +05:30
allow(::Gitlab).to receive(:com?).and_return(false)
2021-01-29 00:20:46 +05:30
allow(helper).to receive(:current_user).and_return(user)
stub_application_setting(signup_enabled: true)
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
2022-05-07 20:08:51 +05:30
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
2021-01-29 00:20:46 +05:30
end
it { is_expected.to be false }
end
context 'when signup is disabled' do
before do
2021-02-22 17:27:13 +05:30
allow(::Gitlab).to receive(:com?).and_return(false)
2021-01-29 00:20:46 +05:30
allow(helper).to receive(:current_user).and_return(admin)
stub_application_setting(signup_enabled: false)
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
2022-05-07 20:08:51 +05:30
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
2021-01-29 00:20:46 +05:30
end
it { is_expected.to be false }
end
context 'when user has dismissed callout' do
before do
2021-02-22 17:27:13 +05:30
allow(::Gitlab).to receive(:com?).and_return(false)
2021-01-29 00:20:46 +05:30
allow(helper).to receive(:current_user).and_return(admin)
stub_application_setting(signup_enabled: true)
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { true }
2022-05-07 20:08:51 +05:30
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
2021-01-29 00:20:46 +05:30
end
it { is_expected.to be false }
end
2022-05-07 20:08:51 +05:30
context 'when controller path is not allowed' do
2021-01-29 00:20:46 +05:30
before do
2021-02-22 17:27:13 +05:30
allow(::Gitlab).to receive(:com?).and_return(false)
2021-01-29 00:20:46 +05:30
allow(helper).to receive(:current_user).and_return(admin)
stub_application_setting(signup_enabled: true)
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
2022-05-07 20:08:51 +05:30
allow(helper.controller).to receive(:controller_path).and_return("projects/issues")
end
it { is_expected.to be false }
end
context 'when not gitlab.com, `current_user` is an admin, signup is enabled, user has not dismissed callout, and controller path is allowed' do
before do
allow(::Gitlab).to receive(:com?).and_return(false)
allow(helper).to receive(:current_user).and_return(admin)
stub_application_setting(signup_enabled: true)
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
2021-01-29 00:20:46 +05:30
end
it { is_expected.to be true }
end
end
2021-03-11 19:13:27 +05:30
describe '.show_unfinished_tag_cleanup_callout?' do
subject { helper.show_unfinished_tag_cleanup_callout? }
before do
allow(helper).to receive(:user_dismissed?).with(described_class::UNFINISHED_TAG_CLEANUP_CALLOUT) { dismissed }
end
context 'when user has not dismissed' do
let(:dismissed) { false }
it { is_expected.to be true }
end
context 'when user dismissed' do
let(:dismissed) { true }
it { is_expected.to be false }
end
end
2021-11-11 11:23:49 +05:30
2021-11-18 22:05:49 +05:30
describe '.show_security_newsletter_user_callout?' do
let_it_be(:admin) { create(:user, :admin) }
subject { helper.show_security_newsletter_user_callout? }
context 'when `current_user` is not an admin' do
before do
allow(helper).to receive(:current_user).and_return(user)
allow(helper).to receive(:user_dismissed?).with(described_class::SECURITY_NEWSLETTER_CALLOUT) { false }
end
it { is_expected.to be false }
end
context 'when user has dismissed callout' do
before do
allow(helper).to receive(:current_user).and_return(admin)
allow(helper).to receive(:user_dismissed?).with(described_class::SECURITY_NEWSLETTER_CALLOUT) { true }
end
it { is_expected.to be false }
end
context 'when `current_user` is an admin and user has not dismissed callout' do
before do
allow(helper).to receive(:current_user).and_return(admin)
allow(helper).to receive(:user_dismissed?).with(described_class::SECURITY_NEWSLETTER_CALLOUT) { false }
end
it { is_expected.to be true }
end
end
2018-03-17 18:26:18 +05:30
end