# frozen_string_literal: true require 'spec_helper' RSpec.describe PackagesHelper, feature_category: :package_registry do using RSpec::Parameterized::TableSyntax include AdminModeHelper let_it_be_with_reload(:project) { create(:project) } let_it_be(:base_url) { "#{Gitlab.config.gitlab.url}/api/v4/" } describe '#package_registry_instance_url' do it 'returns conan instance url when registry_type is conant' do url = helper.package_registry_instance_url(:conan) expect(url).to eq("#{base_url}packages/conan") end it 'returns npm instance url when registry_type is npm' do url = helper.package_registry_instance_url(:npm) expect(url).to eq("#{base_url}packages/npm") end end describe '#package_registry_project_url' do it 'returns maven registry url when registry_type is not provided' do url = helper.package_registry_project_url(1) expect(url).to eq("#{base_url}projects/1/packages/maven") end it 'returns specified registry url when registry_type is provided' do url = helper.package_registry_project_url(1, :npm) expect(url).to eq("#{base_url}projects/1/packages/npm") end end describe '#pypi_registry_url' do let_it_be(:base_url_with_token) { base_url.sub('://', '://__token__:@') } let_it_be(:public_project) { create(:project, :public) } it 'returns the pypi registry url with token when project is private' do url = helper.pypi_registry_url(project) expect(url).to eq("#{base_url_with_token}projects/#{project.id}/packages/pypi/simple") end it 'returns the pypi registry url without token when project is public' do url = helper.pypi_registry_url(public_project) expect(url).to eq("#{base_url}projects/#{public_project.id}/packages/pypi/simple") end end describe '#composer_registry_url' do it 'return the composer registry url' do url = helper.composer_registry_url(1) expect(url).to eq("#{base_url}group/1/-/packages/composer/packages.json") end end describe '#composer_config_repository_name' do let(:host) { Gitlab.config.gitlab.host } let(:group_id) { 1 } it 'return global unique composer registry id' do id = helper.composer_config_repository_name(group_id) expect(id).to eq("#{host}/#{group_id}") end end describe '#show_cleanup_policy_link' do let_it_be(:user) { create(:user) } let_it_be_with_reload(:container_repository) { create(:container_repository) } subject { helper.show_cleanup_policy_link(project.reload) } where(:com, :config_registry, :project_registry, :nil_policy, :container_repositories_exist, :expected_result) do false | false | false | false | false | false false | false | false | false | true | false false | false | false | true | false | false false | false | false | true | true | false false | false | true | false | false | false false | false | true | false | true | false false | false | true | true | false | false false | false | true | true | true | false false | true | false | false | false | false false | true | false | false | true | false false | true | false | true | false | false false | true | false | true | true | false false | true | true | false | false | false false | true | true | false | true | false false | true | true | true | false | false false | true | true | true | true | false true | false | false | false | false | false true | false | false | false | true | false true | false | false | true | false | false true | false | false | true | true | false true | false | true | false | false | false true | false | true | false | true | false true | false | true | true | false | false true | false | true | true | true | false true | true | false | false | false | false true | true | false | false | true | false true | true | false | true | false | false true | true | false | true | true | false true | true | true | false | false | false true | true | true | false | true | false true | true | true | true | false | false true | true | true | true | true | true end with_them do before do allow(helper).to receive(:current_user).and_return(user) allow(Gitlab).to receive(:com?).and_return(com) stub_config(registry: { enabled: config_registry }) allow(project).to receive(:feature_available?).with(:container_registry, user).and_return(project_registry) project.container_expiration_policy.destroy! if nil_policy container_repository.update!(project_id: project.id) if container_repositories_exist end it { is_expected.to eq(expected_result) } end end describe '#show_container_registry_settings' do let_it_be(:project) { create(:project) } let_it_be(:user) { create(:user) } let_it_be(:admin) { create(:admin) } before do allow(helper).to receive(:current_user) { user } end subject { helper.show_container_registry_settings(project) } context 'with container registry config enabled' do before do stub_config(registry: { enabled: true }) end context 'when user has permission' do before do allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(true) end it { is_expected.to be(true) } end context 'when user does not have permission' do before do allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(false) end it { is_expected.to be(false) } end end context 'with container registry config disabled' do before do stub_config(registry: { enabled: false }) end context 'when user has permission' do before do allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(true) end it { is_expected.to be(false) } end context 'when user does not have permission' do before do allow(Ability).to receive(:allowed?).with(user, :admin_container_image, project).and_return(false) end it { is_expected.to be(false) } end end end describe '#show_group_package_registry_settings' do let_it_be(:group) { create(:group) } let_it_be(:user) { create(:user) } let_it_be(:admin) { create(:admin) } before do allow(helper).to receive(:current_user) { user } end subject { helper.show_group_package_registry_settings(group) } context 'with package registry config enabled' do before do stub_config(packages: { enabled: true }) end context "with admin", :enable_admin_mode do before do allow(helper).to receive(:current_user) { admin } end it { is_expected.to be(true) } end context "with owner" do before do group.add_owner(user) end it { is_expected.to be(true) } end %i[maintainer developer reporter guest].each do |role| context "with #{role}" do before do group.public_send("add_#{role}", user) end it { is_expected.to be(false) } end end end context 'with package registry config disabled' do before do stub_config(packages: { enabled: false }) end context "with admin", :enable_admin_mode do before do allow(helper).to receive(:current_user) { admin } end it { is_expected.to be(false) } end %i[owner maintainer developer reporter guest].each do |role| context "with #{role}" do before do group.public_send("add_#{role}", user) end it { is_expected.to be(false) } end end end end end