2021-01-29 00:20:46 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
RSpec.describe API::NpmProjectPackages, feature_category: :package_registry do
|
2023-06-20 00:43:36 +05:30
|
|
|
include ExclusiveLeaseHelpers
|
|
|
|
|
2021-01-29 00:20:46 +05:30
|
|
|
include_context 'npm api setup'
|
|
|
|
|
2023-01-13 00:05:48 +05:30
|
|
|
shared_examples 'accept get request on private project with access to package registry for everyone' do
|
|
|
|
subject { get(url) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.update!(visibility_level: Gitlab::VisibilityLevel::PRIVATE)
|
|
|
|
project.project_feature.update!(package_registry_access_level: ProjectFeature::PUBLIC)
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
2023-01-13 00:05:48 +05:30
|
|
|
|
|
|
|
it_behaves_like 'returning response status', :ok
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /api/v4/projects/:id/packages/npm/*package_name' do
|
|
|
|
let(:url) { api("/projects/#{project.id}/packages/npm/#{package_name}") }
|
|
|
|
|
|
|
|
it_behaves_like 'handling get metadata requests', scope: :project
|
|
|
|
it_behaves_like 'accept get request on private project with access to package registry for everyone'
|
2023-07-07 10:43:13 +05:30
|
|
|
it_behaves_like 'rejects invalid package names' do
|
|
|
|
subject { get(url) }
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /api/v4/projects/:id/packages/npm/-/package/*package_name/dist-tags' do
|
2023-01-13 00:05:48 +05:30
|
|
|
let(:url) { api("/projects/#{project.id}/packages/npm/-/package/#{package_name}/dist-tags") }
|
|
|
|
|
|
|
|
it_behaves_like 'handling get dist tags requests', scope: :project
|
|
|
|
it_behaves_like 'accept get request on private project with access to package registry for everyone'
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe 'PUT /api/v4/projects/:id/packages/npm/-/package/*package_name/dist-tags/:tag' do
|
2021-03-11 19:13:27 +05:30
|
|
|
it_behaves_like 'handling create dist tag requests', scope: :project do
|
2021-01-29 00:20:46 +05:30
|
|
|
let(:url) { api("/projects/#{project.id}/packages/npm/-/package/#{package_name}/dist-tags/#{tag_name}") }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'DELETE /api/v4/projects/:id/packages/npm/-/package/*package_name/dist-tags/:tag' do
|
2021-03-11 19:13:27 +05:30
|
|
|
it_behaves_like 'handling delete dist tag requests', scope: :project do
|
2021-01-29 00:20:46 +05:30
|
|
|
let(:url) { api("/projects/#{project.id}/packages/npm/-/package/#{package_name}/dist-tags/#{tag_name}") }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
describe 'POST /api/v4/projects/:id/packages/npm/-/npm/v1/security/advisories/bulk' do
|
|
|
|
it_behaves_like 'handling audit request', path: 'advisories/bulk', scope: :project do
|
|
|
|
let(:url) { api("/projects/#{project.id}/packages/npm/-/npm/v1/security/advisories/bulk") }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'POST /api/v4/projects/:id/packages/npm/-/npm/v1/security/audits/quick' do
|
|
|
|
it_behaves_like 'handling audit request', path: 'audits/quick', scope: :project do
|
|
|
|
let(:url) { api("/projects/#{project.id}/packages/npm/-/npm/v1/security/audits/quick") }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-01-29 00:20:46 +05:30
|
|
|
describe 'GET /api/v4/projects/:id/packages/npm/*package_name/-/*file_name' do
|
2021-04-17 20:07:23 +05:30
|
|
|
let(:package_file) { package.package_files.first }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-03-11 19:13:27 +05:30
|
|
|
let(:headers) { {} }
|
|
|
|
let(:url) { api("/projects/#{project.id}/packages/npm/#{package.name}/-/#{package_file.file_name}") }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-03-11 19:13:27 +05:30
|
|
|
subject { get(url, headers: headers) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.add_developer(user)
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-29 21:17:54 +05:30
|
|
|
shared_examples 'successfully downloads the file' do
|
|
|
|
it 'returns the file' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(response.media_type).to eq('application/octet-stream')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-01-29 00:20:46 +05:30
|
|
|
shared_examples 'a package file that requires auth' do
|
|
|
|
it 'denies download with no token' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with access token' do
|
2022-08-27 11:52:29 +05:30
|
|
|
let(:headers) { build_token_auth_header(token.plaintext_token) }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-29 21:17:54 +05:30
|
|
|
it_behaves_like 'successfully downloads the file'
|
2022-08-13 15:12:31 +05:30
|
|
|
it_behaves_like 'a package tracking event', 'API::NpmPackages', 'pull_package'
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'bumping the package last downloaded at field'
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'with job token' do
|
2021-03-11 19:13:27 +05:30
|
|
|
let(:headers) { build_token_auth_header(job.token) }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-29 21:17:54 +05:30
|
|
|
it_behaves_like 'successfully downloads the file'
|
2022-08-13 15:12:31 +05:30
|
|
|
it_behaves_like 'a package tracking event', 'API::NpmPackages', 'pull_package'
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'bumping the package last downloaded at field'
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'a public project' do
|
2021-04-29 21:17:54 +05:30
|
|
|
it_behaves_like 'successfully downloads the file'
|
|
|
|
it_behaves_like 'a package tracking event', 'API::NpmPackages', 'pull_package'
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'bumping the package last downloaded at field'
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-29 21:17:54 +05:30
|
|
|
context 'with a job token for a different user' do
|
|
|
|
let_it_be(:other_user) { create(:user) }
|
2021-10-27 15:23:28 +05:30
|
|
|
let_it_be_with_reload(:other_job) { create(:ci_build, :running, user: other_user) }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-29 21:17:54 +05:30
|
|
|
let(:headers) { build_token_auth_header(other_job.token) }
|
|
|
|
|
|
|
|
it_behaves_like 'successfully downloads the file'
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'private project' do
|
2023-05-27 22:25:52 +05:30
|
|
|
let(:snowplow_gitlab_standard_context) { { project: project, namespace: project.namespace, user: user, property: 'i_package_npm_user' } }
|
|
|
|
|
2021-01-29 00:20:46 +05:30
|
|
|
before do
|
|
|
|
project.update!(visibility_level: Gitlab::VisibilityLevel::PRIVATE)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'a package file that requires auth'
|
|
|
|
|
|
|
|
context 'with guest' do
|
2022-08-27 11:52:29 +05:30
|
|
|
let(:headers) { build_token_auth_header(token.plaintext_token) }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
|
|
|
it 'denies download when not enough permissions' do
|
|
|
|
project.add_guest(user)
|
|
|
|
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:forbidden)
|
|
|
|
end
|
|
|
|
end
|
2023-01-13 00:05:48 +05:30
|
|
|
|
|
|
|
context 'with access to package registry for everyone' do
|
|
|
|
before do
|
|
|
|
project.project_feature.update!(package_registry_access_level: ProjectFeature::PUBLIC)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'successfully downloads the file'
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'internal project' do
|
2023-05-27 22:25:52 +05:30
|
|
|
let(:snowplow_gitlab_standard_context) { { project: project, namespace: project.namespace, user: user, property: 'i_package_npm_user' } }
|
|
|
|
|
2021-01-29 00:20:46 +05:30
|
|
|
before do
|
|
|
|
project.update!(visibility_level: Gitlab::VisibilityLevel::INTERNAL)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'a package file that requires auth'
|
2022-08-13 15:12:31 +05:30
|
|
|
|
|
|
|
context 'with a job token for a different user' do
|
|
|
|
let_it_be(:other_user) { create(:user) }
|
|
|
|
let_it_be_with_reload(:other_job) { create(:ci_build, :running, user: other_user) }
|
|
|
|
|
|
|
|
let(:headers) { build_token_auth_header(other_job.token) }
|
|
|
|
|
|
|
|
it_behaves_like 'successfully downloads the file'
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'PUT /api/v4/projects/:id/packages/npm/:package_name' do
|
2021-03-11 19:13:27 +05:30
|
|
|
before do
|
|
|
|
project.add_developer(user)
|
|
|
|
end
|
|
|
|
|
2021-11-11 11:23:49 +05:30
|
|
|
subject(:upload_package_with_token) { upload_with_token(package_name, params) }
|
|
|
|
|
2021-03-11 19:13:27 +05:30
|
|
|
shared_examples 'handling invalid record with 400 error' do
|
2021-01-29 00:20:46 +05:30
|
|
|
it 'handles an ActiveRecord::RecordInvalid exception with 400 error' do
|
2021-11-11 11:23:49 +05:30
|
|
|
expect { upload_package_with_token }
|
2021-01-29 00:20:46 +05:30
|
|
|
.not_to change { project.packages.count }
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:bad_request)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when params are correct' do
|
|
|
|
context 'invalid package record' do
|
|
|
|
context 'invalid package name' do
|
|
|
|
let(:package_name) { "@#{group.path}/my_inv@@lid_package_name" }
|
|
|
|
let(:params) { upload_params(package_name: package_name) }
|
|
|
|
|
|
|
|
it_behaves_like 'handling invalid record with 400 error'
|
2021-11-11 11:23:49 +05:30
|
|
|
it_behaves_like 'not a package tracking event'
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'invalid package version' do
|
|
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
|
|
|
|
let(:package_name) { "@#{group.path}/my_package_name" }
|
|
|
|
|
|
|
|
where(:version) do
|
|
|
|
[
|
|
|
|
'1',
|
|
|
|
'1.2',
|
|
|
|
'1./2.3',
|
|
|
|
'../../../../../1.2.3',
|
|
|
|
'%2e%2e%2f1.2.3'
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
with_them do
|
|
|
|
let(:params) { upload_params(package_name: package_name, package_version: version) }
|
|
|
|
|
|
|
|
it_behaves_like 'handling invalid record with 400 error'
|
2021-11-11 11:23:49 +05:30
|
|
|
it_behaves_like 'not a package tracking event'
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
end
|
2023-07-09 08:55:56 +05:30
|
|
|
|
|
|
|
context 'invalid package attachment data' do
|
|
|
|
let(:package_name) { "@#{group.path}/my_package_name" }
|
|
|
|
let(:params) { upload_params(package_name: package_name, file: 'npm/payload_with_empty_attachment.json') }
|
|
|
|
|
|
|
|
it_behaves_like 'handling invalid record with 400 error'
|
|
|
|
it_behaves_like 'not a package tracking event'
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
2021-10-27 15:23:28 +05:30
|
|
|
context 'valid package params' do
|
|
|
|
let_it_be(:version) { '1.2.3' }
|
|
|
|
|
|
|
|
let(:params) { upload_params(package_name: package_name, package_version: version) }
|
2023-03-04 22:38:38 +05:30
|
|
|
let(:snowplow_gitlab_standard_context) { { project: project, namespace: project.namespace, user: user, property: 'i_package_npm_user' } }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
shared_examples 'handling upload with different authentications' do
|
|
|
|
context 'with access token' do
|
|
|
|
it_behaves_like 'a package tracking event', 'API::NpmPackages', 'push_package'
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2023-06-20 00:43:36 +05:30
|
|
|
it_behaves_like 'a successful package creation'
|
2021-04-17 20:07:23 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates npm package with file with job token' do
|
2021-11-11 11:23:49 +05:30
|
|
|
expect { upload_with_job_token(package_name, params) }
|
2021-01-29 00:20:46 +05:30
|
|
|
.to change { project.packages.count }.by(1)
|
|
|
|
.and change { Packages::PackageFile.count }.by(1)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
context 'with an authenticated job token' do
|
|
|
|
let!(:job) { create(:ci_build, user: user) }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
before do
|
|
|
|
Grape::Endpoint.before_each do |endpoint|
|
|
|
|
expect(endpoint).to receive(:current_authenticated_job) { job }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
Grape::Endpoint.before_each nil
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
it 'creates the package metadata' do
|
2021-11-11 11:23:49 +05:30
|
|
|
upload_package_with_token
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(project.reload.packages.find(json_response['id']).original_build_info.pipeline).to eq job.pipeline
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
end
|
2021-04-17 20:07:23 +05:30
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-10-27 15:23:28 +05:30
|
|
|
shared_examples 'uploading the package' do
|
|
|
|
it 'uploads the package' do
|
2021-11-11 11:23:49 +05:30
|
|
|
expect { upload_package_with_token }
|
2021-10-27 15:23:28 +05:30
|
|
|
.to change { project.packages.count }.by(1)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
context 'with a scoped name' do
|
|
|
|
let(:package_name) { "@#{group.path}/my_package_name" }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
it_behaves_like 'handling upload with different authentications'
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
|
2021-04-17 20:07:23 +05:30
|
|
|
context 'with any scoped name' do
|
|
|
|
let(:package_name) { "@any_scope/my_package_name" }
|
|
|
|
|
|
|
|
it_behaves_like 'handling upload with different authentications'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with an unscoped name' do
|
|
|
|
let(:package_name) { "my_unscoped_package_name" }
|
|
|
|
|
|
|
|
it_behaves_like 'handling upload with different authentications'
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
2021-10-27 15:23:28 +05:30
|
|
|
|
|
|
|
context 'with an existing package' do
|
|
|
|
let_it_be(:second_project) { create(:project, namespace: namespace) }
|
|
|
|
|
|
|
|
context 'following the naming convention' do
|
|
|
|
let_it_be(:second_package) { create(:npm_package, project: second_project, name: "@#{group.path}/test", version: version) }
|
|
|
|
|
|
|
|
let(:package_name) { "@#{group.path}/test" }
|
|
|
|
|
|
|
|
it_behaves_like 'handling invalid record with 400 error'
|
2021-11-11 11:23:49 +05:30
|
|
|
it_behaves_like 'not a package tracking event'
|
2021-10-27 15:23:28 +05:30
|
|
|
|
|
|
|
context 'with a new version' do
|
|
|
|
let_it_be(:version) { '4.5.6' }
|
|
|
|
|
|
|
|
it_behaves_like 'uploading the package'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'not following the naming convention' do
|
|
|
|
let_it_be(:second_package) { create(:npm_package, project: second_project, name: "@any_scope/test", version: version) }
|
|
|
|
|
|
|
|
let(:package_name) { "@any_scope/test" }
|
|
|
|
|
|
|
|
it_behaves_like 'uploading the package'
|
|
|
|
end
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'package creation fails' do
|
|
|
|
let(:package_name) { "@#{group.path}/my_package_name" }
|
|
|
|
let(:params) { upload_params(package_name: package_name) }
|
|
|
|
|
2021-11-11 11:23:49 +05:30
|
|
|
before do
|
2021-01-29 00:20:46 +05:30
|
|
|
create(:npm_package, project: project, version: '1.0.1', name: "@#{group.path}/my_package_name")
|
2021-11-11 11:23:49 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'not a package tracking event'
|
|
|
|
|
|
|
|
it 'returns an error if the package already exists' do
|
|
|
|
expect { upload_package_with_token }
|
2021-01-29 00:20:46 +05:30
|
|
|
.not_to change { project.packages.count }
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:forbidden)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with dependencies' do
|
|
|
|
let(:package_name) { "@#{group.path}/my_package_name" }
|
|
|
|
let(:params) { upload_params(package_name: package_name, file: 'npm/payload_with_duplicated_packages.json') }
|
|
|
|
|
|
|
|
it 'creates npm package with file and dependencies' do
|
2021-11-11 11:23:49 +05:30
|
|
|
expect { upload_package_with_token }
|
2021-01-29 00:20:46 +05:30
|
|
|
.to change { project.packages.count }.by(1)
|
|
|
|
.and change { Packages::PackageFile.count }.by(1)
|
2022-08-27 11:52:29 +05:30
|
|
|
.and change { Packages::Dependency.count }.by(4)
|
|
|
|
.and change { Packages::DependencyLink.count }.by(6)
|
2021-01-29 00:20:46 +05:30
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with existing dependencies' do
|
|
|
|
before do
|
|
|
|
name = "@#{group.path}/existing_package"
|
2021-11-11 11:23:49 +05:30
|
|
|
upload_with_token(name, upload_params(package_name: name, file: 'npm/payload_with_duplicated_packages.json'))
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'reuses them' do
|
2021-11-11 11:23:49 +05:30
|
|
|
expect { upload_package_with_token }
|
2021-01-29 00:20:46 +05:30
|
|
|
.to change { project.packages.count }.by(1)
|
|
|
|
.and change { Packages::PackageFile.count }.by(1)
|
2022-08-27 11:52:29 +05:30
|
|
|
.and not_change { Packages::Dependency.count }
|
|
|
|
.and change { Packages::DependencyLink.count }.by(6)
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2021-12-11 22:18:48 +05:30
|
|
|
|
2023-06-20 00:43:36 +05:30
|
|
|
context 'when the lease to create a package is already taken' do
|
|
|
|
let(:version) { '1.0.1' }
|
|
|
|
let(:params) { upload_params(package_name: package_name, package_version: version) }
|
|
|
|
let(:lease_key) { "packages:npm:create_package_service:packages:#{project.id}_#{package_name}_#{version}" }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_exclusive_lease_taken(lease_key, timeout: Packages::Npm::CreatePackageService::DEFAULT_LEASE_TIMEOUT)
|
2021-12-11 22:18:48 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'not a package tracking event'
|
|
|
|
|
|
|
|
it 'returns an error' do
|
|
|
|
expect { upload_package_with_token }
|
|
|
|
.not_to change { project.packages.count }
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:bad_request)
|
2023-06-20 00:43:36 +05:30
|
|
|
expect(response.body).to include('Could not obtain package lease.')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with a too large metadata structure' do
|
|
|
|
let(:package_name) { "@#{group.path}/my_package_name" }
|
|
|
|
|
|
|
|
::Packages::Npm::CreatePackageService::PACKAGE_JSON_NOT_ALLOWED_FIELDS.each do |field|
|
|
|
|
context "when a large value for #{field} is set" do
|
|
|
|
let(:params) do
|
|
|
|
upload_params(package_name: package_name, package_version: '1.2.3').tap do |h|
|
|
|
|
h['versions']['1.2.3'][field] = 'test' * 10000
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'a successful package creation'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the large field is not one of the ignored fields' do
|
|
|
|
let(:params) do
|
|
|
|
upload_params(package_name: package_name, package_version: '1.2.3').tap do |h|
|
|
|
|
h['versions']['1.2.3']['test'] = 'test' * 10000
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'not a package tracking event'
|
|
|
|
|
|
|
|
it 'returns an error' do
|
|
|
|
expect { upload_package_with_token }
|
|
|
|
.not_to change { project.packages.count }
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:bad_request)
|
|
|
|
expect(response.body).to include('Validation failed: Package json structure is too large')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the Npm-Command in headers is deprecate' do
|
|
|
|
let(:package_name) { "@#{group.path}/my_package_name" }
|
|
|
|
let(:headers) { build_token_auth_header(token.plaintext_token).merge('Npm-Command' => 'deprecate') }
|
|
|
|
let(:params) do
|
|
|
|
{
|
|
|
|
'id' => project.id.to_s,
|
|
|
|
'package_name' => package_name,
|
|
|
|
'versions' => {
|
|
|
|
'1.0.1' => {
|
|
|
|
'name' => package_name,
|
|
|
|
'deprecated' => 'This version is deprecated'
|
|
|
|
},
|
|
|
|
'1.0.2' => {
|
|
|
|
'name' => package_name
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
subject(:request) { put api("/projects/#{project.id}/packages/npm/#{package_name.sub('/', '%2f')}"), params: params, headers: headers }
|
|
|
|
|
|
|
|
context 'when the user is not authorized to destroy the package' do
|
|
|
|
before do
|
|
|
|
project.add_developer(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not call DeprecatePackageService' do
|
|
|
|
expect(::Packages::Npm::DeprecatePackageService).not_to receive(:new)
|
|
|
|
|
|
|
|
request
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:forbidden)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the user is authorized to destroy the package' do
|
|
|
|
before do
|
|
|
|
project.add_maintainer(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'calls DeprecatePackageService with the correct arguments' do
|
|
|
|
expect(::Packages::Npm::DeprecatePackageService).to receive(:new).with(project, params) do
|
|
|
|
double.tap do |service|
|
|
|
|
expect(service).to receive(:execute).with(async: true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
request
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
2021-12-11 22:18:48 +05:30
|
|
|
end
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
def upload_package(package_name, params = {})
|
2021-03-11 19:13:27 +05:30
|
|
|
token = params.delete(:access_token) || params.delete(:job_token)
|
|
|
|
headers = build_token_auth_header(token)
|
|
|
|
put api("/projects/#{project.id}/packages/npm/#{package_name.sub('/', '%2f')}"), params: params, headers: headers
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
2021-11-11 11:23:49 +05:30
|
|
|
def upload_with_token(package_name, params = {})
|
2022-08-27 11:52:29 +05:30
|
|
|
upload_package(package_name, params.merge(access_token: token.plaintext_token))
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
2021-11-11 11:23:49 +05:30
|
|
|
def upload_with_job_token(package_name, params = {})
|
2021-01-29 00:20:46 +05:30
|
|
|
upload_package(package_name, params.merge(job_token: job.token))
|
|
|
|
end
|
|
|
|
|
|
|
|
def upload_params(package_name:, package_version: '1.0.1', file: 'npm/payload.json')
|
|
|
|
Gitlab::Json.parse(fixture_file("packages/#{file}")
|
|
|
|
.gsub('@root/npm-test', package_name)
|
|
|
|
.gsub('1.0.1', package_version))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|