2019-12-21 20:55:43 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe NamespacesHelper do
|
2017-08-17 22:00:37 +05:30
|
|
|
let!(:admin) { create(:admin) }
|
2019-07-07 11:18:12 +05:30
|
|
|
let!(:admin_project_creation_level) { nil }
|
|
|
|
let!(:admin_group) do
|
|
|
|
create(:group,
|
|
|
|
:private,
|
|
|
|
project_creation_level: admin_project_creation_level)
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
let!(:user) { create(:user) }
|
2019-07-07 11:18:12 +05:30
|
|
|
let!(:user_project_creation_level) { nil }
|
|
|
|
let!(:user_group) do
|
|
|
|
create(:group,
|
|
|
|
:private,
|
|
|
|
project_creation_level: user_project_creation_level)
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
let!(:subgroup1) do
|
|
|
|
create(:group,
|
|
|
|
:private,
|
|
|
|
parent: admin_group,
|
|
|
|
project_creation_level: nil)
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
let!(:subgroup2) do
|
|
|
|
create(:group,
|
|
|
|
:private,
|
|
|
|
parent: admin_group,
|
|
|
|
project_creation_level: ::Gitlab::Access::DEVELOPER_MAINTAINER_PROJECT_ACCESS)
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
let!(:subgroup3) do
|
|
|
|
create(:group,
|
|
|
|
:private,
|
|
|
|
parent: admin_group,
|
|
|
|
project_creation_level: ::Gitlab::Access::MAINTAINER_PROJECT_ACCESS)
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
before do
|
|
|
|
admin_group.add_owner(admin)
|
|
|
|
user_group.add_owner(user)
|
|
|
|
end
|
|
|
|
|
2022-01-26 12:08:38 +05:30
|
|
|
describe '#namespaces_as_json' do
|
|
|
|
let(:result) { helper.namespaces_as_json(user) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns the user\'s groups' do
|
|
|
|
json_data = Gitlab::Json.parse(result)
|
|
|
|
|
|
|
|
expect(result).to include('group')
|
|
|
|
expect(json_data['group']).to include(
|
|
|
|
"id" => user_group.id,
|
|
|
|
"name" => user_group.name,
|
|
|
|
"display_path" => user_group.full_path,
|
|
|
|
"human_name" => user_group.human_name
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns the user\'s namespace' do
|
|
|
|
user_namespace = user.namespace
|
|
|
|
json_data = Gitlab::Json.parse(result)
|
|
|
|
|
|
|
|
expect(result).to include('user')
|
|
|
|
expect(json_data['user']).to include(
|
|
|
|
"id" => user_namespace.id,
|
|
|
|
"name" => user_namespace.name,
|
|
|
|
"display_path" => user_namespace.full_path,
|
|
|
|
"human_name" => user_namespace.human_name
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
describe '#namespaces_options' do
|
2021-04-17 20:07:23 +05:30
|
|
|
context 'when admin mode is enabled', :enable_admin_mode do
|
|
|
|
it 'returns groups without being a member for admin' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
options = helper.namespaces_options(user_group.id, display_path: true, extra_group: user_group.id)
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
expect(options).to include(admin_group.name)
|
|
|
|
expect(options).to include(user_group.name)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
it 'returns only allowed namespaces for admin' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
|
|
|
|
|
|
options = helper.namespaces_options(user_group.id, display_path: true, extra_group: user_group.id)
|
|
|
|
|
|
|
|
expect(options).to include(admin_group.name)
|
|
|
|
expect(options).not_to include(user_group.name)
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns only allowed namespaces for user' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
|
|
|
|
|
|
options = helper.namespaces_options
|
|
|
|
|
|
|
|
expect(options).not_to include(admin_group.name)
|
|
|
|
expect(options).to include(user_group.name)
|
2018-11-18 11:00:15 +05:30
|
|
|
expect(options).to include(user.name)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'avoids duplicate groups when extra_group is used' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
|
|
|
|
|
|
options = helper.namespaces_options(user_group.id, display_path: true, extra_group: build(:group, name: admin_group.name))
|
|
|
|
|
|
|
|
expect(options.scan("data-name=\"#{admin_group.name}\"").count).to eq(1)
|
|
|
|
expect(options).to include(admin_group.name)
|
|
|
|
end
|
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
context 'when admin mode is disabled' do
|
|
|
|
it 'selects existing group' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
|
|
user_group.add_owner(admin)
|
2018-11-18 11:00:15 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
options = helper.namespaces_options(:extra_group, display_path: true, extra_group: user_group)
|
2018-11-18 11:00:15 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
expect(options).to include("selected=\"selected\" value=\"#{user_group.id}\"")
|
|
|
|
expect(options).to include(admin_group.name)
|
|
|
|
end
|
2018-11-18 11:00:15 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'selects the new group by default' do
|
2018-11-20 20:47:30 +05:30
|
|
|
# Ensure we don't select a group with the same name
|
|
|
|
create(:group, name: 'new-group', path: 'another-path')
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
|
|
|
2018-11-20 20:47:30 +05:30
|
|
|
options = helper.namespaces_options(:extra_group, display_path: true, extra_group: build(:group, name: 'new-group', path: 'new-group'))
|
2018-11-18 11:00:15 +05:30
|
|
|
|
|
|
|
expect(options).to include(user_group.name)
|
|
|
|
expect(options).not_to include(admin_group.name)
|
|
|
|
expect(options).to include("selected=\"selected\" value=\"-1\"")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'falls back to current user selection' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
|
|
|
|
|
|
options = helper.namespaces_options(:extra_group, display_path: true, extra_group: build(:group, name: admin_group.name))
|
|
|
|
|
|
|
|
expect(options).to include(user_group.name)
|
|
|
|
expect(options).not_to include(admin_group.name)
|
|
|
|
expect(options).to include("selected=\"selected\" value=\"#{user.namespace.id}\"")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns only groups if groups_only option is true' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
|
|
|
|
|
|
options = helper.namespaces_options(nil, groups_only: true)
|
|
|
|
|
|
|
|
expect(options).not_to include(user.name)
|
|
|
|
expect(options).to include(user_group.name)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
context 'when nested groups are available' do
|
2018-03-17 18:26:18 +05:30
|
|
|
it 'includes groups nested in groups the user can administer' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
|
|
child_group = create(:group, :private, parent: user_group)
|
|
|
|
|
|
|
|
options = helper.namespaces_options
|
|
|
|
|
|
|
|
expect(options).to include(child_group.name)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'orders the groups correctly' do
|
|
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
|
|
child_group = create(:group, :private, parent: user_group)
|
|
|
|
other_child = create(:group, :private, parent: user_group)
|
|
|
|
sub_child = create(:group, :private, parent: child_group)
|
|
|
|
|
|
|
|
expect(helper).to receive(:options_for_group)
|
|
|
|
.with([user_group, child_group, sub_child, other_child], anything)
|
|
|
|
.and_call_original
|
|
|
|
allow(helper).to receive(:options_for_group).and_call_original
|
|
|
|
|
|
|
|
helper.namespaces_options
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2021-04-29 21:17:54 +05:30
|
|
|
|
|
|
|
describe '#cascading_namespace_settings_popover_data' do
|
|
|
|
attribute = :delayed_project_removal
|
|
|
|
|
|
|
|
subject do
|
|
|
|
helper.cascading_namespace_settings_popover_data(
|
|
|
|
attribute,
|
|
|
|
subgroup1,
|
|
|
|
-> (locked_ancestor) { edit_group_path(locked_ancestor, anchor: 'js-permissions-settings') }
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when locked by an application setting' do
|
|
|
|
before do
|
|
|
|
allow(subgroup1.namespace_settings).to receive("#{attribute}_locked_by_application_setting?").and_return(true)
|
|
|
|
allow(subgroup1.namespace_settings).to receive("#{attribute}_locked_by_ancestor?").and_return(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns expected hash' do
|
|
|
|
expect(subject).to match({
|
|
|
|
popover_data: {
|
|
|
|
locked_by_application_setting: true,
|
|
|
|
locked_by_ancestor: false
|
|
|
|
}.to_json,
|
|
|
|
testid: 'cascading-settings-lock-icon'
|
|
|
|
})
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when locked by an ancestor namespace' do
|
|
|
|
before do
|
|
|
|
allow(subgroup1.namespace_settings).to receive("#{attribute}_locked_by_application_setting?").and_return(false)
|
|
|
|
allow(subgroup1.namespace_settings).to receive("#{attribute}_locked_by_ancestor?").and_return(true)
|
|
|
|
allow(subgroup1.namespace_settings).to receive("#{attribute}_locked_ancestor").and_return(admin_group.namespace_settings)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns expected hash' do
|
|
|
|
expect(subject).to match({
|
|
|
|
popover_data: {
|
|
|
|
locked_by_application_setting: false,
|
|
|
|
locked_by_ancestor: true,
|
|
|
|
ancestor_namespace: {
|
|
|
|
full_name: admin_group.full_name,
|
|
|
|
path: edit_group_path(admin_group, anchor: 'js-permissions-settings')
|
|
|
|
}
|
|
|
|
}.to_json,
|
|
|
|
testid: 'cascading-settings-lock-icon'
|
|
|
|
})
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2021-06-08 01:23:25 +05:30
|
|
|
|
|
|
|
describe '#cascading_namespace_setting_locked?' do
|
|
|
|
let(:attribute) { :delayed_project_removal }
|
|
|
|
|
|
|
|
context 'when `group` argument is `nil`' do
|
|
|
|
it 'returns `false`' do
|
|
|
|
expect(helper.cascading_namespace_setting_locked?(attribute, nil)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when `*_locked?` method does not exist' do
|
|
|
|
it 'returns `false`' do
|
|
|
|
expect(helper.cascading_namespace_setting_locked?(:attribute_that_does_not_exist, admin_group)).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when `*_locked?` method does exist' do
|
|
|
|
before do
|
|
|
|
allow(admin_group.namespace_settings).to receive(:delayed_project_removal_locked?).and_return(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'calls corresponding `*_locked?` method' do
|
|
|
|
helper.cascading_namespace_setting_locked?(attribute, admin_group, include_self: true)
|
|
|
|
|
|
|
|
expect(admin_group.namespace_settings).to have_received(:delayed_project_removal_locked?).with(include_self: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|