debian-mirror-gitlab/spec/controllers/projects_controller_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1885 lines
60 KiB
Ruby
Raw Normal View History

2019-07-31 22:56:46 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
require('spec_helper')
2023-04-23 21:23:45 +05:30
RSpec.describe ProjectsController, feature_category: :projects do
2019-07-07 11:18:12 +05:30
include ExternalAuthorizationServiceHelpers
2018-03-17 18:26:18 +05:30
include ProjectForksHelper
2021-03-11 19:13:27 +05:30
using RSpec::Parameterized::TableSyntax
2018-03-17 18:26:18 +05:30
2021-09-04 01:27:46 +05:30
let_it_be(:project, reload: true) { create(:project, :with_export, service_desk_enabled: false) }
2021-02-22 17:27:13 +05:30
let_it_be(:public_project) { create(:project, :public) }
let_it_be(:user) { create(:user) }
2021-04-29 21:17:54 +05:30
2018-11-08 19:23:39 +05:30
let(:jpg) { fixture_file_upload('spec/fixtures/rails_sample.jpg', 'image/jpg') }
let(:txt) { fixture_file_upload('spec/fixtures/doc_sample.txt', 'text/plain') }
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
describe 'GET new' do
context 'with an authenticated user' do
2021-02-22 17:27:13 +05:30
let_it_be(:group) { create(:group) }
2018-03-17 18:26:18 +05:30
before do
sign_in(user)
end
context 'when namespace_id param is present' do
context 'when user has access to the namespace' do
it 'renders the template' do
group.add_owner(user)
2019-02-15 15:39:39 +05:30
get :new, params: { namespace_id: group.id }
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2018-03-17 18:26:18 +05:30
expect(response).to render_template('new')
end
end
context 'when user does not have access to the namespace' do
it 'responds with status 404' do
2019-02-15 15:39:39 +05:30
get :new, params: { namespace_id: group.id }
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2018-03-17 18:26:18 +05:30
expect(response).not_to render_template('new')
end
end
end
end
end
2017-08-17 22:00:37 +05:30
describe 'GET index' do
context 'as a user' do
it 'redirects to root page' do
sign_in(user)
get :index
expect(response).to redirect_to(root_path)
end
end
context 'as a guest' do
it 'redirects to Explore page' do
get :index
expect(response).to redirect_to(explore_root_path)
end
end
end
2014-09-02 18:07:02 +05:30
2020-02-01 01:16:34 +05:30
describe "GET #activity as JSON" do
2020-07-28 23:09:34 +05:30
include DesignManagementTestHelpers
2020-02-01 01:16:34 +05:30
render_views
2021-02-22 17:27:13 +05:30
let_it_be(:project) { create(:project, :public, issues_access_level: ProjectFeature::PRIVATE) }
2020-02-01 01:16:34 +05:30
before do
2020-07-28 23:09:34 +05:30
enable_design_management
2020-02-01 01:16:34 +05:30
create(:event, :created, project: project, target: create(:issue))
sign_in(user)
request.cookies[:event_filter] = 'all'
end
context 'when user has permission to see the event' do
before do
project.add_developer(user)
end
2020-07-28 23:09:34 +05:30
def get_activity(project)
2020-02-01 01:16:34 +05:30
get :activity, params: { namespace_id: project.namespace, id: project, format: :json }
2020-07-28 23:09:34 +05:30
end
it 'returns count' do
get_activity(project)
2020-02-01 01:16:34 +05:30
expect(json_response['count']).to eq(1)
end
2020-07-28 23:09:34 +05:30
context 'design events are visible' do
include DesignManagementTestHelpers
let(:other_project) { create(:project, namespace: user.namespace) }
before do
enable_design_management
create(:design_event, project: project)
request.cookies[:event_filter] = EventFilter::DESIGNS
end
it 'returns correct count' do
get_activity(project)
expect(json_response['count']).to eq(1)
end
end
2020-02-01 01:16:34 +05:30
end
context 'when user has no permission to see the event' do
it 'filters out invisible event' do
get :activity, params: { namespace_id: project.namespace, id: project, format: :json }
expect(json_response['html']).to eq("\n")
expect(json_response['count']).to eq(0)
end
end
end
2015-04-26 12:48:37 +05:30
describe "GET show" do
2016-06-02 11:05:42 +05:30
context "user not project member" do
2017-09-10 17:25:29 +05:30
before do
sign_in(user)
end
2014-09-02 18:07:02 +05:30
2016-06-02 11:05:42 +05:30
context "user does not have access to project" do
2017-09-10 17:25:29 +05:30
let(:private_project) { create(:project, :private) }
2014-09-02 18:07:02 +05:30
2016-06-02 11:05:42 +05:30
it "does not initialize notification setting" do
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: private_project.namespace, id: private_project }
2016-06-02 11:05:42 +05:30
expect(assigns(:notification_setting)).to be_nil
end
end
context "user has access to project" do
2019-07-07 11:18:12 +05:30
before do
expect(::Gitlab::GitalyClient).to receive(:allow_ref_name_caching).and_call_original
end
2016-06-02 11:05:42 +05:30
context "and does not have notification setting" do
it "initializes notification as disabled" do
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: public_project.namespace, id: public_project }
2016-06-02 11:05:42 +05:30
expect(assigns(:notification_setting).level).to eq("global")
end
end
2014-09-02 18:07:02 +05:30
2016-06-02 11:05:42 +05:30
context "and has notification setting" do
before do
setting = user.notification_settings_for(public_project)
setting.level = :watch
2021-04-29 21:17:54 +05:30
setting.save!
2016-06-02 11:05:42 +05:30
end
2015-09-11 14:41:01 +05:30
2016-06-02 11:05:42 +05:30
it "shows current notification setting" do
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: public_project.namespace, id: public_project }
2016-06-02 11:05:42 +05:30
expect(assigns(:notification_setting).level).to eq("watch")
end
end
2023-05-08 21:46:49 +05:30
context 'when there is a tag with the same name as the default branch' do
let_it_be(:tagged_project) { create(:project, :public, :custom_repo, files: ['somefile']) }
let(:tree_with_default_branch) do
branch = tagged_project.repository.find_branch(tagged_project.default_branch)
project_tree_path(tagged_project, branch.target)
end
before do
tagged_project.repository.create_file(
tagged_project.creator,
'file_for_tag',
'content for file',
message: "Automatically created file",
branch_name: 'branch-to-tag'
)
tagged_project.repository.add_tag(
tagged_project.creator,
tagged_project.default_branch, # tag name
'branch-to-tag' # target
)
end
it 'redirects to tree view for the default branch' do
get :show, params: { namespace_id: tagged_project.namespace, id: tagged_project }
expect(response).to redirect_to(tree_with_default_branch)
end
end
2023-07-07 10:43:13 +05:30
context 'when the default branch name is ambiguous' do
let_it_be(:project_with_default_branch) do
create(:project, :public, :custom_repo, files: ['somefile'])
2023-05-08 21:46:49 +05:30
end
2023-07-07 10:43:13 +05:30
shared_examples 'ambiguous ref redirects' do
let(:project) { project_with_default_branch }
let(:branch_ref) { "refs/heads/#{ref}" }
let(:repo) { project.repository }
2023-05-08 21:46:49 +05:30
2023-07-07 10:43:13 +05:30
before do
repo.create_branch(branch_ref, 'master')
repo.change_head(ref)
2023-05-08 21:46:49 +05:30
end
2023-07-07 10:43:13 +05:30
after do
repo.change_head('master')
repo.delete_branch(branch_ref)
2023-05-08 21:46:49 +05:30
end
2023-07-07 10:43:13 +05:30
subject do
get(
:show,
params: {
namespace_id: project.namespace,
id: project
}
)
end
context 'when there is no conflicting ref' do
let(:other_ref) { 'non-existent-ref' }
it { is_expected.to have_gitlab_http_status(:ok) }
2023-05-08 21:46:49 +05:30
end
2023-07-07 10:43:13 +05:30
context 'and that other ref exists' do
let(:other_ref) { 'master' }
let(:project_default_root_tree_path) do
sha = repo.find_branch(project.default_branch).target
project_tree_path(project, sha)
end
it 'redirects to tree view for the default branch' do
is_expected.to redirect_to(project_default_root_tree_path)
end
2023-05-08 21:46:49 +05:30
end
end
2023-07-07 10:43:13 +05:30
context 'when ref starts with ref/heads/' do
let(:ref) { "refs/heads/#{other_ref}" }
include_examples 'ambiguous ref redirects'
end
context 'when ref starts with ref/tags/' do
let(:ref) { "refs/tags/#{other_ref}" }
include_examples 'ambiguous ref redirects'
end
context 'when ref starts with heads/' do
let(:ref) { "heads/#{other_ref}" }
include_examples 'ambiguous ref redirects'
end
context 'when ref starts with tags/' do
let(:ref) { "tags/#{other_ref}" }
include_examples 'ambiguous ref redirects'
end
2023-05-08 21:46:49 +05:30
end
2014-09-02 18:07:02 +05:30
end
2016-11-03 12:29:30 +05:30
describe "when project repository is disabled" do
render_views
before do
2018-03-17 18:26:18 +05:30
project.add_developer(user)
2016-11-03 12:29:30 +05:30
project.project_feature.update_attribute(:repository_access_level, ProjectFeature::DISABLED)
end
it 'shows wiki homepage' do
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: project.namespace, id: project }
2016-11-03 12:29:30 +05:30
expect(response).to render_template('projects/_wiki')
end
it 'shows issues list page if wiki is disabled' do
project.project_feature.update_attribute(:wiki_access_level, ProjectFeature::DISABLED)
2017-08-17 22:00:37 +05:30
create(:issue, project: project)
2016-11-03 12:29:30 +05:30
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: project.namespace, id: project }
2016-11-03 12:29:30 +05:30
expect(response).to render_template('projects/issues/_issues')
2017-08-17 22:00:37 +05:30
expect(assigns(:issuable_meta_data)).not_to be_nil
2016-11-03 12:29:30 +05:30
end
2021-01-03 14:25:43 +05:30
it 'shows activity page if wiki and issues are disabled' do
2016-11-03 12:29:30 +05:30
project.project_feature.update_attribute(:wiki_access_level, ProjectFeature::DISABLED)
project.project_feature.update_attribute(:issues_access_level, ProjectFeature::DISABLED)
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: project.namespace, id: project }
2016-11-03 12:29:30 +05:30
2021-01-03 14:25:43 +05:30
expect(response).to render_template("projects/_activity")
2016-11-03 12:29:30 +05:30
end
it 'shows activity if enabled by user' do
user.update_attribute(:project_view, 'activity')
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: project.namespace, id: project }
2016-11-03 12:29:30 +05:30
expect(response).to render_template("projects/_activity")
end
end
2014-09-02 18:07:02 +05:30
end
2015-10-24 18:46:33 +05:30
2016-08-24 12:49:21 +05:30
context "project with empty repo" do
2021-02-22 17:27:13 +05:30
let_it_be(:empty_project) { create(:project_empty_repo, :public) }
2016-08-24 12:49:21 +05:30
2017-09-10 17:25:29 +05:30
before do
sign_in(user)
2021-04-17 20:07:23 +05:30
end
2016-08-24 12:49:21 +05:30
User.project_views.keys.each do |project_view|
context "with #{project_view} view set" do
before do
2021-04-29 21:17:54 +05:30
user.update!(project_view: project_view)
2016-08-24 12:49:21 +05:30
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: empty_project.namespace, id: empty_project }
2016-08-24 12:49:21 +05:30
end
2021-09-04 01:27:46 +05:30
it "renders the empty project view" do
2016-08-24 12:49:21 +05:30
expect(response).to render_template('empty')
end
end
end
end
2016-11-03 12:29:30 +05:30
context "project with broken repo" do
2022-11-25 23:54:43 +05:30
let_it_be(:empty_project) { create(:project, :public) }
2016-11-03 12:29:30 +05:30
2017-09-10 17:25:29 +05:30
before do
sign_in(user)
end
2016-11-03 12:29:30 +05:30
User.project_views.keys.each do |project_view|
context "with #{project_view} view set" do
before do
2021-04-29 21:17:54 +05:30
user.update!(project_view: project_view)
2016-11-03 12:29:30 +05:30
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: empty_project.namespace, id: empty_project }
2016-11-03 12:29:30 +05:30
end
it "renders the empty project view" do
expect(response).to render_template('projects/no_repo')
end
end
end
end
2015-11-26 14:37:03 +05:30
context "rendering default project view" do
2021-02-22 17:27:13 +05:30
let_it_be(:public_project) { create(:project, :public, :repository) }
2017-08-17 22:00:37 +05:30
2015-11-26 14:37:03 +05:30
render_views
2021-02-22 17:27:13 +05:30
def get_show
get :show, params: { namespace_id: public_project.namespace, id: public_project }
end
2015-11-26 14:37:03 +05:30
it "renders the activity view" do
allow(controller).to receive(:current_user).and_return(user)
allow(user).to receive(:project_view).and_return('activity')
2021-02-22 17:27:13 +05:30
get_show
2015-11-26 14:37:03 +05:30
expect(response).to render_template('_activity')
end
it "renders the files view" do
allow(controller).to receive(:current_user).and_return(user)
allow(user).to receive(:project_view).and_return('files')
2021-02-22 17:27:13 +05:30
get_show
2015-11-26 14:37:03 +05:30
expect(response).to render_template('_files')
end
2018-03-17 18:26:18 +05:30
it "renders the readme view" do
allow(controller).to receive(:current_user).and_return(user)
allow(user).to receive(:project_view).and_return('readme')
2021-02-22 17:27:13 +05:30
get_show
2018-03-17 18:26:18 +05:30
expect(response).to render_template('_readme')
end
2021-02-22 17:27:13 +05:30
it 'does not make Gitaly requests', :request_store, :clean_gitlab_redis_cache do
# Warm up to populate repository cache
get_show
RequestStore.clear!
expect { get_show }.not_to change { Gitlab::GitalyClient.get_request_count }
end
2021-10-29 20:43:33 +05:30
2021-11-18 22:05:49 +05:30
it "renders files even with invalid license" do
2022-11-25 23:54:43 +05:30
invalid_license = ::Gitlab::Git::DeclaredLicense.new(key: 'woozle', name: 'woozle wuzzle')
2021-11-18 22:05:49 +05:30
controller.instance_variable_set(:@project, public_project)
2022-11-25 23:54:43 +05:30
expect(public_project.repository).to receive(:license).and_return(invalid_license).at_least(:once)
2021-11-18 22:05:49 +05:30
get_show
expect(response).to have_gitlab_http_status(:ok)
expect(response).to render_template('_files')
2022-11-25 23:54:43 +05:30
expect(response.body).to have_content('woozle wuzzle')
2021-11-18 22:05:49 +05:30
end
2022-07-16 23:28:13 +05:30
describe 'tracking events', :snowplow do
before do
allow(controller).to receive(:current_user).and_return(user)
get_show
end
it 'tracks page views' do
expect_snowplow_event(
category: 'project_overview',
action: 'render',
user: user,
project: public_project
)
end
context 'when the project is importing' do
let_it_be(:public_project) { create(:project, :public, :import_scheduled) }
it 'does not track page views' do
expect_no_snowplow_event(
category: 'project_overview',
action: 'render',
user: user,
project: public_project
)
end
end
end
2021-10-29 20:43:33 +05:30
describe "PUC highlighting" do
render_views
before do
expect(controller).to receive(:find_routable!).and_return(public_project)
end
context "option is enabled" do
it "adds the highlighting class" do
expect(public_project).to receive(:warn_about_potentially_unwanted_characters?).and_return(true)
get_show
expect(response.body).to have_css(".project-highlight-puc")
end
end
context "option is disabled" do
it "doesn't add the highlighting class" do
expect(public_project).to receive(:warn_about_potentially_unwanted_characters?).and_return(false)
get_show
expect(response.body).not_to have_css(".project-highlight-puc")
end
end
end
2015-11-26 14:37:03 +05:30
end
2016-04-02 18:10:28 +05:30
context "when the url contains .atom" do
2017-09-10 17:25:29 +05:30
let(:public_project_with_dot_atom) { build(:project, :public, name: 'my.atom', path: 'my.atom') }
2016-04-02 18:10:28 +05:30
2016-09-13 17:45:13 +05:30
it 'expects an error creating the project' do
2016-04-02 18:10:28 +05:30
expect(public_project_with_dot_atom).not_to be_valid
end
end
context 'when the project is pending deletions' do
it 'renders a 404 error' do
2017-09-10 17:25:29 +05:30
project = create(:project, pending_delete: true)
sign_in(user)
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: project.namespace, id: project }
2020-04-22 19:07:51 +05:30
expect(response).to have_gitlab_http_status(:not_found)
end
end
2017-08-17 22:00:37 +05:30
2021-03-11 19:13:27 +05:30
context 'redirection from http://someproject.git' do
where(:user_type, :project_visibility, :expected_redirect) do
:anonymous | :public | :redirect_to_project
:anonymous | :internal | :redirect_to_signup
:anonymous | :private | :redirect_to_signup
2017-08-17 22:00:37 +05:30
2021-03-11 19:13:27 +05:30
:signed_in | :public | :redirect_to_project
:signed_in | :internal | :redirect_to_project
:signed_in | :private | nil
2017-08-17 22:00:37 +05:30
2021-03-11 19:13:27 +05:30
:member | :public | :redirect_to_project
:member | :internal | :redirect_to_project
:member | :private | :redirect_to_project
end
with_them do
let(:redirect_to_signup) { new_user_session_path }
let(:redirect_to_project) { project_path(project) }
let(:expected_status) { expected_redirect ? :found : :not_found }
before do
project.update!(visibility: project_visibility.to_s)
2022-08-13 15:12:31 +05:30
project.team.add_member(user, :guest) if user_type == :member
2021-03-11 19:13:27 +05:30
sign_in(user) unless user_type == :anonymous
end
it 'returns the expected status' do
get :show, params: { namespace_id: project.namespace, id: project }, format: :git
expect(response).to have_gitlab_http_status(expected_status)
expect(response).to redirect_to(send(expected_redirect)) if expected_status == :found
end
2017-08-17 22:00:37 +05:30
end
end
2018-03-17 18:26:18 +05:30
2021-06-21 23:55:49 +05:30
context 'when project is moved and git format is requested' do
let(:old_path) { project.path + 'old' }
before do
project.redirect_routes.create!(path: "#{project.namespace.full_path}/#{old_path}")
project.add_developer(user)
sign_in(user)
end
it 'redirects to new project path' do
get :show, params: { namespace_id: project.namespace, id: old_path }, format: :git
expect(response).to redirect_to(project_path(project, format: :git))
end
end
2018-03-17 18:26:18 +05:30
context 'when the project is forked and has a repository', :request_store do
let(:public_project) { create(:project, :public, :repository) }
let(:other_user) { create(:user) }
render_views
before do
# View the project as a user that does not have any rights
sign_in(other_user)
fork_project(public_project)
end
it 'does not increase the number of queries when the project is forked' do
expected_query = /#{public_project.fork_network.find_forks_in(other_user.namespace).to_sql}/
2019-02-15 15:39:39 +05:30
expect { get(:show, params: { namespace_id: public_project.namespace, id: public_project }) }
.not_to exceed_query_limit(2).for_query(expected_query)
2018-03-17 18:26:18 +05:30
end
end
2014-09-02 18:07:02 +05:30
end
2015-09-11 14:41:01 +05:30
2021-09-30 23:02:18 +05:30
describe 'POST create' do
subject { post :create, params: { project: params } }
before do
sign_in(user)
end
2021-11-18 22:05:49 +05:30
context 'on import' do
let(:params) do
{
path: 'foo',
description: 'bar',
namespace_id: user.namespace.id,
import_url: project.http_url_to_repo
}
end
context 'when import by url is disabled' do
before do
stub_application_setting(import_sources: [])
end
it 'does not create project and reports an error' do
expect { subject }.not_to change { Project.count }
expect(response).to have_gitlab_http_status(:not_found)
end
2021-09-30 23:02:18 +05:30
end
2021-11-18 22:05:49 +05:30
context 'when import by url is enabled' do
before do
stub_application_setting(import_sources: ['git'])
end
it 'creates project' do
expect { subject }.to change { Project.count }
2021-09-30 23:02:18 +05:30
2021-11-18 22:05:49 +05:30
expect(response).to have_gitlab_http_status(:redirect)
end
2021-09-30 23:02:18 +05:30
end
end
end
2018-11-20 20:47:30 +05:30
describe 'GET edit' do
2020-04-22 19:07:51 +05:30
it 'allows an admin user to access the page', :enable_admin_mode do
2019-09-04 21:01:54 +05:30
sign_in(create(:user, :admin))
2023-05-27 22:25:52 +05:30
get :edit, params: { namespace_id: project.namespace.path, id: project.path }
2019-09-04 21:01:54 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-09-04 21:01:54 +05:30
end
2018-11-20 20:47:30 +05:30
it 'sets the badge API endpoint' do
sign_in(user)
project.add_maintainer(user)
2023-05-27 22:25:52 +05:30
get :edit, params: { namespace_id: project.namespace.path, id: project.path }
2018-11-20 20:47:30 +05:30
expect(assigns(:badge_api_endpoint)).not_to be_nil
end
end
2019-12-04 20:38:33 +05:30
describe 'POST #archive' do
2021-02-22 17:27:13 +05:30
let_it_be(:group) { create(:group) }
let_it_be(:project) { create(:project, group: group) }
2019-12-04 20:38:33 +05:30
before do
sign_in(user)
end
context 'for a user with the ability to archive a project' do
before do
group.add_owner(user)
2023-05-27 22:25:52 +05:30
post :archive, params: { namespace_id: project.namespace.path, id: project.path }
2019-12-04 20:38:33 +05:30
end
it 'archives the project' do
expect(project.reload.archived?).to be_truthy
end
it 'redirects to projects path' do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2019-12-04 20:38:33 +05:30
expect(response).to redirect_to(project_path(project))
end
end
context 'for a user that does not have the ability to archive a project' do
before do
project.add_maintainer(user)
post :archive, params: {
namespace_id: project.namespace.path,
id: project.path
}
end
it 'does not archive the project' do
expect(project.reload.archived?).to be_falsey
end
it 'returns 404' do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-12-04 20:38:33 +05:30
end
end
end
describe 'POST #unarchive' do
2021-02-22 17:27:13 +05:30
let_it_be(:group) { create(:group) }
let_it_be(:project) { create(:project, :archived, group: group) }
2019-12-04 20:38:33 +05:30
before do
sign_in(user)
end
context 'for a user with the ability to unarchive a project' do
before do
group.add_owner(user)
post :unarchive, params: {
namespace_id: project.namespace.path,
id: project.path
}
end
it 'unarchives the project' do
expect(project.reload.archived?).to be_falsey
end
it 'redirects to projects path' do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2019-12-04 20:38:33 +05:30
expect(response).to redirect_to(project_path(project))
end
end
context 'for a user that does not have the ability to unarchive a project' do
before do
project.add_maintainer(user)
post :unarchive, params: {
namespace_id: project.namespace.path,
id: project.path
}
end
it 'does not unarchive the project' do
expect(project.reload.archived?).to be_truthy
end
it 'returns 404' do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-12-04 20:38:33 +05:30
end
end
end
2019-09-30 21:07:59 +05:30
describe '#housekeeping' do
2021-02-22 17:27:13 +05:30
let_it_be(:group) { create(:group) }
2023-04-23 21:23:45 +05:30
let(:housekeeping_service_dbl) { instance_double(Repositories::HousekeepingService) }
let(:params) do
{
namespace_id: project.namespace.path,
id: project.path,
prune: prune
}
end
2021-04-29 21:17:54 +05:30
2023-04-23 21:23:45 +05:30
let(:prune) { nil }
let_it_be(:project) { create(:project, group: group) }
2021-03-08 18:12:59 +05:30
let(:housekeeping) { Repositories::HousekeepingService.new(project) }
2019-09-30 21:07:59 +05:30
2023-04-23 21:23:45 +05:30
subject { post :housekeeping, params: params }
2019-09-30 21:07:59 +05:30
context 'when authenticated as owner' do
before do
group.add_owner(user)
sign_in(user)
2023-04-23 21:23:45 +05:30
allow(Repositories::HousekeepingService).to receive(:new).with(project, :eager).and_return(housekeeping)
2019-09-30 21:07:59 +05:30
end
it 'forces a full garbage collection' do
expect(housekeeping).to receive(:execute).once
post :housekeeping,
2023-04-23 21:23:45 +05:30
params: {
namespace_id: project.namespace.path,
id: project.path
}
2019-09-30 21:07:59 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2019-09-30 21:07:59 +05:30
end
2023-04-23 21:23:45 +05:30
it 'logs an audit event' do
expect(housekeeping).to receive(:execute).once.and_yield
expect(::Gitlab::Audit::Auditor).to receive(:audit).with(a_hash_including(
name: 'manually_trigger_housekeeping',
author: user,
scope: project,
target: project,
message: "Housekeeping task: eager"
))
subject
end
context 'and requesting prune' do
let(:prune) { true }
it 'enqueues pruning' do
allow(Repositories::HousekeepingService).to receive(:new).with(project, :prune).and_return(housekeeping_service_dbl)
expect(housekeeping_service_dbl).to receive(:execute)
subject
expect(response).to have_gitlab_http_status(:found)
end
end
2019-09-30 21:07:59 +05:30
end
context 'when authenticated as developer' do
let(:developer) { create(:user) }
before do
group.add_developer(developer)
end
it 'does not execute housekeeping' do
expect(housekeeping).not_to receive(:execute)
post :housekeeping,
2023-04-23 21:23:45 +05:30
params: {
namespace_id: project.namespace.path,
id: project.path
}
2019-09-30 21:07:59 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2019-09-30 21:07:59 +05:30
end
end
end
2020-04-22 19:07:51 +05:30
describe "#update", :enable_admin_mode do
2016-06-02 11:05:42 +05:30
render_views
let(:admin) { create(:admin) }
2017-08-17 22:00:37 +05:30
before do
sign_in(admin)
end
2016-06-02 11:05:42 +05:30
2018-03-27 19:54:05 +05:30
shared_examples_for 'updating a project' do
2020-11-24 15:15:51 +05:30
context 'when there is a conflicting project path' do
let(:random_name) { "project-#{SecureRandom.hex(8)}" }
let!(:conflict_project) { create(:project, name: random_name, path: random_name, namespace: project.namespace) }
it 'does not show any references to the conflicting path' do
expect { update_project(path: random_name) }.not_to change { project.reload.path }
expect(response).to have_gitlab_http_status(:ok)
expect(response.body).not_to include(random_name)
end
end
2018-03-27 19:54:05 +05:30
context 'when only renaming a project path' do
2020-11-24 15:15:51 +05:30
it "doesnt change the disk_path when using hashed storage" do
skip unless project.hashed_storage?(:repository)
hashed_storage_path = ::Storage::Hashed.new(project).disk_path
2023-03-04 22:38:38 +05:30
original_repository_path = project.repository.relative_path
2017-09-10 17:25:29 +05:30
2020-11-24 15:15:51 +05:30
expect { update_project path: 'renamed_path' }.to change { project.reload.path }
2018-03-27 19:54:05 +05:30
expect(project.path).to include 'renamed_path'
2017-09-10 17:25:29 +05:30
2023-03-04 22:38:38 +05:30
assign_repository_path = assigns(:repository).relative_path
2018-11-08 19:23:39 +05:30
2020-11-24 15:15:51 +05:30
expect(original_repository_path).to include(hashed_storage_path)
expect(assign_repository_path).to include(hashed_storage_path)
end
it "upgrades and move project to hashed storage when project was originally legacy" do
skip if project.hashed_storage?(:repository)
hashed_storage_path = Storage::Hashed.new(project).disk_path
2023-03-04 22:38:38 +05:30
original_repository_path = project.repository.relative_path
2020-11-24 15:15:51 +05:30
expect { update_project path: 'renamed_path' }.to change { project.reload.path }
expect(project.path).to include 'renamed_path'
2023-03-04 22:38:38 +05:30
assign_repository_path = assigns(:repository).relative_path
2018-03-27 19:54:05 +05:30
2020-11-24 15:15:51 +05:30
expect(original_repository_path).not_to include(hashed_storage_path)
expect(assign_repository_path).to include(hashed_storage_path)
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2018-03-27 19:54:05 +05:30
end
2017-09-10 17:25:29 +05:30
end
2016-06-02 11:05:42 +05:30
2018-03-27 19:54:05 +05:30
context 'when project has container repositories with tags' do
before do
stub_container_registry_config(enabled: true)
stub_container_registry_tags(repository: /image/, tags: %w[rc1])
create(:container_repository, project: project, name: :image)
end
it 'does not allow to rename the project' do
expect { update_project path: 'renamed_path' }
.not_to change { project.reload.path }
2017-09-10 17:25:29 +05:30
2021-03-08 18:12:59 +05:30
expect(controller).to set_flash[:alert].to(s_('UpdateProject|Cannot rename project because it contains container registry tags!'))
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2018-03-27 19:54:05 +05:30
end
2018-03-17 18:26:18 +05:30
end
2018-03-27 19:54:05 +05:30
it 'updates Fast Forward Merge attributes' do
controller.instance_variable_set(:@project, project)
params = {
merge_method: :ff
}
2018-03-17 18:26:18 +05:30
2023-05-27 22:25:52 +05:30
put :update, params: { namespace_id: project.namespace, id: project.id, project: params }
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2018-03-27 19:54:05 +05:30
params.each do |param, value|
expect(project.public_send(param)).to eq(value)
end
end
2018-03-17 18:26:18 +05:30
2019-04-03 18:18:56 +05:30
it 'does not update namespace' do
controller.instance_variable_set(:@project, project)
params = {
namespace_id: 'test'
}
expect do
2023-05-27 22:25:52 +05:30
put :update, params: { namespace_id: project.namespace, id: project.id, project: params }
2019-04-03 18:18:56 +05:30
end.not_to change { project.namespace.reload }
end
2018-03-27 19:54:05 +05:30
def update_project(**parameters)
2023-05-27 22:25:52 +05:30
put :update, params: { namespace_id: project.namespace.path, id: project.path, project: parameters }
2017-09-10 17:25:29 +05:30
end
end
2018-03-27 19:54:05 +05:30
context 'hashed storage' do
2021-02-22 17:27:13 +05:30
let_it_be(:project) { create(:project, :repository) }
2018-03-27 19:54:05 +05:30
it_behaves_like 'updating a project'
end
context 'legacy storage' do
2021-02-22 17:27:13 +05:30
let_it_be(:project) { create(:project, :repository, :legacy_storage) }
2018-03-27 19:54:05 +05:30
it_behaves_like 'updating a project'
2017-09-10 17:25:29 +05:30
end
2019-07-07 11:18:12 +05:30
context 'as maintainer' do
before do
project.add_maintainer(user)
sign_in(user)
end
it_behaves_like 'unauthorized when external service denies access' do
subject do
2023-05-27 22:25:52 +05:30
put :update, params: {
namespace_id: project.namespace, id: project, project: { description: 'Hello world' }
}
2019-07-07 11:18:12 +05:30
project.reload
end
it 'updates when the service allows access' do
external_service_allow_access(user, project)
expect { subject }.to change(project, :description)
end
it 'does not update when the service rejects access' do
external_service_deny_access(user, project)
expect { subject }.not_to change(project, :description)
end
end
end
2021-02-22 17:27:13 +05:30
context 'when updating boolean values on project_settings' do
using RSpec::Parameterized::TableSyntax
where(:boolean_value, :result) do
'1' | true
'0' | false
1 | true
0 | false
true | true
false | false
end
with_them do
it 'updates project settings attributes accordingly' do
put :update, params: {
namespace_id: project.namespace,
id: project.path,
project: {
project_setting_attributes: {
2022-07-16 23:28:13 +05:30
show_default_award_emojis: boolean_value,
enforce_auth_checks_on_uploads: boolean_value
2021-02-22 17:27:13 +05:30
}
}
}
project.reload
expect(project.show_default_award_emojis?).to eq(result)
2022-07-16 23:28:13 +05:30
expect(project.enforce_auth_checks_on_uploads?).to eq(result)
2021-10-27 15:23:28 +05:30
end
end
end
context 'with project feature attributes' do
2022-08-27 11:52:29 +05:30
let(:initial_value) { ProjectFeature::PRIVATE }
let(:update_to) { ProjectFeature::ENABLED }
2021-10-27 15:23:28 +05:30
2022-08-27 11:52:29 +05:30
before do
project.project_feature.update!(feature_access_level => initial_value)
2021-10-27 15:23:28 +05:30
end
2022-08-27 11:52:29 +05:30
def update_project_feature
put :update, params: {
namespace_id: project.namespace,
id: project.path,
project: {
project_feature_attributes: {
feature_access_level.to_s => update_to
2021-10-27 15:23:28 +05:30
}
}
2022-08-27 11:52:29 +05:30
}
end
2021-10-27 15:23:28 +05:30
2022-08-27 11:52:29 +05:30
shared_examples 'feature update success' do
it 'updates access level successfully' do
expect { update_project_feature }.to change {
project.reload.project_feature.public_send(feature_access_level)
2021-10-27 15:23:28 +05:30
}.from(initial_value).to(update_to)
2021-02-22 17:27:13 +05:30
end
end
2022-08-27 11:52:29 +05:30
shared_examples 'feature update failure' do
it 'cannot update access level' do
expect { update_project_feature }.not_to change {
project.reload.project_feature.public_send(feature_access_level)
}
end
end
where(:feature_access_level) do
%i[
metrics_dashboard_access_level
container_registry_access_level
environments_access_level
feature_flags_access_level
releases_access_level
2022-10-11 01:57:18 +05:30
monitor_access_level
2023-01-13 00:05:48 +05:30
infrastructure_access_level
2022-08-27 11:52:29 +05:30
]
end
with_them do
it_behaves_like 'feature update success'
end
2021-02-22 17:27:13 +05:30
end
2017-09-10 17:25:29 +05:30
end
2016-06-02 11:05:42 +05:30
2020-04-22 19:07:51 +05:30
describe '#transfer', :enable_admin_mode do
2017-09-10 17:25:29 +05:30
render_views
2022-01-26 12:08:38 +05:30
let(:project) { create(:project) }
2021-02-22 17:27:13 +05:30
let_it_be(:admin) { create(:admin) }
let_it_be(:new_namespace) { create(:namespace) }
2017-09-10 17:25:29 +05:30
2022-01-26 12:08:38 +05:30
shared_examples 'project namespace is not changed' do |flash_message|
it 'project namespace is not changed' do
controller.instance_variable_set(:@project, project)
sign_in(admin)
old_namespace = project.namespace
2023-05-27 22:25:52 +05:30
put :transfer, params: {
namespace_id: old_namespace.path, new_namespace_id: new_namespace_id, id: project.path
}, format: :js
2022-01-26 12:08:38 +05:30
project.reload
expect(project.namespace).to eq(old_namespace)
expect(response).to redirect_to(edit_project_path(project))
expect(flash[:alert]).to eq flash_message
end
end
2017-09-10 17:25:29 +05:30
it 'updates namespace' do
sign_in(admin)
2023-05-27 22:25:52 +05:30
put :transfer, params: {
namespace_id: project.namespace.path, new_namespace_id: new_namespace.id, id: project.path
}, format: :js
2017-09-10 17:25:29 +05:30
project.reload
expect(project.namespace).to eq(new_namespace)
2022-01-26 12:08:38 +05:30
expect(response).to redirect_to(edit_project_path(project))
2017-09-10 17:25:29 +05:30
end
context 'when new namespace is empty' do
2022-01-26 12:08:38 +05:30
let(:new_namespace_id) { nil }
2017-09-10 17:25:29 +05:30
2022-01-26 12:08:38 +05:30
it_behaves_like 'project namespace is not changed', s_('TransferProject|Please select a new namespace for your project.')
end
2017-09-10 17:25:29 +05:30
2022-01-26 12:08:38 +05:30
context 'when new namespace is the same as the current namespace' do
let(:new_namespace_id) { project.namespace.id }
2017-09-10 17:25:29 +05:30
2022-01-26 12:08:38 +05:30
it_behaves_like 'project namespace is not changed', s_('TransferProject|Project is already in this namespace.')
2016-06-02 11:05:42 +05:30
end
end
2020-04-22 19:07:51 +05:30
describe "#destroy", :enable_admin_mode do
2021-02-22 17:27:13 +05:30
let_it_be(:admin) { create(:admin) }
2015-12-23 02:04:40 +05:30
2019-12-26 22:10:19 +05:30
it "redirects to the dashboard", :sidekiq_might_not_need_inline do
2015-12-23 02:04:40 +05:30
controller.instance_variable_set(:@project, project)
sign_in(admin)
orig_id = project.id
2019-02-15 15:39:39 +05:30
delete :destroy, params: { namespace_id: project.namespace, id: project }
2015-12-23 02:04:40 +05:30
expect { Project.find(orig_id) }.to raise_error(ActiveRecord::RecordNotFound)
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2015-12-23 02:04:40 +05:30
expect(response).to redirect_to(dashboard_projects_path)
end
2016-09-29 09:46:39 +05:30
context "when the project is forked" do
2019-03-02 22:35:43 +05:30
let(:project) { create(:project, :repository) }
2018-03-17 18:26:18 +05:30
let(:forked_project) { fork_project(project, nil, repository: true) }
2016-09-29 09:46:39 +05:30
let(:merge_request) do
create(:merge_request,
2018-03-17 18:26:18 +05:30
source_project: forked_project,
2016-09-29 09:46:39 +05:30
target_project: project)
end
2019-12-26 22:10:19 +05:30
it "closes all related merge requests", :sidekiq_might_not_need_inline do
2016-09-29 09:46:39 +05:30
project.merge_requests << merge_request
sign_in(admin)
2019-02-15 15:39:39 +05:30
delete :destroy, params: { namespace_id: forked_project.namespace, id: forked_project }
2016-09-29 09:46:39 +05:30
expect(merge_request.reload.state).to eq('closed')
end
end
2015-12-23 02:04:40 +05:30
end
2018-03-17 18:26:18 +05:30
describe 'PUT #new_issuable_address for issue' do
2017-08-17 22:00:37 +05:30
subject do
2018-03-17 18:26:18 +05:30
put :new_issuable_address,
2019-02-15 15:39:39 +05:30
params: {
namespace_id: project.namespace,
id: project,
issuable_type: 'issue'
}
2017-08-17 22:00:37 +05:30
user.reload
end
before do
sign_in(user)
2018-03-17 18:26:18 +05:30
project.add_developer(user)
2017-08-17 22:00:37 +05:30
allow(Gitlab.config.incoming_email).to receive(:enabled).and_return(true)
end
it 'has http status 200' do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-08-17 22:00:37 +05:30
end
it 'changes the user incoming email token' do
expect { subject }.to change { user.incoming_email_token }
end
it 'changes projects new issue address' do
2018-03-17 18:26:18 +05:30
expect { subject }.to change { project.new_issuable_address(user, 'issue') }
end
end
describe 'PUT #new_issuable_address for merge request' do
subject do
put :new_issuable_address,
2019-02-15 15:39:39 +05:30
params: {
namespace_id: project.namespace,
id: project,
issuable_type: 'merge_request'
}
2018-03-17 18:26:18 +05:30
user.reload
end
before do
sign_in(user)
project.add_developer(user)
allow(Gitlab.config.incoming_email).to receive(:enabled).and_return(true)
end
it 'has http status 200' do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2018-03-17 18:26:18 +05:30
end
it 'changes the user incoming email token' do
expect { subject }.to change { user.incoming_email_token }
end
it 'changes projects new merge request address' do
expect { subject }.to change { project.new_issuable_address(user, 'merge_request') }
2017-08-17 22:00:37 +05:30
end
end
2014-09-02 18:07:02 +05:30
describe "POST #toggle_star" do
it "toggles star if user is signed in" do
sign_in(user)
2015-04-26 12:48:37 +05:30
expect(user.starred?(public_project)).to be_falsey
2023-05-27 22:25:52 +05:30
post :toggle_star, params: { namespace_id: public_project.namespace, id: public_project }
2015-04-26 12:48:37 +05:30
expect(user.starred?(public_project)).to be_truthy
2023-05-27 22:25:52 +05:30
post :toggle_star, params: { namespace_id: public_project.namespace, id: public_project }
2015-04-26 12:48:37 +05:30
expect(user.starred?(public_project)).to be_falsey
2014-09-02 18:07:02 +05:30
end
it "does nothing if user is not signed in" do
2023-05-27 22:25:52 +05:30
post :toggle_star, params: { namespace_id: project.namespace, id: public_project }
2015-04-26 12:48:37 +05:30
expect(user.starred?(public_project)).to be_falsey
2023-05-27 22:25:52 +05:30
post :toggle_star, params: { namespace_id: project.namespace, id: public_project }
2015-04-26 12:48:37 +05:30
expect(user.starred?(public_project)).to be_falsey
2014-09-02 18:07:02 +05:30
end
end
2015-11-26 14:37:03 +05:30
describe "DELETE remove_fork" do
context 'when signed in' do
before do
sign_in(user)
end
context 'with forked project' do
2018-03-17 18:26:18 +05:30
let(:forked_project) { fork_project(create(:project, :public), user) }
2015-11-26 14:37:03 +05:30
2016-09-13 17:45:13 +05:30
it 'removes fork from project' do
2023-05-27 22:25:52 +05:30
delete :remove_fork, params: {
namespace_id: forked_project.namespace.to_param, id: forked_project.to_param
}, format: :js
2015-11-26 14:37:03 +05:30
2018-03-17 18:26:18 +05:30
expect(forked_project.reload.forked?).to be_falsey
2020-01-01 13:55:28 +05:30
expect(flash[:notice]).to eq(s_('The fork relationship has been removed.'))
2022-01-26 12:08:38 +05:30
expect(response).to redirect_to(edit_project_path(forked_project))
2015-11-26 14:37:03 +05:30
end
end
context 'when project not forked' do
let(:unforked_project) { create(:project, namespace: user.namespace) }
2016-09-13 17:45:13 +05:30
it 'does nothing if project was not forked' do
2023-05-27 22:25:52 +05:30
delete :remove_fork, params: {
namespace_id: unforked_project.namespace, id: unforked_project
}, format: :js
2015-11-26 14:37:03 +05:30
expect(flash[:notice]).to be_nil
2022-01-26 12:08:38 +05:30
expect(response).to redirect_to(edit_project_path(unforked_project))
2015-11-26 14:37:03 +05:30
end
end
end
it "does nothing if user is not signed in" do
2023-05-27 22:25:52 +05:30
delete :remove_fork, params: {
namespace_id: project.namespace, id: project
}, format: :js
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:unauthorized)
2015-11-26 14:37:03 +05:30
end
end
2016-06-22 15:30:34 +05:30
describe "GET refs" do
2021-02-22 17:27:13 +05:30
let_it_be(:project) { create(:project, :public, :repository) }
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
it 'gets a list of branches and tags' do
2019-02-15 15:39:39 +05:30
get :refs, params: { namespace_id: project.namespace, id: project, sort: 'updated_desc' }
2016-06-22 15:30:34 +05:30
2019-09-30 21:07:59 +05:30
expect(json_response['Branches']).to include('master')
2019-12-04 20:38:33 +05:30
expect(json_response['Tags']).to include('v1.0.0')
2019-09-30 21:07:59 +05:30
expect(json_response['Commits']).to be_nil
2016-06-22 15:30:34 +05:30
end
2016-09-13 17:45:13 +05:30
it "gets a list of branches, tags and commits" do
2019-02-15 15:39:39 +05:30
get :refs, params: { namespace_id: project.namespace, id: project, ref: "123456" }
2016-06-22 15:30:34 +05:30
2019-09-30 21:07:59 +05:30
expect(json_response["Branches"]).to include("master")
expect(json_response["Tags"]).to include("v1.0.0")
expect(json_response["Commits"]).to include("123456")
2016-06-22 15:30:34 +05:30
end
2018-11-08 19:23:39 +05:30
2022-10-11 01:57:18 +05:30
it 'uses gitaly pagination' do
expected_params = ActionController::Parameters.new(ref: '123456', per_page: 100).permit!
expect_next_instance_of(BranchesFinder, project.repository, expected_params) do |finder|
expect(finder).to receive(:execute).with(gitaly_pagination: true).and_call_original
end
expect_next_instance_of(TagsFinder, project.repository, expected_params) do |finder|
expect(finder).to receive(:execute).with(gitaly_pagination: true).and_call_original
end
get :refs, params: { namespace_id: project.namespace, id: project, ref: "123456" }
end
2021-12-11 22:18:48 +05:30
context 'when gitaly is unavailable' do
before do
expect_next_instance_of(TagsFinder) do |finder|
2022-06-21 17:19:12 +05:30
allow(finder).to receive(:execute).and_raise(Gitlab::Git::CommandError, 'something went wrong')
2021-12-11 22:18:48 +05:30
end
end
2022-06-21 17:19:12 +05:30
it 'responds with 503 error' do
2021-12-11 22:18:48 +05:30
get :refs, params: { namespace_id: project.namespace, id: project, ref: "123456" }
2022-06-21 17:19:12 +05:30
expect(response).to have_gitlab_http_status(:service_unavailable)
expect(json_response['error']).to eq 'Unable to load refs'
2021-12-11 22:18:48 +05:30
end
end
2018-11-08 19:23:39 +05:30
context "when preferred language is Japanese" do
before do
user.update!(preferred_language: 'ja')
sign_in(user)
end
it "gets a list of branches, tags and commits" do
2019-02-15 15:39:39 +05:30
get :refs, params: { namespace_id: project.namespace, id: project, ref: "123456" }
2018-11-08 19:23:39 +05:30
2019-09-30 21:07:59 +05:30
expect(json_response["Branches"]).to include("master")
expect(json_response["Tags"]).to include("v1.0.0")
expect(json_response["Commits"]).to include("123456")
2018-11-08 19:23:39 +05:30
end
end
2019-01-03 12:48:30 +05:30
context 'when private project' do
let(:project) { create(:project, :repository) }
context 'as a guest' do
it 'renders forbidden' do
user = create(:user)
project.add_guest(user)
sign_in(user)
2019-02-15 15:39:39 +05:30
get :refs, params: { namespace_id: project.namespace, id: project }
2019-01-03 12:48:30 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-01-03 12:48:30 +05:30
end
end
end
2022-04-04 11:22:00 +05:30
context 'when input params are invalid' do
let(:request) { get :refs, params: { namespace_id: project.namespace, id: project, ref: { invalid: :format } } }
it 'does not break' do
request
expect(response).to have_gitlab_http_status(:success)
end
end
2023-05-27 22:25:52 +05:30
context 'when sort param is invalid' do
let(:request) { get :refs, params: { namespace_id: project.namespace, id: project, sort: 'invalid' } }
it 'uses default sort by name' do
request
expect(response).to have_gitlab_http_status(:success)
expect(json_response['Branches']).to include('master')
expect(json_response['Tags']).to include('v1.0.0')
expect(json_response['Commits']).to be_nil
end
end
2016-06-22 15:30:34 +05:30
end
2017-08-17 22:00:37 +05:30
describe 'POST #preview_markdown' do
2018-11-08 19:23:39 +05:30
before do
2017-08-17 22:00:37 +05:30
sign_in(user)
2018-11-08 19:23:39 +05:30
end
2017-08-17 22:00:37 +05:30
2018-11-08 19:23:39 +05:30
it 'renders json in a correct format' do
2019-02-15 15:39:39 +05:30
post :preview_markdown, params: { namespace_id: public_project.namespace, id: public_project, text: '*Markdown* text' }
2017-08-17 22:00:37 +05:30
2019-09-30 21:07:59 +05:30
expect(json_response.keys).to match_array(%w(body references))
2017-08-17 22:00:37 +05:30
end
2018-11-08 19:23:39 +05:30
2019-07-07 11:18:12 +05:30
context 'when not authorized' do
let(:private_project) { create(:project, :private) }
it 'returns 404' do
post :preview_markdown, params: { namespace_id: private_project.namespace, id: private_project, text: '*Markdown* text' }
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-07-07 11:18:12 +05:30
end
end
2018-11-08 19:23:39 +05:30
context 'state filter on references' do
2021-02-22 17:27:13 +05:30
let_it_be(:issue) { create(:issue, :closed, project: public_project) }
2021-04-29 21:17:54 +05:30
2018-11-08 19:23:39 +05:30
let(:merge_request) { create(:merge_request, :closed, target_project: public_project) }
it 'renders JSON body with state filter for issues' do
2019-02-15 15:39:39 +05:30
post :preview_markdown, params: {
namespace_id: public_project.namespace,
id: public_project,
text: issue.to_reference
}
2018-11-08 19:23:39 +05:30
expect(json_response['body']).to match(/\##{issue.iid} \(closed\)/)
end
it 'renders JSON body with state filter for MRs' do
2019-02-15 15:39:39 +05:30
post :preview_markdown, params: {
namespace_id: public_project.namespace,
id: public_project,
text: merge_request.to_reference
}
2018-11-08 19:23:39 +05:30
2023-03-04 22:38:38 +05:30
expect(json_response['body']).to match(/!#{merge_request.iid} \(closed\)/)
2018-11-08 19:23:39 +05:30
end
end
2019-12-26 22:10:19 +05:30
context 'when path parameter is provided' do
let(:project_with_repo) { create(:project, :repository) }
let(:preview_markdown_params) do
{
namespace_id: project_with_repo.namespace,
id: project_with_repo,
text: "![](./logo-white.png)\n",
path: 'files/images/README.md'
}
end
before do
project_with_repo.add_maintainer(user)
end
it 'renders JSON body with image links expanded' do
2020-03-13 15:44:24 +05:30
expanded_path = "/#{project_with_repo.full_path}/-/raw/master/files/images/logo-white.png"
2019-12-26 22:10:19 +05:30
post :preview_markdown, params: preview_markdown_params
expect(json_response['body']).to include(expanded_path)
end
end
2020-05-24 23:13:21 +05:30
context 'when path and ref parameters are provided' do
let(:project_with_repo) { create(:project, :repository) }
let(:preview_markdown_params) do
{
namespace_id: project_with_repo.namespace,
id: project_with_repo,
text: "![](./logo-white.png)\n",
ref: 'other_branch',
path: 'files/images/README.md'
}
end
before do
project_with_repo.add_maintainer(user)
project_with_repo.repository.create_branch('other_branch')
end
it 'renders JSON body with image links expanded' do
expanded_path = "/#{project_with_repo.full_path}/-/raw/other_branch/files/images/logo-white.png"
post :preview_markdown, params: preview_markdown_params
expect(json_response['body']).to include(expanded_path)
end
end
2017-08-17 22:00:37 +05:30
end
describe '#ensure_canonical_path' do
before do
sign_in(user)
end
context 'for a GET request' do
context 'when requesting the canonical path' do
context "with exactly matching casing" do
it "loads the project" do
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: public_project.namespace, id: public_project }
2017-08-17 22:00:37 +05:30
expect(assigns(:project)).to eq(public_project)
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-08-17 22:00:37 +05:30
end
end
context "with different casing" do
it "redirects to the normalized path" do
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: public_project.namespace, id: public_project.path.upcase }
2017-08-17 22:00:37 +05:30
expect(assigns(:project)).to eq(public_project)
expect(response).to redirect_to("/#{public_project.full_path}")
expect(controller).not_to set_flash[:notice]
end
end
end
context 'when requesting a redirected path' do
let!(:redirect_route) { public_project.redirect_routes.create!(path: "foo/bar") }
it 'redirects to the canonical path' do
2019-02-15 15:39:39 +05:30
get :show, params: { namespace_id: 'foo', id: 'bar' }
2017-08-17 22:00:37 +05:30
expect(response).to redirect_to(public_project)
expect(controller).to set_flash[:notice].to(project_moved_message(redirect_route, public_project))
end
it 'redirects to the canonical path (testing non-show action)' do
2019-02-15 15:39:39 +05:30
get :refs, params: { namespace_id: 'foo', id: 'bar' }
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
expect(response).to redirect_to(refs_project_path(public_project))
2017-08-17 22:00:37 +05:30
expect(controller).to set_flash[:notice].to(project_moved_message(redirect_route, public_project))
end
end
end
context 'for a POST request' do
context 'when requesting the canonical path with different casing' do
it 'does not 404' do
2019-02-15 15:39:39 +05:30
post :toggle_star, params: { namespace_id: public_project.namespace, id: public_project.path.upcase }
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).not_to have_gitlab_http_status(:not_found)
2017-08-17 22:00:37 +05:30
end
it 'does not redirect to the correct casing' do
2019-02-15 15:39:39 +05:30
post :toggle_star, params: { namespace_id: public_project.namespace, id: public_project.path.upcase }
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).not_to have_gitlab_http_status(:moved_permanently)
2017-08-17 22:00:37 +05:30
end
end
context 'when requesting a redirected path' do
let!(:redirect_route) { public_project.redirect_routes.create!(path: "foo/bar") }
it 'returns not found' do
2019-02-15 15:39:39 +05:30
post :toggle_star, params: { namespace_id: 'foo', id: 'bar' }
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2017-08-17 22:00:37 +05:30
end
end
end
2020-04-22 19:07:51 +05:30
context 'for a DELETE request', :enable_admin_mode do
2017-08-17 22:00:37 +05:30
before do
sign_in(create(:admin))
end
context 'when requesting the canonical path with different casing' do
it 'does not 404' do
2019-02-15 15:39:39 +05:30
delete :destroy, params: { namespace_id: project.namespace, id: project.path.upcase }
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).not_to have_gitlab_http_status(:not_found)
2017-08-17 22:00:37 +05:30
end
it 'does not redirect to the correct casing' do
2019-02-15 15:39:39 +05:30
delete :destroy, params: { namespace_id: project.namespace, id: project.path.upcase }
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).not_to have_gitlab_http_status(:moved_permanently)
2017-08-17 22:00:37 +05:30
end
end
context 'when requesting a redirected path' do
let!(:redirect_route) { project.redirect_routes.create!(path: "foo/bar") }
it 'returns not found' do
2019-02-15 15:39:39 +05:30
delete :destroy, params: { namespace_id: 'foo', id: 'bar' }
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2017-08-17 22:00:37 +05:30
end
end
end
end
2020-01-01 13:55:28 +05:30
describe 'project export' do
2018-03-17 18:26:18 +05:30
before do
sign_in(user)
2018-11-18 11:00:15 +05:30
project.add_maintainer(user)
2018-03-17 18:26:18 +05:30
end
2020-01-01 13:55:28 +05:30
shared_examples 'rate limits project export endpoint' do
2018-03-17 18:26:18 +05:30
before do
2022-08-13 15:12:31 +05:30
allow_next_instance_of(Gitlab::ApplicationRateLimiter::BaseStrategy) do |strategy|
allow(strategy)
.to receive(:increment)
.and_return(Gitlab::ApplicationRateLimiter.rate_limits["project_#{action}".to_sym][:threshold].call + 1)
end
2018-03-17 18:26:18 +05:30
end
2020-01-01 13:55:28 +05:30
it 'prevents requesting project export' do
2020-04-08 14:13:33 +05:30
post action, params: { namespace_id: project.namespace, id: project }
2018-03-17 18:26:18 +05:30
2020-06-23 00:09:42 +05:30
expect(response.body).to eq('This endpoint has been requested too many times. Try again later.')
expect(response).to have_gitlab_http_status(:too_many_requests)
2018-03-17 18:26:18 +05:30
end
end
2020-01-01 13:55:28 +05:30
describe '#export' do
let(:action) { :export }
2018-03-17 18:26:18 +05:30
2018-11-08 19:23:39 +05:30
context 'when project export is enabled' do
it 'returns 302' do
2020-04-08 14:13:33 +05:30
post action, params: { namespace_id: project.namespace, id: project }
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2018-11-08 19:23:39 +05:30
end
2022-07-16 23:28:13 +05:30
context 'when the project storage_size exceeds the application setting max_export_size' do
it 'returns 302 with alert' do
stub_application_setting(max_export_size: 1)
project.statistics.update!(lfs_objects_size: 2.megabytes, repository_size: 2.megabytes)
post action, params: { namespace_id: project.namespace, id: project }
expect(response).to have_gitlab_http_status(:found)
expect(flash[:alert]).to include('The project size exceeds the export limit.')
end
end
context 'when the project storage_size does not exceed the application setting max_export_size' do
it 'returns 302 without alert' do
stub_application_setting(max_export_size: 1)
project.statistics.update!(lfs_objects_size: 0.megabytes, repository_size: 0.megabytes)
post action, params: { namespace_id: project.namespace, id: project }
expect(response).to have_gitlab_http_status(:found)
expect(flash[:alert]).to be_nil
end
end
context 'when application setting max_export_size is not set' do
it 'returns 302 without alert' do
project.statistics.update!(lfs_objects_size: 2.megabytes, repository_size: 2.megabytes)
post action, params: { namespace_id: project.namespace, id: project }
expect(response).to have_gitlab_http_status(:found)
expect(flash[:alert]).to be_nil
end
end
2018-11-08 19:23:39 +05:30
end
context 'when project export is disabled' do
before do
stub_application_setting(project_export_enabled?: false)
end
it 'returns 404' do
2020-04-08 14:13:33 +05:30
post action, params: { namespace_id: project.namespace, id: project }
2018-11-08 19:23:39 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2018-11-08 19:23:39 +05:30
end
2018-03-17 18:26:18 +05:30
end
2020-01-01 13:55:28 +05:30
2021-11-18 22:05:49 +05:30
context 'when the endpoint receives requests above the limit', :clean_gitlab_redis_rate_limiting do
2020-01-01 13:55:28 +05:30
include_examples 'rate limits project export endpoint'
end
2018-03-17 18:26:18 +05:30
end
2021-11-18 22:05:49 +05:30
describe '#download_export', :clean_gitlab_redis_rate_limiting do
2022-06-21 17:19:12 +05:30
let(:project) { create(:project, :with_export, service_desk_enabled: false) }
2020-01-01 13:55:28 +05:30
let(:action) { :download_export }
2018-03-17 18:26:18 +05:30
2020-01-01 13:55:28 +05:30
context 'object storage enabled' do
context 'when project export is enabled' do
2022-06-21 17:19:12 +05:30
it 'returns 200' do
2020-01-01 13:55:28 +05:30
get action, params: { namespace_id: project.namespace, id: project }
2018-03-17 18:26:18 +05:30
2022-06-21 17:19:12 +05:30
expect(response).to have_gitlab_http_status(:ok)
2020-01-01 13:55:28 +05:30
end
end
2018-03-17 18:26:18 +05:30
2021-09-04 01:27:46 +05:30
context 'when project export file is absent' do
it 'alerts the user and returns 302' do
project.export_file.file.delete
get action, params: { namespace_id: project.namespace, id: project }
expect(flash[:alert]).to include('file containing the export is not available yet')
expect(response).to have_gitlab_http_status(:found)
end
end
2020-01-01 13:55:28 +05:30
context 'when project export is disabled' do
before do
stub_application_setting(project_export_enabled?: false)
end
2018-03-17 18:26:18 +05:30
2020-01-01 13:55:28 +05:30
it 'returns 404' do
get action, params: { namespace_id: project.namespace, id: project }
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2020-01-01 13:55:28 +05:30
end
end
2018-03-17 18:26:18 +05:30
2021-11-18 22:05:49 +05:30
context 'when the endpoint receives requests above the limit', :clean_gitlab_redis_rate_limiting do
2020-06-23 00:09:42 +05:30
before do
2022-08-13 15:12:31 +05:30
allow_next_instance_of(Gitlab::ApplicationRateLimiter::BaseStrategy) do |strategy|
allow(strategy)
.to receive(:increment)
.and_return(Gitlab::ApplicationRateLimiter.rate_limits[:project_download_export][:threshold].call + 1)
end
2020-06-23 00:09:42 +05:30
end
it 'prevents requesting project export' do
post action, params: { namespace_id: project.namespace, id: project }
expect(response.body).to eq('This endpoint has been requested too many times. Try again later.')
expect(response).to have_gitlab_http_status(:too_many_requests)
end
2022-06-21 17:19:12 +05:30
end
context 'applies correct scope when throttling', :clean_gitlab_redis_rate_limiting do
before do
stub_application_setting(project_download_export_limit: 1)
2023-03-04 22:38:38 +05:30
travel_to Date.current.beginning_of_day
end
after do
travel_back
2022-06-21 17:19:12 +05:30
end
2021-04-17 20:07:23 +05:30
2022-06-21 17:19:12 +05:30
it 'applies throttle per namespace' do
2021-04-17 20:07:23 +05:30
expect(Gitlab::ApplicationRateLimiter)
.to receive(:throttled?)
2022-06-21 17:19:12 +05:30
.with(:project_download_export, scope: [user, project.namespace])
2021-04-17 20:07:23 +05:30
post action, params: { namespace_id: project.namespace, id: project }
end
2022-06-21 17:19:12 +05:30
it 'throttles downloads within same namespaces' do
# simulate prior request to the same namespace, which increments the rate limit counter for that scope
Gitlab::ApplicationRateLimiter.throttled?(:project_download_export, scope: [user, project.namespace])
get action, params: { namespace_id: project.namespace, id: project }
expect(response).to have_gitlab_http_status(:too_many_requests)
end
it 'allows downloads from different namespaces' do
# simulate prior request to a different namespace, which increments the rate limit counter for that scope
Gitlab::ApplicationRateLimiter.throttled?(:project_download_export,
scope: [user, create(:project, :with_export).namespace])
get action, params: { namespace_id: project.namespace, id: project }
expect(response).to have_gitlab_http_status(:ok)
end
2020-01-01 13:55:28 +05:30
end
2018-03-17 18:26:18 +05:30
end
end
2020-01-01 13:55:28 +05:30
describe '#remove_export' do
let(:action) { :remove_export }
2018-03-17 18:26:18 +05:30
2020-01-01 13:55:28 +05:30
context 'when project export is enabled' do
it 'returns 302' do
post action, params: { namespace_id: project.namespace, id: project }
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2020-01-01 13:55:28 +05:30
end
end
2018-03-17 18:26:18 +05:30
2020-01-01 13:55:28 +05:30
context 'when project export is disabled' do
before do
stub_application_setting(project_export_enabled?: false)
end
it 'returns 404' do
post action, params: { namespace_id: project.namespace, id: project }
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2020-01-01 13:55:28 +05:30
end
2018-03-17 18:26:18 +05:30
end
end
2020-01-01 13:55:28 +05:30
describe '#generate_new_export' do
let(:action) { :generate_new_export }
context 'when project export is enabled' do
it 'returns 302' do
post action, params: { namespace_id: project.namespace, id: project }
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2020-01-01 13:55:28 +05:30
end
2018-03-17 18:26:18 +05:30
end
2020-01-01 13:55:28 +05:30
context 'when project export is disabled' do
before do
stub_application_setting(project_export_enabled?: false)
end
2018-03-17 18:26:18 +05:30
2020-01-01 13:55:28 +05:30
it 'returns 404' do
post action, params: { namespace_id: project.namespace, id: project }
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2020-01-01 13:55:28 +05:30
end
end
2021-11-18 22:05:49 +05:30
context 'when the endpoint receives requests above the limit', :clean_gitlab_redis_rate_limiting do
2020-01-01 13:55:28 +05:30
include_examples 'rate limits project export endpoint'
2018-03-17 18:26:18 +05:30
end
end
end
2021-09-30 23:02:18 +05:30
context 'GET show.atom' do
let_it_be(:public_project) { create(:project, :public) }
let_it_be(:event) { create(:event, :commented, project: public_project, target: create(:note, project: public_project)) }
let_it_be(:invisible_event) { create(:event, :commented, project: public_project, target: create(:note, :confidential, project: public_project)) }
it 'filters by calling event.visible_to_user?' do
expect(EventCollection).to receive_message_chain(:new, :to_a).and_return([event, invisible_event])
expect(event).to receive(:visible_to_user?).and_return(true)
expect(invisible_event).to receive(:visible_to_user?).and_return(false)
get :show, format: :atom, params: { id: public_project, namespace_id: public_project.namespace }
2022-05-07 20:08:51 +05:30
expect(response).to have_gitlab_http_status(:success)
expect(response).to render_template(:show)
expect(response).to render_template(layout: :xml)
2021-09-30 23:02:18 +05:30
expect(assigns(:events)).to eq([event])
end
it 'filters by calling event.visible_to_user?' do
get :show, format: :atom, params: { id: public_project, namespace_id: public_project.namespace }
2022-05-07 20:08:51 +05:30
expect(response).to have_gitlab_http_status(:success)
expect(response).to render_template(:show)
expect(response).to render_template(layout: :xml)
2021-09-30 23:02:18 +05:30
expect(assigns(:events)).to eq([event])
end
end
2020-07-28 23:09:34 +05:30
it 'updates Service Desk attributes' do
project.add_maintainer(user)
sign_in(user)
2023-06-20 00:43:36 +05:30
allow(Gitlab::Email::IncomingEmail).to receive(:enabled?) { true }
allow(Gitlab::Email::IncomingEmail).to receive(:supports_wildcard?) { true }
2020-07-28 23:09:34 +05:30
params = {
service_desk_enabled: true
}
2023-05-27 22:25:52 +05:30
put :update, params: { namespace_id: project.namespace, id: project, project: params }
2020-07-28 23:09:34 +05:30
project.reload
expect(response).to have_gitlab_http_status(:found)
expect(project.service_desk_enabled).to eq(true)
end
2017-08-17 22:00:37 +05:30
def project_moved_message(redirect_route, project)
"Project '#{redirect_route.path}' was moved to '#{project.full_path}'. Please update any links and bookmarks that may still have the old path."
end
2021-01-29 00:20:46 +05:30
describe 'GET #unfoldered_environment_names' do
it 'shows the environment names of a public project to an anonymous user' do
create(:environment, project: public_project, name: 'foo')
get(
:unfoldered_environment_names,
params: { namespace_id: public_project.namespace, id: public_project, format: :json }
)
expect(response).to have_gitlab_http_status(:ok)
expect(json_response).to eq(%w[foo])
end
it 'does not show environment names of a private project to anonymous users' do
create(:environment, project: project, name: 'foo')
get(
:unfoldered_environment_names,
params: { namespace_id: project.namespace, id: project, format: :json }
)
expect(response).to redirect_to(new_user_session_path)
end
it 'shows environment names of a private project to a project member' do
create(:environment, project: project, name: 'foo')
project.add_developer(user)
sign_in(user)
get(
:unfoldered_environment_names,
params: { namespace_id: project.namespace, id: project, format: :json }
)
expect(response).to have_gitlab_http_status(:ok)
expect(json_response).to eq(%w[foo])
end
it 'does not show environment names of a private project to a logged-in non-member' do
create(:environment, project: project, name: 'foo')
sign_in(user)
get(
:unfoldered_environment_names,
params: { namespace_id: project.namespace, id: project, format: :json }
)
expect(response).to have_gitlab_http_status(:not_found)
end
end
2014-09-02 18:07:02 +05:30
end