281 lines
9 KiB
Ruby
281 lines
9 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require "spec_helper"
|
|
|
|
RSpec.describe Users::CalloutsHelper do
|
|
let_it_be(:user, refind: true) { create(:user) }
|
|
|
|
before do
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
end
|
|
|
|
describe '.show_gke_cluster_integration_callout?' do
|
|
let_it_be(:project) { create(:project) }
|
|
|
|
subject { helper.show_gke_cluster_integration_callout?(project) }
|
|
|
|
context 'when user can create a cluster' do
|
|
before do
|
|
allow(helper).to receive(:can?).with(anything, :create_cluster, anything)
|
|
.and_return(true)
|
|
end
|
|
|
|
context 'when user has not dismissed' do
|
|
before do
|
|
allow(helper).to receive(:user_dismissed?).and_return(false)
|
|
end
|
|
|
|
context 'when active_nav_link is in the operations section' do
|
|
before do
|
|
allow(helper).to receive(:active_nav_link?).and_return(true)
|
|
end
|
|
|
|
it { is_expected.to be true }
|
|
end
|
|
|
|
context 'when active_nav_link is not in the operations section' do
|
|
before do
|
|
allow(helper).to receive(:active_nav_link?).and_return(false)
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
end
|
|
|
|
context 'when user dismissed' do
|
|
before do
|
|
allow(helper).to receive(:user_dismissed?).and_return(true)
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
end
|
|
|
|
context 'when user can not create a cluster' do
|
|
before do
|
|
allow(helper).to receive(:can?).with(anything, :create_cluster, anything)
|
|
.and_return(false)
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
end
|
|
|
|
describe '.render_flash_user_callout' do
|
|
it 'renders the flash_user_callout partial' do
|
|
expect(helper).to receive(:render)
|
|
.with(/flash_user_callout/, flash_type: :warning, message: 'foo', feature_name: 'bar')
|
|
|
|
helper.render_flash_user_callout(:warning, 'foo', 'bar')
|
|
end
|
|
end
|
|
|
|
describe '.show_feature_flags_new_version?' do
|
|
subject { helper.show_feature_flags_new_version? }
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
before do
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
end
|
|
|
|
context 'when the feature flags new version info has not been dismissed' do
|
|
it { is_expected.to be_truthy }
|
|
end
|
|
|
|
context 'when the feature flags new version has been dismissed' do
|
|
before do
|
|
create(:callout, user: user, feature_name: described_class::FEATURE_FLAGS_NEW_VERSION)
|
|
end
|
|
|
|
it { is_expected.to be_falsy }
|
|
end
|
|
end
|
|
|
|
describe '.show_registration_enabled_user_callout?' do
|
|
let_it_be(:admin) { create(:user, :admin) }
|
|
|
|
subject { helper.show_registration_enabled_user_callout? }
|
|
|
|
context 'when on gitlab.com' do
|
|
before do
|
|
allow(::Gitlab).to receive(:com?).and_return(true)
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
stub_application_setting(signup_enabled: true)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
|
|
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when `current_user` is not an admin' do
|
|
before do
|
|
allow(::Gitlab).to receive(:com?).and_return(false)
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
stub_application_setting(signup_enabled: true)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
|
|
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when signup is disabled' do
|
|
before do
|
|
allow(::Gitlab).to receive(:com?).and_return(false)
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
stub_application_setting(signup_enabled: false)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
|
|
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when user has dismissed callout' do
|
|
before do
|
|
allow(::Gitlab).to receive(:com?).and_return(false)
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
stub_application_setting(signup_enabled: true)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { true }
|
|
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when controller path is not allowed' do
|
|
before do
|
|
allow(::Gitlab).to receive(:com?).and_return(false)
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
stub_application_setting(signup_enabled: true)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
|
|
allow(helper.controller).to receive(:controller_path).and_return("projects/issues")
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when not gitlab.com, `current_user` is an admin, signup is enabled, user has not dismissed callout, and controller path is allowed' do
|
|
before do
|
|
allow(::Gitlab).to receive(:com?).and_return(false)
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
stub_application_setting(signup_enabled: true)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::REGISTRATION_ENABLED_CALLOUT) { false }
|
|
allow(helper.controller).to receive(:controller_path).and_return("admin/users")
|
|
end
|
|
|
|
it { is_expected.to be true }
|
|
end
|
|
end
|
|
|
|
describe '.show_unfinished_tag_cleanup_callout?' do
|
|
subject { helper.show_unfinished_tag_cleanup_callout? }
|
|
|
|
before do
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::UNFINISHED_TAG_CLEANUP_CALLOUT) { dismissed }
|
|
end
|
|
|
|
context 'when user has not dismissed' do
|
|
let(:dismissed) { false }
|
|
|
|
it { is_expected.to be true }
|
|
end
|
|
|
|
context 'when user dismissed' do
|
|
let(:dismissed) { true }
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
end
|
|
|
|
describe '.show_security_newsletter_user_callout?' do
|
|
let_it_be(:admin) { create(:user, :admin) }
|
|
|
|
subject { helper.show_security_newsletter_user_callout? }
|
|
|
|
context 'when `current_user` is not an admin' do
|
|
before do
|
|
allow(helper).to receive(:current_user).and_return(user)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::SECURITY_NEWSLETTER_CALLOUT) { false }
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when user has dismissed callout' do
|
|
before do
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::SECURITY_NEWSLETTER_CALLOUT) { true }
|
|
end
|
|
|
|
it { is_expected.to be false }
|
|
end
|
|
|
|
context 'when `current_user` is an admin and user has not dismissed callout' do
|
|
before do
|
|
allow(helper).to receive(:current_user).and_return(admin)
|
|
allow(helper).to receive(:user_dismissed?).with(described_class::SECURITY_NEWSLETTER_CALLOUT) { false }
|
|
end
|
|
|
|
it { is_expected.to be true }
|
|
end
|
|
end
|
|
|
|
describe '#web_hook_disabled_dismissed?' do
|
|
context 'without a project' do
|
|
it 'is false' do
|
|
expect(helper).not_to be_web_hook_disabled_dismissed(nil)
|
|
end
|
|
end
|
|
|
|
context 'with a project' do
|
|
let_it_be(:project) { create(:project) }
|
|
|
|
context 'the web-hook failure callout has never been dismissed' do
|
|
it 'is false' do
|
|
expect(helper).not_to be_web_hook_disabled_dismissed(project)
|
|
end
|
|
end
|
|
|
|
context 'the web-hook failure callout has been dismissed', :freeze_time do
|
|
before do
|
|
create(:project_callout,
|
|
feature_name: described_class::WEB_HOOK_DISABLED,
|
|
user: user,
|
|
project: project,
|
|
dismissed_at: 1.week.ago)
|
|
end
|
|
|
|
it 'is true' do
|
|
expect(helper).to be_web_hook_disabled_dismissed(project)
|
|
end
|
|
|
|
context 'when there was an older failure', :clean_gitlab_redis_shared_state do
|
|
let(:key) { "web_hooks:last_failure:project-#{project.id}" }
|
|
|
|
before do
|
|
Gitlab::Redis::SharedState.with { |r| r.set(key, 1.month.ago.iso8601) }
|
|
end
|
|
|
|
it 'is true' do
|
|
expect(helper).to be_web_hook_disabled_dismissed(project)
|
|
end
|
|
end
|
|
|
|
context 'when there has been a more recent failure', :clean_gitlab_redis_shared_state do
|
|
let(:key) { "web_hooks:last_failure:project-#{project.id}" }
|
|
|
|
before do
|
|
Gitlab::Redis::SharedState.with { |r| r.set(key, 1.day.ago.iso8601) }
|
|
end
|
|
|
|
it 'is false' do
|
|
expect(helper).not_to be_web_hook_disabled_dismissed(project)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|