# frozen_string_literal: true require 'spec_helper' describe Ci::PipelinePresenter do include Gitlab::Routing let(:user) { create(:user) } let(:current_user) { user } let(:project) { create(:project, :test_repo) } let(:pipeline) { create(:ci_pipeline, project: project) } subject(:presenter) do described_class.new(pipeline) end before do project.add_developer(user) allow(presenter).to receive(:current_user) { current_user } end it 'inherits from Gitlab::View::Presenter::Delegated' do expect(described_class.superclass).to eq(Gitlab::View::Presenter::Delegated) end describe '#initialize' do it 'takes a pipeline and optional params' do expect { presenter }.not_to raise_error end it 'exposes pipeline' do expect(presenter.pipeline).to eq(pipeline) end it 'forwards missing methods to pipeline' do expect(presenter.ref).to eq(pipeline.ref) end end describe '#status_title' do context 'when pipeline is auto-canceled' do before do expect(pipeline).to receive(:auto_canceled?).and_return(true) expect(pipeline).to receive(:auto_canceled_by_id).and_return(1) end it 'shows that the pipeline is auto-canceled' do status_title = presenter.status_title expect(status_title).to include('auto-canceled') expect(status_title).to include('Pipeline #1') end end context 'when pipeline is not auto-canceled' do before do expect(pipeline).to receive(:auto_canceled?).and_return(false) end it 'does not have a status title' do expect(presenter.status_title).to be_nil end end end describe '#failure_reason' do context 'when pipeline has a failure reason' do ::Ci::PipelineEnums.failure_reasons.keys.each do |failure_reason| context "when failure reason is #{failure_reason}" do before do pipeline.failure_reason = failure_reason end it 'represents a failure reason sentence' do expect(presenter.failure_reason).to be_an_instance_of(String) expect(presenter.failure_reason).not_to eq(failure_reason.to_s) end end end end context 'when pipeline does not have failure reason' do it 'returns nil' do expect(presenter.failure_reason).to be_nil end end end describe '#name' do before do allow(pipeline).to receive(:merge_request_event_type) { event_type } end subject { presenter.name } context 'for a detached merge request pipeline' do let(:event_type) { :detached } it { is_expected.to eq('Detached merge request pipeline') } end context 'for a merged result pipeline' do let(:event_type) { :merged_result } it { is_expected.to eq('Merged result pipeline') } end context 'for a merge train pipeline' do let(:event_type) { :merge_train } it { is_expected.to eq('Merge train pipeline') } end context 'when pipeline is branch pipeline' do let(:event_type) { nil } it { is_expected.to eq('Pipeline') } end end describe '#ref_text' do subject { presenter.ref_text } context 'when pipeline is detached merge request pipeline' do let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline) } let(:pipeline) { merge_request.all_pipelines.last } it 'returns a correct ref text' do is_expected.to eq("for #{merge_request.to_reference} " \ "with #{merge_request.source_branch}") end end context 'when pipeline is merge request pipeline' do let(:merge_request) { create(:merge_request, :with_merge_request_pipeline) } let(:pipeline) { merge_request.all_pipelines.last } it 'returns a correct ref text' do is_expected.to eq("for #{merge_request.to_reference} " \ "with #{merge_request.source_branch} " \ "into #{merge_request.target_branch}") end end context 'when pipeline is branch pipeline' do context 'when ref exists in the repository' do before do allow(pipeline).to receive(:ref_exists?) { true } end it 'returns a correct ref text' do is_expected.to eq("for #{pipeline.ref}") end context 'when ref contains malicious script' do let(:pipeline) { create(:ci_pipeline, ref: "", project: project) } it 'does not include the malicious script' do is_expected.not_to include("") end end end context 'when ref does not exist in the repository' do before do allow(pipeline).to receive(:ref_exists?) { false } end it 'returns a correct ref text' do is_expected.to eq("for #{pipeline.ref}") end context 'when ref contains malicious script' do let(:pipeline) { create(:ci_pipeline, ref: "", project: project) } it 'does not include the malicious script' do is_expected.not_to include("") end end end end end describe '#all_related_merge_request_text' do subject { presenter.all_related_merge_request_text } let(:mr_1) { create(:merge_request) } let(:mr_2) { create(:merge_request) } context 'with zero related merge requests (branch pipeline)' do it { is_expected.to eq('No related merge requests found.') } end context 'with one related merge request' do before do allow(pipeline).to receive(:all_merge_requests).and_return(MergeRequest.where(id: mr_1.id)) end it { is_expected.to eq("1 related merge request: " \ "#{mr_1.to_reference} #{mr_1.title}") } end context 'with two related merge requests' do before do allow(pipeline).to receive(:all_merge_requests).and_return(MergeRequest.where(id: [mr_1.id, mr_2.id])) end it { is_expected.to eq("2 related merge requests: " \ "#{mr_2.to_reference} #{mr_2.title}, " \ "#{mr_1.to_reference} #{mr_1.title}") } context 'with a limit passed' do subject { presenter.all_related_merge_request_text(limit: 1) } it { is_expected.to eq("2 related merge requests: " \ "#{mr_2.to_reference} #{mr_2.title}") } end end end describe '#all_related_merge_requests' do subject(:all_related_merge_requests) do presenter.send(:all_related_merge_requests) end it 'memoizes the returned relation' do expect(pipeline).to receive(:all_merge_requests_by_recency).exactly(1).time.and_call_original 2.times { presenter.send(:all_related_merge_requests).count } end context 'for a branch pipeline with two open MRs' do let!(:one) { create(:merge_request, source_project: project, source_branch: pipeline.ref) } let!(:two) { create(:merge_request, source_project: project, source_branch: pipeline.ref, target_branch: 'fix') } it { is_expected.to contain_exactly(one, two) } end context 'permissions' do let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) } let(:pipeline) { merge_request.all_pipelines.take } shared_examples 'private merge requests' do context 'when not logged in' do let(:current_user) {} it { is_expected.to be_empty } end context 'when logged in as a non_member' do let(:current_user) { create(:user) } it { is_expected.to be_empty } end context 'when logged in as a guest' do let(:current_user) { create(:user) } before do project.add_guest(current_user) end it { is_expected.to be_empty } end context 'when logged in as a developer' do it { is_expected.to contain_exactly(merge_request) } end context 'when logged in as a maintainer' do let(:current_user) { create(:user) } before do project.add_maintainer(current_user) end it { is_expected.to contain_exactly(merge_request) } end end context 'with a private project' do it_behaves_like 'private merge requests' end context 'with a public project with private merge requests' do before do project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC) project .project_feature .update!(merge_requests_access_level: ProjectFeature::PRIVATE) end it_behaves_like 'private merge requests' end context 'with a public project with public merge requests' do before do project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC) project .project_feature .update!(merge_requests_access_level: ProjectFeature::ENABLED) end context 'when not logged in' do let(:current_user) {} it { is_expected.to contain_exactly(merge_request) } end end end end describe '#link_to_merge_request' do subject { presenter.link_to_merge_request } context 'with a related merge request' do let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) } let(:pipeline) { merge_request.all_pipelines.take } it 'returns a correct link' do is_expected.to include(project_merge_request_path(project, merge_request)) end end context 'when pipeline is branch pipeline' do it { is_expected.to be_nil } end end describe '#link_to_merge_request_source_branch' do subject { presenter.link_to_merge_request_source_branch } context 'with a related merge request' do let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) } let(:pipeline) { merge_request.all_pipelines.take } it 'returns a correct link' do is_expected.to include(project_commits_path(project, merge_request.source_branch)) end end context 'when pipeline is branch pipeline' do it { is_expected.to be_nil } end end describe '#link_to_merge_request_target_branch' do subject { presenter.link_to_merge_request_target_branch } context 'with a related merge request' do let(:merge_request) { create(:merge_request, :with_detached_merge_request_pipeline, source_project: project) } let(:pipeline) { merge_request.all_pipelines.take } it 'returns a correct link' do is_expected.to include(project_commits_path(project, merge_request.target_branch)) end end context 'when pipeline is branch pipeline' do it { is_expected.to be_nil } end end end