debian-mirror-gitlab/spec/requests/api/members_spec.rb

467 lines
17 KiB
Ruby
Raw Normal View History

2016-09-13 17:45:13 +05:30
require 'spec_helper'
2017-08-17 22:00:37 +05:30
describe API::Members do
2018-11-18 11:00:15 +05:30
let(:maintainer) { create(:user, username: 'maintainer_user') }
2016-09-13 17:45:13 +05:30
let(:developer) { create(:user) }
let(:access_requester) { create(:user) }
let(:stranger) { create(:user) }
let(:project) do
2018-11-18 11:00:15 +05:30
create(:project, :public, :access_requestable, creator_id: maintainer.id, namespace: maintainer.namespace) do |project|
2018-03-17 18:26:18 +05:30
project.add_developer(developer)
2018-11-18 11:00:15 +05:30
project.add_maintainer(maintainer)
2017-08-17 22:00:37 +05:30
project.request_access(access_requester)
end
2016-09-13 17:45:13 +05:30
end
let!(:group) do
2017-08-17 22:00:37 +05:30
create(:group, :public, :access_requestable) do |group|
group.add_developer(developer)
2018-11-18 11:00:15 +05:30
group.add_owner(maintainer)
2017-08-17 22:00:37 +05:30
group.request_access(access_requester)
end
2016-09-13 17:45:13 +05:30
end
2018-11-18 11:00:15 +05:30
shared_examples 'GET /:source_type/:id/members/(all)' do |source_type, all|
let(:members_url) do
"/#{source_type.pluralize}/#{source.id}/members".tap do |url|
url << "/all" if all
end
end
context "with :source_type == #{source_type.pluralize}" do
2016-09-13 17:45:13 +05:30
it_behaves_like 'a 404 response when source is private' do
2018-11-18 11:00:15 +05:30
let(:route) { get api(members_url, stranger) }
2016-09-13 17:45:13 +05:30
end
2018-11-18 11:00:15 +05:30
%i[maintainer developer access_requester stranger].each do |type|
2016-09-29 09:46:39 +05:30
context "when authenticated as a #{type}" do
it 'returns 200' do
user = public_send(type)
2017-08-17 22:00:37 +05:30
2018-11-18 11:00:15 +05:30
get api(members_url, user)
2016-09-29 09:46:39 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2016-09-29 09:46:39 +05:30
expect(json_response.size).to eq(2)
2018-11-18 11:00:15 +05:30
expect(json_response.map { |u| u['id'] }).to match_array [maintainer.id, developer.id]
2016-09-13 17:45:13 +05:30
end
end
end
2018-03-17 18:26:18 +05:30
it 'avoids N+1 queries' do
# Establish baseline
2018-11-18 11:00:15 +05:30
get api(members_url, maintainer)
2018-03-17 18:26:18 +05:30
control = ActiveRecord::QueryRecorder.new do
2018-11-18 11:00:15 +05:30
get api(members_url, maintainer)
2018-03-17 18:26:18 +05:30
end
project.add_developer(create(:user))
expect do
2018-11-18 11:00:15 +05:30
get api(members_url, maintainer)
2018-03-17 18:26:18 +05:30
end.not_to exceed_query_limit(control)
end
2016-09-29 09:46:39 +05:30
it 'does not return invitees' do
create(:"#{source_type}_member", invite_token: '123', invite_email: 'test@abc.com', source: source, user: nil)
2018-11-18 11:00:15 +05:30
get api(members_url, developer)
2016-09-29 09:46:39 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2016-09-29 09:46:39 +05:30
expect(json_response.size).to eq(2)
2018-11-18 11:00:15 +05:30
expect(json_response.map { |u| u['id'] }).to match_array [maintainer.id, developer.id]
2016-09-29 09:46:39 +05:30
end
2016-09-13 17:45:13 +05:30
it 'finds members with query string' do
2018-11-18 11:00:15 +05:30
get api(members_url, developer), query: maintainer.username
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2016-09-13 17:45:13 +05:30
expect(json_response.count).to eq(1)
2018-11-18 11:00:15 +05:30
expect(json_response.first['username']).to eq(maintainer.username)
2016-09-13 17:45:13 +05:30
end
2018-03-17 18:26:18 +05:30
it 'finds all members with no query specified' do
2018-11-18 11:00:15 +05:30
get api(members_url, developer), query: ''
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.count).to eq(2)
2018-11-18 11:00:15 +05:30
expect(json_response.map { |u| u['id'] }).to match_array [maintainer.id, developer.id]
2018-03-17 18:26:18 +05:30
end
2016-09-13 17:45:13 +05:30
end
end
2018-11-18 11:00:15 +05:30
describe 'GET /:source_type/:id/members/all', :nested_groups do
let(:nested_user) { create(:user) }
let(:project_user) { create(:user) }
let(:linked_group_user) { create(:user) }
let!(:project_group_link) { create(:project_group_link, project: project, group: linked_group) }
let(:project) do
create(:project, :public, group: nested_group) do |project|
project.add_developer(project_user)
end
end
let(:linked_group) do
create(:group) do |linked_group|
linked_group.add_developer(linked_group_user)
end
end
let(:nested_group) do
create(:group, parent: group) do |nested_group|
nested_group.add_developer(nested_user)
end
end
it 'finds all project members including inherited members' do
get api("/projects/#{project.id}/members/all", developer)
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.map { |u| u['id'] }).to match_array [maintainer.id, developer.id, nested_user.id, project_user.id, linked_group_user.id]
end
it 'finds all group members including inherited members' do
get api("/groups/#{nested_group.id}/members/all", developer)
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.map { |u| u['id'] }).to match_array [maintainer.id, developer.id, nested_user.id]
end
end
shared_examples 'GET /:source_type/:id/members/:user_id' do |source_type|
context "with :source_type == #{source_type.pluralize}" do
2016-09-13 17:45:13 +05:30
it_behaves_like 'a 404 response when source is private' do
let(:route) { get api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", stranger) }
end
context 'when authenticated as a non-member' do
%i[access_requester stranger].each do |type|
context "as a #{type}" do
it 'returns 200' do
user = public_send(type)
get api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", user)
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(200)
2016-09-13 17:45:13 +05:30
# User attributes
expect(json_response['id']).to eq(developer.id)
expect(json_response['name']).to eq(developer.name)
expect(json_response['username']).to eq(developer.username)
expect(json_response['state']).to eq(developer.state)
expect(json_response['avatar_url']).to eq(developer.avatar_url)
expect(json_response['web_url']).to eq(Gitlab::Routing.url_helpers.user_url(developer))
# Member attributes
expect(json_response['access_level']).to eq(Member::DEVELOPER)
end
end
end
end
end
end
2018-11-18 11:00:15 +05:30
shared_examples 'POST /:source_type/:id/members' do |source_type|
context "with :source_type == #{source_type.pluralize}" do
2016-09-13 17:45:13 +05:30
it_behaves_like 'a 404 response when source is private' do
2016-11-03 12:29:30 +05:30
let(:route) do
post api("/#{source_type.pluralize}/#{source.id}/members", stranger),
2018-11-18 11:00:15 +05:30
user_id: access_requester.id, access_level: Member::MAINTAINER
2016-11-03 12:29:30 +05:30
end
2016-09-13 17:45:13 +05:30
end
context 'when authenticated as a non-member or member with insufficient rights' do
%i[access_requester stranger developer].each do |type|
context "as a #{type}" do
it 'returns 403' do
user = public_send(type)
2016-11-03 12:29:30 +05:30
post api("/#{source_type.pluralize}/#{source.id}/members", user),
2018-11-18 11:00:15 +05:30
user_id: access_requester.id, access_level: Member::MAINTAINER
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(403)
2016-09-13 17:45:13 +05:30
end
end
end
end
2018-11-18 11:00:15 +05:30
context 'when authenticated as a maintainer/owner' do
2016-09-13 17:45:13 +05:30
context 'and new member is already a requester' do
it 'transforms the requester into a proper member' do
expect do
2018-11-18 11:00:15 +05:30
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
user_id: access_requester.id, access_level: Member::MAINTAINER
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(201)
2016-09-13 17:45:13 +05:30
end.to change { source.members.count }.by(1)
expect(source.requesters.count).to eq(0)
expect(json_response['id']).to eq(access_requester.id)
2018-11-18 11:00:15 +05:30
expect(json_response['access_level']).to eq(Member::MAINTAINER)
2016-09-13 17:45:13 +05:30
end
end
it 'creates a new member' do
expect do
2018-11-18 11:00:15 +05:30
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
2016-09-13 17:45:13 +05:30
user_id: stranger.id, access_level: Member::DEVELOPER, expires_at: '2016-08-05'
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(201)
2016-09-13 17:45:13 +05:30
end.to change { source.members.count }.by(1)
expect(json_response['id']).to eq(stranger.id)
expect(json_response['access_level']).to eq(Member::DEVELOPER)
expect(json_response['expires_at']).to eq('2016-08-05')
end
end
2018-12-23 12:14:25 +05:30
context 'access levels' do
it 'does not create the member if group level is higher', :nested_groups do
parent = create(:group)
group.update(parent: parent)
project.update(group: group)
parent.add_developer(stranger)
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
user_id: stranger.id, access_level: Member::REPORTER
expect(response).to have_gitlab_http_status(400)
expect(json_response['message']['access_level']).to eq(["should be higher than Developer inherited membership from group #{parent.name}"])
end
it 'creates the member if group level is lower', :nested_groups do
parent = create(:group)
group.update(parent: parent)
project.update(group: group)
parent.add_developer(stranger)
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
user_id: stranger.id, access_level: Member::MAINTAINER
expect(response).to have_gitlab_http_status(201)
expect(json_response['id']).to eq(stranger.id)
expect(json_response['access_level']).to eq(Member::MAINTAINER)
end
end
2017-08-17 22:00:37 +05:30
it "returns 409 if member already exists" do
2018-11-18 11:00:15 +05:30
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
user_id: maintainer.id, access_level: Member::MAINTAINER
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(409)
2016-09-13 17:45:13 +05:30
end
2018-11-18 11:00:15 +05:30
it 'returns 404 when the user_id is not valid' do
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
user_id: 0, access_level: Member::MAINTAINER
expect(response).to have_gitlab_http_status(404)
expect(json_response['message']).to eq('404 User Not Found')
end
2016-09-13 17:45:13 +05:30
it 'returns 400 when user_id is not given' do
2018-11-18 11:00:15 +05:30
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
access_level: Member::MAINTAINER
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(400)
2016-09-13 17:45:13 +05:30
end
it 'returns 400 when access_level is not given' do
2018-11-18 11:00:15 +05:30
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
2016-09-13 17:45:13 +05:30
user_id: stranger.id
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(400)
2016-09-13 17:45:13 +05:30
end
2017-08-17 22:00:37 +05:30
it 'returns 400 when access_level is not valid' do
2018-11-18 11:00:15 +05:30
post api("/#{source_type.pluralize}/#{source.id}/members", maintainer),
2016-09-13 17:45:13 +05:30
user_id: stranger.id, access_level: 1234
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(400)
2016-09-13 17:45:13 +05:30
end
end
end
2018-11-18 11:00:15 +05:30
shared_examples 'PUT /:source_type/:id/members/:user_id' do |source_type|
context "with :source_type == #{source_type.pluralize}" do
2016-09-13 17:45:13 +05:30
it_behaves_like 'a 404 response when source is private' do
2016-11-03 12:29:30 +05:30
let(:route) do
put api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", stranger),
2018-11-18 11:00:15 +05:30
access_level: Member::MAINTAINER
2016-11-03 12:29:30 +05:30
end
2016-09-13 17:45:13 +05:30
end
context 'when authenticated as a non-member or member with insufficient rights' do
%i[access_requester stranger developer].each do |type|
context "as a #{type}" do
it 'returns 403' do
user = public_send(type)
2016-11-03 12:29:30 +05:30
put api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", user),
2018-11-18 11:00:15 +05:30
access_level: Member::MAINTAINER
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(403)
2016-09-13 17:45:13 +05:30
end
end
end
end
2018-11-18 11:00:15 +05:30
context 'when authenticated as a maintainer/owner' do
2016-09-13 17:45:13 +05:30
it 'updates the member' do
2018-11-18 11:00:15 +05:30
put api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", maintainer),
access_level: Member::MAINTAINER, expires_at: '2016-08-05'
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(200)
2016-09-13 17:45:13 +05:30
expect(json_response['id']).to eq(developer.id)
2018-11-18 11:00:15 +05:30
expect(json_response['access_level']).to eq(Member::MAINTAINER)
2016-09-13 17:45:13 +05:30
expect(json_response['expires_at']).to eq('2016-08-05')
end
end
it 'returns 409 if member does not exist' do
2018-11-18 11:00:15 +05:30
put api("/#{source_type.pluralize}/#{source.id}/members/123", maintainer),
access_level: Member::MAINTAINER
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(404)
2016-09-13 17:45:13 +05:30
end
it 'returns 400 when access_level is not given' do
2018-11-18 11:00:15 +05:30
put api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", maintainer)
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(400)
2016-09-13 17:45:13 +05:30
end
2017-08-17 22:00:37 +05:30
it 'returns 400 when access level is not valid' do
2018-11-18 11:00:15 +05:30
put api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", maintainer),
2016-09-13 17:45:13 +05:30
access_level: 1234
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(400)
2016-09-13 17:45:13 +05:30
end
end
end
2018-11-18 11:00:15 +05:30
shared_examples 'DELETE /:source_type/:id/members/:user_id' do |source_type|
context "with :source_type == #{source_type.pluralize}" do
2016-09-13 17:45:13 +05:30
it_behaves_like 'a 404 response when source is private' do
let(:route) { delete api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", stranger) }
end
context 'when authenticated as a non-member or member with insufficient rights' do
%i[access_requester stranger].each do |type|
context "as a #{type}" do
it 'returns 403' do
user = public_send(type)
delete api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", user)
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(403)
2016-09-13 17:45:13 +05:30
end
end
end
end
context 'when authenticated as a member and deleting themself' do
it 'deletes the member' do
expect do
delete api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", developer)
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(204)
2016-09-13 17:45:13 +05:30
end.to change { source.members.count }.by(-1)
end
end
2018-11-18 11:00:15 +05:30
context 'when authenticated as a maintainer/owner' do
2016-09-13 17:45:13 +05:30
context 'and member is a requester' do
2017-08-17 22:00:37 +05:30
it 'returns 404' do
2016-09-13 17:45:13 +05:30
expect do
2018-11-18 11:00:15 +05:30
delete api("/#{source_type.pluralize}/#{source.id}/members/#{access_requester.id}", maintainer)
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(404)
2016-09-13 17:45:13 +05:30
end.not_to change { source.requesters.count }
end
end
it 'deletes the member' do
expect do
2018-11-18 11:00:15 +05:30
delete api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", maintainer)
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(204)
2016-09-13 17:45:13 +05:30
end.to change { source.members.count }.by(-1)
end
2018-03-17 18:26:18 +05:30
it_behaves_like '412 response' do
2018-11-18 11:00:15 +05:30
let(:request) { api("/#{source_type.pluralize}/#{source.id}/members/#{developer.id}", maintainer) }
2018-03-17 18:26:18 +05:30
end
2016-09-13 17:45:13 +05:30
end
2017-08-17 22:00:37 +05:30
it 'returns 404 if member does not exist' do
2018-11-18 11:00:15 +05:30
delete api("/#{source_type.pluralize}/#{source.id}/members/123", maintainer)
2016-09-13 17:45:13 +05:30
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(404)
2016-09-13 17:45:13 +05:30
end
end
end
2018-11-18 11:00:15 +05:30
[false, true].each do |all|
it_behaves_like 'GET /:source_type/:id/members/(all)', 'project', all do
let(:source) { project }
end
2016-09-13 17:45:13 +05:30
2018-11-18 11:00:15 +05:30
it_behaves_like 'GET /:source_type/:id/members/(all)', 'group', all do
let(:source) { group }
end
2016-09-13 17:45:13 +05:30
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'GET /:source_type/:id/members/:user_id', 'project' do
2016-09-13 17:45:13 +05:30
let(:source) { project }
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'GET /:source_type/:id/members/:user_id', 'group' do
2016-09-13 17:45:13 +05:30
let(:source) { group }
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'POST /:source_type/:id/members', 'project' do
2016-09-13 17:45:13 +05:30
let(:source) { project }
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'POST /:source_type/:id/members', 'group' do
2016-09-13 17:45:13 +05:30
let(:source) { group }
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'PUT /:source_type/:id/members/:user_id', 'project' do
2016-09-13 17:45:13 +05:30
let(:source) { project }
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'PUT /:source_type/:id/members/:user_id', 'group' do
2016-09-13 17:45:13 +05:30
let(:source) { group }
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'DELETE /:source_type/:id/members/:user_id', 'project' do
2016-09-13 17:45:13 +05:30
let(:source) { project }
end
2018-11-18 11:00:15 +05:30
it_behaves_like 'DELETE /:source_type/:id/members/:user_id', 'group' do
2016-09-13 17:45:13 +05:30
let(:source) { group }
end
2016-11-03 12:29:30 +05:30
context 'Adding owner to project' do
it 'returns 403' do
expect do
2018-11-18 11:00:15 +05:30
post api("/projects/#{project.id}/members", maintainer),
2016-11-03 12:29:30 +05:30
user_id: stranger.id, access_level: Member::OWNER
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(400)
2016-11-03 12:29:30 +05:30
end.to change { project.members.count }.by(0)
end
end
2016-09-13 17:45:13 +05:30
end