# frozen_string_literal: true require 'spec_helper' RSpec.describe ProjectMemberPresenter do let(:user) { double(:user) } let(:project) { double(:project) } let(:project_member) { double(:project_member, source: project) } let(:presenter) { described_class.new(project_member, current_user: user) } describe '#can_resend_invite?' do context 'when project_member is invited' do before do expect(project_member).to receive(:invite?).and_return(true) end context 'and user can admin_project_member' do before do allow(presenter).to receive(:can?).with(user, :admin_project_member, project).and_return(true) end it { expect(presenter.can_resend_invite?).to eq(true) } end context 'and user cannot admin_project_member' do before do allow(presenter).to receive(:can?).with(user, :admin_project_member, project).and_return(false) end it { expect(presenter.can_resend_invite?).to eq(false) } end end context 'when project_member is not invited' do before do expect(project_member).to receive(:invite?).and_return(false) end context 'and user can admin_project_member' do before do allow(presenter).to receive(:can?).with(user, :admin_project_member, project).and_return(true) end it { expect(presenter.can_resend_invite?).to eq(false) } end context 'and user cannot admin_project_member' do before do allow(presenter).to receive(:can?).with(user, :admin_project_member, project).and_return(false) end it { expect(presenter.can_resend_invite?).to eq(false) } end end end describe '#last_owner?' do context 'when member is the holder of the personal namespace' do before do allow(project_member).to receive(:holder_of_the_personal_namespace?).and_return(true) end it { expect(presenter.last_owner?).to eq(true) } end context 'when member is not the holder of the personal namespace' do before do allow(project_member).to receive(:holder_of_the_personal_namespace?).and_return(false) end it { expect(presenter.last_owner?).to eq(false) } end end describe '#can_update?' do context 'when user is NOT attempting to update an Owner' do before do allow(project_member).to receive(:owner?).and_return(false) end context 'when user can update_project_member' do before do allow(presenter).to receive(:can?).with(user, :update_project_member, presenter).and_return(true) end specify { expect(presenter.can_update?).to eq(true) } end context 'when user cannot update_project_member' do before do allow(presenter).to receive(:can?).with(user, :update_project_member, presenter).and_return(false) allow(presenter).to receive(:can?).with(user, :override_project_member, presenter).and_return(false) end specify { expect(presenter.can_update?).to eq(false) } end end context 'when user is attempting to update an Owner' do before do allow(project_member).to receive(:owner?).and_return(true) end context 'when user can manage owners' do before do allow(presenter).to receive(:can?).with(user, :manage_owners, project).and_return(true) end specify { expect(presenter.can_update?).to eq(true) } end context 'when user cannot manage owners' do before do allow(presenter).to receive(:can?).with(user, :manage_owners, project).and_return(false) end specify { expect(presenter.can_update?).to eq(false) } end end end describe '#can_remove?' do context 'when user is NOT attempting to remove an Owner' do before do allow(project_member).to receive(:owner?).and_return(false) end context 'when user can destroy_project_member' do before do allow(presenter).to receive(:can?).with(user, :destroy_project_member, presenter).and_return(true) end specify { expect(presenter.can_remove?).to eq(true) } end context 'when user cannot destroy_project_member' do before do allow(presenter).to receive(:can?).with(user, :destroy_project_member, presenter).and_return(false) end specify { expect(presenter.can_remove?).to eq(false) } end end context 'when user is attempting to remove an Owner' do before do allow(project_member).to receive(:owner?).and_return(true) end context 'when user can manage owners' do before do allow(presenter).to receive(:can?).with(user, :manage_owners, project).and_return(true) end specify { expect(presenter.can_remove?).to eq(true) } end context 'when user cannot manage owners' do before do allow(presenter).to receive(:can?).with(user, :manage_owners, project).and_return(false) end specify { expect(presenter.can_remove?).to eq(false) } end end end describe '#can_approve?' do context 'when project_member has request an invite' do before do expect(project_member).to receive(:request?).and_return(true) end context 'and user can update_project_member' do before do allow(presenter).to receive(:can_update?).and_return(true) end it { expect(presenter.can_approve?).to eq(true) } end context 'and user cannot update_project_member' do before do allow(presenter).to receive(:can_update?).and_return(false) end it { expect(presenter.can_approve?).to eq(false) } end end context 'when project_member did not request an invite' do before do expect(project_member).to receive(:request?).and_return(false) end context 'and user can update_project_member' do before do allow(presenter).to receive(:can_update?).and_return(true) end it { expect(presenter.can_approve?).to eq(false) } end context 'and user cannot update_project_member' do before do allow(presenter).to receive(:can_update?).and_return(false) end it { expect(presenter.can_approve?).to eq(false) } end end end describe 'valid level roles' do before do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(member_user, :manage_owners, entity).and_return(can_manage_owners) end context 'when user cannot manage owners' do it_behaves_like '#valid_level_roles', :project do let(:expected_roles) { { 'Developer' => 30, 'Maintainer' => 40, 'Reporter' => 20 } } let(:can_manage_owners) { false } before do entity.group = group end end end context 'when user can manage owners' do it_behaves_like '#valid_level_roles', :project do let(:expected_roles) { { 'Developer' => 30, 'Maintainer' => 40, 'Owner' => 50, 'Reporter' => 20 } } let(:can_manage_owners) { true } before do entity.group = group end end end end end