debian-mirror-gitlab/spec/helpers/packages_helper_spec.rb
2023-07-09 08:55:56 +05:30

256 lines
8 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe PackagesHelper, feature_category: :package_registry do
using RSpec::Parameterized::TableSyntax
include AdminModeHelper
let_it_be_with_reload(:project) { create(:project) }
let_it_be(:base_url) { "#{Gitlab.config.gitlab.url}/api/v4/" }
describe '#package_registry_instance_url' do
it 'returns conan instance url when registry_type is conant' do
url = helper.package_registry_instance_url(:conan)
expect(url).to eq("#{base_url}packages/conan")
end
it 'returns npm instance url when registry_type is npm' do
url = helper.package_registry_instance_url(:npm)
expect(url).to eq("#{base_url}packages/npm")
end
end
describe '#package_registry_project_url' do
it 'returns maven registry url when registry_type is not provided' do
url = helper.package_registry_project_url(1)
expect(url).to eq("#{base_url}projects/1/packages/maven")
end
it 'returns specified registry url when registry_type is provided' do
url = helper.package_registry_project_url(1, :npm)
expect(url).to eq("#{base_url}projects/1/packages/npm")
end
end
describe '#pypi_registry_url' do
let_it_be(:base_url_with_token) { base_url.sub('://', '://__token__:<your_personal_token>@') }
let_it_be(:public_project) { create(:project, :public) }
it 'returns the pypi registry url with token when project is private' do
url = helper.pypi_registry_url(project)
expect(url).to eq("#{base_url_with_token}projects/#{project.id}/packages/pypi/simple")
end
it 'returns the pypi registry url without token when project is public' do
url = helper.pypi_registry_url(public_project)
expect(url).to eq("#{base_url}projects/#{public_project.id}/packages/pypi/simple")
end
end
describe '#composer_registry_url' do
it 'return the composer registry url' do
url = helper.composer_registry_url(1)
expect(url).to eq("#{base_url}group/1/-/packages/composer/packages.json")
end
end
describe '#composer_config_repository_name' do
let(:host) { Gitlab.config.gitlab.host }
let(:group_id) { 1 }
it 'return global unique composer registry id' do
id = helper.composer_config_repository_name(group_id)
expect(id).to eq("#{host}/#{group_id}")
end
end
describe '#show_cleanup_policy_link' do
let_it_be(:user) { create(:user) }
let_it_be_with_reload(:container_repository) { create(:container_repository) }
subject { helper.show_cleanup_policy_link(project.reload) }
where(:com, :config_registry, :project_registry, :nil_policy, :container_repositories_exist, :expected_result) do
false | false | false | false | false | false
false | false | false | false | true | false
false | false | false | true | false | false
false | false | false | true | true | false
false | false | true | false | false | false
false | false | true | false | true | false
false | false | true | true | false | false
false | false | true | true | true | false
false | true | false | false | false | false
false | true | false | false | true | false
false | true | false | true | false | false
false | true | false | true | true | false
false | true | true | false | false | false
false | true | true | false | true | false
false | true | true | true | false | false
false | true | true | true | true | false
true | false | false | false | false | false
true | false | false | false | true | false
true | false | false | true | false | false
true | false | false | true | true | false
true | false | true | false | false | false
true | false | true | false | true | false
true | false | true | true | false | false
true | false | true | true | true | false
true | true | false | false | false | false
true | true | false | false | true | false
true | true | false | true | false | false
true | true | false | true | true | false
true | true | true | false | false | false
true | true | true | false | true | false
true | true | true | true | false | false
true | true | true | true | true | true
end
with_them do
before do
allow(helper).to receive(:current_user).and_return(user)
allow(Gitlab).to receive(:com?).and_return(com)
stub_config(registry: { enabled: config_registry })
allow(project).to receive(:feature_available?).with(:container_registry, user).and_return(project_registry)
project.container_expiration_policy.destroy! if nil_policy
container_repository.update!(project_id: project.id) if container_repositories_exist
end
it { is_expected.to eq(expected_result) }
end
end
describe '#show_container_registry_settings' do
let_it_be(:project) { create(:project) }
let_it_be(:user) { create(:user) }
let_it_be(:admin) { create(:admin) }
before do
allow(helper).to receive(:current_user) { user }
end
subject { helper.show_container_registry_settings(project) }
context 'with container registry config enabled' do
before do
stub_config(registry: { enabled: true })
end
context 'when user has permission' do
before do
allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(true)
end
it { is_expected.to be(true) }
end
context 'when user does not have permission' do
before do
allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(false)
end
it { is_expected.to be(false) }
end
end
context 'with container registry config disabled' do
before do
stub_config(registry: { enabled: false })
end
context 'when user has permission' do
before do
allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(true)
end
it { is_expected.to be(false) }
end
context 'when user does not have permission' do
before do
allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(false)
end
it { is_expected.to be(false) }
end
end
end
describe '#show_group_package_registry_settings' do
let_it_be(:group) { create(:group) }
let_it_be(:user) { create(:user) }
let_it_be(:admin) { create(:admin) }
before do
allow(helper).to receive(:current_user) { user }
end
subject { helper.show_group_package_registry_settings(group) }
context 'with package registry config enabled' do
before do
stub_config(packages: { enabled: true })
end
context "with admin", :enable_admin_mode do
before do
allow(helper).to receive(:current_user) { admin }
end
it { is_expected.to be(true) }
end
context "with owner" do
before do
group.add_owner(user)
end
it { is_expected.to be(true) }
end
%i[maintainer developer reporter guest].each do |role|
context "with #{role}" do
before do
group.public_send("add_#{role}", user)
end
it { is_expected.to be(false) }
end
end
end
context 'with package registry config disabled' do
before do
stub_config(packages: { enabled: false })
end
context "with admin", :enable_admin_mode do
before do
allow(helper).to receive(:current_user) { admin }
end
it { is_expected.to be(false) }
end
%i[owner maintainer developer reporter guest].each do |role|
context "with #{role}" do
before do
group.public_send("add_#{role}", user)
end
it { is_expected.to be(false) }
end
end
end
end
end