# frozen_string_literal: true require 'spec_helper' RSpec.describe ProjectPresenter do let(:user) { create(:user) } let(:project) { create(:project) } let(:presenter) { described_class.new(project, current_user: user) } describe '#license_short_name' do context 'when project.repository has a license_key' do it 'returns the nickname of the license if present' do allow(project.repository).to receive(:license_key).and_return('agpl-3.0') expect(presenter.license_short_name).to eq('GNU AGPLv3') end it 'returns the name of the license if nickname is not present' do allow(project.repository).to receive(:license_key).and_return('mit') expect(presenter.license_short_name).to eq('MIT License') end end context 'when project.repository has no license_key but a license_blob' do it 'returns LICENSE' do allow(project.repository).to receive(:license_key).and_return(nil) expect(presenter.license_short_name).to eq('LICENSE') end end end describe '#default_view' do context 'user not signed in' do let_it_be(:user) { nil } context 'when repository is empty' do let_it_be(:project) { create(:project_empty_repo, :public) } it 'returns wiki if user has repository access and can read wiki, which exists' do allow(project).to receive(:wiki_repository_exists?).and_return(true) allow(presenter).to receive(:can?).with(nil, :download_code, project).and_return(true) allow(presenter).to receive(:can?).with(nil, :read_wiki, project).and_return(true) allow(presenter).to receive(:can?).with(nil, :read_issue, project).and_return(false) expect(presenter.default_view).to eq('wiki') end it 'returns activity if user has repository access and can read wiki, which does not exist' do allow(presenter).to receive(:can?).with(nil, :download_code, project).and_return(true) allow(presenter).to receive(:can?).with(nil, :read_wiki, project).and_return(true) allow(presenter).to receive(:can?).with(nil, :read_issue, project).and_return(false) expect(presenter.default_view).to eq('activity') end it 'returns issues if user does not have repository access, but can read issues' do allow(presenter).to receive(:can?).with(nil, :download_code, project).and_return(false) allow(presenter).to receive(:can?).with(nil, :read_issue, project).and_call_original expect(presenter.default_view).to eq('projects/issues/issues') end it 'returns activity if user can read neither wiki nor issues' do allow(presenter).to receive(:can?).with(nil, :download_code, project).and_return(false) allow(presenter).to receive(:can?).with(nil, :read_issue, project).and_return(false) expect(presenter.default_view).to eq('activity') end end context 'when repository is not empty' do let_it_be(:project) { create(:project, :public, :repository) } it 'returns files and readme if user has repository access' do allow(presenter).to receive(:can?).with(nil, :download_code, project).and_return(true) expect(presenter.default_view).to eq('files') end it 'returns wiki if user does not have repository access and can read wiki, which exists' do allow(project).to receive(:wiki_repository_exists?).and_return(true) allow(presenter).to receive(:can?).with(nil, :download_code, project).and_return(false) allow(presenter).to receive(:can?).with(nil, :read_wiki, project).and_return(true) expect(presenter.default_view).to eq('wiki') end it 'returns activity if user does not have repository or wiki access' do allow(presenter).to receive(:can?).with(nil, :download_code, project).and_return(false) allow(presenter).to receive(:can?).with(nil, :read_issue, project).and_return(false) allow(presenter).to receive(:can?).with(nil, :read_wiki, project).and_return(false) expect(presenter.default_view).to eq('activity') end it 'returns releases anchor' do user = create(:user) release = create(:release, project: project, author: user) expect(release).to be_truthy expect(presenter.releases_anchor_data).to have_attributes( is_link: true, label: a_string_including("#{project.releases.count}"), link: presenter.project_releases_path(project) ) end end end context 'user signed in' do let(:user) { create(:user, :readme) } let(:project) { create(:project, :public, :repository) } context 'when the user is allowed to see the code' do it 'returns the project view' do allow(presenter).to receive(:can?).with(user, :download_code, project).and_return(true) expect(presenter.default_view).to eq('readme') end end context 'with wikis enabled and the right policy for the user' do before do project.project_feature.update_attribute(:issues_access_level, 0) allow(presenter).to receive(:can?).with(user, :download_code, project).and_return(false) end it 'returns wiki if the user has the right policy and the wiki exists' do allow(project).to receive(:wiki_repository_exists?).and_return(true) allow(presenter).to receive(:can?).with(user, :read_wiki, project).and_return(true) expect(presenter.default_view).to eq('wiki') end it 'returns activity if the user does not have the right policy' do allow(presenter).to receive(:can?).with(user, :read_wiki, project).and_return(false) allow(presenter).to receive(:can?).with(user, :read_issue, project).and_return(false) expect(presenter.default_view).to eq('activity') end end context 'with issues as a feature available' do it 'return issues' do allow(presenter).to receive(:can?).with(user, :download_code, project).and_return(false) allow(presenter).to receive(:can?).with(user, :read_issue, project).and_return(true) allow(presenter).to receive(:can?).with(user, :read_wiki, project).and_return(false) expect(presenter.default_view).to eq('projects/issues/issues') end end context 'with no activity, no wikies and no issues' do it 'returns activity as default' do project.project_feature.update_attribute(:issues_access_level, 0) allow(presenter).to receive(:can?).with(user, :download_code, project).and_return(false) allow(presenter).to receive(:can?).with(user, :read_wiki, project).and_return(false) allow(presenter).to receive(:can?).with(user, :read_issue, project).and_return(false) expect(presenter.default_view).to eq('activity') end end end end describe '#can_current_user_push_code?' do context 'empty repo' do let_it_be(:project) { create(:project) } it 'returns true if user can push_code' do project.add_developer(user) expect(presenter.can_current_user_push_code?).to be(true) end it 'returns false if user cannot push_code' do project.add_reporter(user) expect(presenter.can_current_user_push_code?).to be(false) end end context 'not empty repo' do let(:project) { create(:project, :repository) } context 'if no current user' do let(:user) { nil } it 'returns false' do expect(presenter.can_current_user_push_code?).to be(false) end end it 'returns true if user can push to default branch' do project.add_developer(user) expect(presenter.can_current_user_push_code?).to be(true) end it 'returns false if default branch is protected' do project.add_developer(user) create(:protected_branch, project: project, name: project.default_branch) expect(presenter.can_current_user_push_code?).to be(false) end end end context 'statistics anchors (empty repo)' do let_it_be(:project) { create(:project, :empty_repo) } describe '#storage_anchor_data' do it 'returns storage data' do expect(presenter.storage_anchor_data).to have_attributes( is_link: true, label: a_string_including('0 Bytes'), link: nil ) end end describe '#releases_anchor_data' do it 'does not return release count' do expect(presenter.releases_anchor_data).to be_nil end end describe '#commits_anchor_data' do it 'returns commits data' do expect(presenter.commits_anchor_data).to have_attributes( is_link: true, label: a_string_including('0'), link: nil ) end end describe '#branches_anchor_data' do it 'returns branches data' do expect(presenter.branches_anchor_data).to have_attributes( is_link: true, label: a_string_including('0'), link: nil ) end end describe '#tags_anchor_data' do it 'returns tags data' do expect(presenter.tags_anchor_data).to have_attributes( is_link: true, label: a_string_including('0'), link: nil ) end end end context 'statistics anchors' do let_it_be(:user) { create(:user) } let_it_be(:project) { create(:project, :repository) } let_it_be(:release) { create(:release, project: project, author: user) } let(:presenter) { described_class.new(project, current_user: user) } describe '#storage_anchor_data' do it 'returns storage data without usage quotas link for non-admin users' do expect(presenter.storage_anchor_data).to have_attributes( is_link: true, label: a_string_including('0 Bytes'), link: nil ) end it 'returns storage data with usage quotas link for admin users' do project.add_owner(user) expect(presenter.storage_anchor_data).to have_attributes( is_link: true, label: a_string_including('0 Bytes'), link: presenter.project_usage_quotas_path(project) ) end end describe '#releases_anchor_data' do it 'returns release count if user can read release' do project.add_maintainer(user) expect(release).to be_truthy expect(presenter.releases_anchor_data).to have_attributes( is_link: true, label: a_string_including("#{project.releases.count}"), link: presenter.project_releases_path(project) ) end it 'returns nil if user cannot read release' do expect(release).to be_truthy expect(presenter.releases_anchor_data).to be_nil end context 'user not signed in' do let_it_be(:user) { nil } it 'returns nil if user is signed out' do expect(release).to be_truthy expect(presenter.releases_anchor_data).to be_nil end end end describe '#commits_anchor_data' do it 'returns commits data' do expect(presenter.commits_anchor_data).to have_attributes( is_link: true, label: a_string_including('0'), link: presenter.project_commits_path(project, project.repository.root_ref) ) end end describe '#branches_anchor_data' do it 'returns branches data' do expect(presenter.branches_anchor_data).to have_attributes( is_link: true, label: a_string_including("#{project.repository.branches.size}"), link: presenter.project_branches_path(project) ) end end describe '#tags_anchor_data' do it 'returns tags data' do expect(presenter.tags_anchor_data).to have_attributes( is_link: true, label: a_string_including("#{project.repository.tags.size}"), link: presenter.project_tags_path(project) ) end end describe '#new_file_anchor_data' do it 'returns new file data if user can push' do project.add_developer(user) expect(presenter.new_file_anchor_data).to have_attributes( is_link: false, label: a_string_including("New file"), link: presenter.project_new_blob_path(project, 'master'), class_modifier: 'btn-dashed' ) end it 'returns nil if user cannot push' do expect(presenter.new_file_anchor_data).to be_nil end context 'when the project is empty' do let_it_be(:project) { create(:project, :empty_repo) } # Since we protect the default branch for empty repos it 'is empty for a developer' do project.add_developer(user) expect(presenter.new_file_anchor_data).to be_nil end end end describe '#readme_anchor_data' do context 'when user can push and README does not exists' do it 'returns anchor data' do project.add_developer(user) allow(project.repository).to receive(:readme_path).and_return(nil) expect(presenter.readme_anchor_data).to have_attributes( is_link: false, label: a_string_including('Add README'), link: presenter.add_readme_path ) end end context 'when README exists' do it 'returns anchor data' do allow(project.repository).to receive(:readme_path).and_return('readme') expect(presenter.readme_anchor_data).to have_attributes( is_link: false, label: a_string_including('README'), link: presenter.readme_path ) end end end describe '#changelog_anchor_data' do context 'when user can push and CHANGELOG does not exist' do it 'returns anchor data' do project.add_developer(user) allow(project.repository).to receive(:changelog).and_return(nil) expect(presenter.changelog_anchor_data).to have_attributes( is_link: false, label: a_string_including('Add CHANGELOG'), link: presenter.add_changelog_path ) end end context 'when CHANGELOG exists' do it 'returns anchor data' do allow(project.repository).to receive(:changelog).and_return(double(name: 'foo')) expect(presenter.changelog_anchor_data).to have_attributes( is_link: false, label: a_string_including('CHANGELOG'), link: presenter.changelog_path ) end end end describe '#license_anchor_data' do context 'when user can push and LICENSE does not exist' do it 'returns anchor data' do project.add_developer(user) allow(project.repository).to receive(:license_blob).and_return(nil) expect(presenter.license_anchor_data).to have_attributes( is_link: false, label: a_string_including('Add LICENSE'), link: presenter.add_license_path ) end end context 'when LICENSE exists' do it 'returns anchor data' do allow(project.repository).to receive(:license_blob).and_return(double(name: 'foo')) expect(presenter.license_anchor_data).to have_attributes( is_link: false, label: a_string_including(presenter.license_short_name), link: presenter.license_path ) end end end describe '#contribution_guide_anchor_data' do context 'when user can push and CONTRIBUTING does not exist' do it 'returns anchor data' do project.add_developer(user) allow(project.repository).to receive(:contribution_guide).and_return(nil) expect(presenter.contribution_guide_anchor_data).to have_attributes( is_link: false, label: a_string_including('Add CONTRIBUTING'), link: presenter.add_contribution_guide_path ) end end context 'when CONTRIBUTING exists' do it 'returns anchor data' do allow(project.repository).to receive(:contribution_guide).and_return(double(name: 'foo')) expect(presenter.contribution_guide_anchor_data).to have_attributes( is_link: false, label: a_string_including('CONTRIBUTING'), link: presenter.contribution_guide_path ) end end end describe '#autodevops_anchor_data' do it 'returns nil if builds feature is not available' do allow(project).to receive(:feature_available?).with(:builds, user).and_return(false) expect(presenter.autodevops_anchor_data).to be_nil end context 'when Auto Devops is enabled' do it 'returns anchor data' do allow(project).to receive(:auto_devops_enabled?).and_return(true) expect(presenter.autodevops_anchor_data).to have_attributes( is_link: false, label: a_string_including('Auto DevOps enabled'), link: nil ) end end context 'when user can admin pipeline and CI yml does not exist' do it 'returns anchor data' do project.add_maintainer(user) allow(project).to receive(:auto_devops_enabled?).and_return(false) allow(project.repository).to receive(:gitlab_ci_yml).and_return(nil) expect(presenter.autodevops_anchor_data).to have_attributes( is_link: false, label: a_string_including('Enable Auto DevOps'), link: presenter.project_settings_ci_cd_path(project, anchor: 'autodevops-settings') ) end end end describe '#kubernetes_cluster_anchor_data' do context 'when user can create Kubernetes cluster' do it 'returns link to cluster if only one exists' do project.add_maintainer(user) cluster = create(:cluster, projects: [project]) expect(presenter.kubernetes_cluster_anchor_data).to have_attributes( is_link: false, label: a_string_including('Kubernetes'), link: presenter.project_cluster_path(project, cluster) ) end it 'returns link to clusters page if more than one exists' do project.add_maintainer(user) create(:cluster, :production_environment, projects: [project]) create(:cluster, projects: [project]) expect(presenter.kubernetes_cluster_anchor_data).to have_attributes( is_link: false, label: a_string_including('Kubernetes'), link: presenter.project_clusters_path(project) ) end it 'returns link to create a cluster if no cluster exists' do project.add_maintainer(user) expect(presenter.kubernetes_cluster_anchor_data).to have_attributes( is_link: false, label: a_string_including('Add Kubernetes cluster'), link: presenter.project_clusters_path(project) ) end end context 'when user cannot create Kubernetes cluster' do it 'returns nil' do expect(presenter.kubernetes_cluster_anchor_data).to be_nil end end end describe '#upload_anchor_data' do context 'when a user can push to the default branch' do before do project.add_developer(user) end it 'returns upload_anchor_data' do expect(presenter.upload_anchor_data).to have_attributes( is_link: false, label: a_string_including('Upload file'), data: { "can_push_code" => "true", "original_branch" => "master", "path" => "/#{project.full_path}/-/create/master", "project_path" => project.full_path, "target_branch" => "master" } ) end end context 'when the user cannot push to default branch' do it 'returns nil' do expect(presenter.upload_anchor_data).to be_nil end end end end describe '#statistics_buttons' do let(:project) { build_stubbed(:project) } it 'orders the items correctly' do allow(project.repository).to receive(:readme_path).and_return('readme') allow(project.repository).to receive(:license_blob).and_return(nil) allow(project.repository).to receive(:changelog).and_return(nil) allow(project.repository).to receive(:contribution_guide).and_return(double(name: 'foo')) allow(presenter).to receive(:filename_path).and_return('fake/path') allow(presenter).to receive(:contribution_guide_path).and_return('fake_path') buttons = presenter.statistics_buttons(show_auto_devops_callout: false) expect(buttons.map(&:label)).to start_with( a_string_including('README'), a_string_including('CONTRIBUTING') ) end end describe '#repo_statistics_buttons' do subject(:empty_repo_statistics_buttons) { presenter.empty_repo_statistics_buttons } before do allow(project).to receive(:auto_devops_enabled?).and_return(false) end context 'empty repo' do let(:project) { create(:project, :stubbed_repository) } context 'for a guest user' do it 'orders the items correctly' do expect(empty_repo_statistics_buttons.map(&:label)).to start_with( a_string_including('No license') ) end end it 'includes a button to configure integrations for maintainers' do project.add_maintainer(user) expect(empty_repo_statistics_buttons.map(&:label)).to include( a_string_including('Configure Integration') ) end it 'does not include a button if not a maintainer' do expect(empty_repo_statistics_buttons.map(&:label)).not_to include( a_string_including('Configure Integration') ) end context 'for a developer' do before do project.add_developer(user) end it 'orders the items correctly' do expect(empty_repo_statistics_buttons.map(&:label)).to start_with( a_string_including('Upload'), a_string_including('New'), a_string_including('README'), a_string_including('LICENSE'), a_string_including('CHANGELOG'), a_string_including('CONTRIBUTING'), a_string_including('CI/CD') ) end end end context 'initialized repo' do let_it_be(:project) { create(:project, :repository) } it 'orders the items correctly' do expect(empty_repo_statistics_buttons.map(&:label)).to start_with( a_string_including('README'), a_string_including('License'), a_string_including('CHANGELOG'), a_string_including('CONTRIBUTING') ) end end end describe '#can_setup_review_app?' do subject { presenter.can_setup_review_app? } context 'when the ci/cd file is missing' do before do allow(presenter).to receive(:cicd_missing?).and_return(true) end it { is_expected.to be_truthy } end context 'when the ci/cd file is not missing' do before do allow(presenter).to receive(:cicd_missing?).and_return(false) end context 'and the user can create a cluster' do before do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(user, :create_cluster, project).and_return(true) end context 'and there is no cluster associated to this project' do let(:project) { create(:project, clusters: []) } it { is_expected.to be_truthy } end context 'and there is already a cluster associated to this project' do let(:project) { create(:project, clusters: [build(:cluster, :providing_by_gcp)]) } it { is_expected.to be_falsey } end context 'when a group cluster is instantiated' do let_it_be(:cluster) { create(:cluster, :group) } let_it_be(:group) { cluster.group } context 'and the project belongs to this group' do let!(:project) { create(:project, group: group) } it { is_expected.to be_falsey } end context 'and the project does not belong to this group' do it { is_expected.to be_truthy } end end context 'and there is already an instance cluster' do it 'is false' do create(:cluster, :instance) is_expected.to be_falsey end end end context 'and the user cannot create a cluster' do before do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(user, :create_cluster, project).and_return(false) end it { is_expected.to be_falsey } end end end end