debian-mirror-gitlab/spec/support/shared_examples/controllers/githubish_import_controller_shared_examples.rb

535 lines
20 KiB
Ruby
Raw Normal View History

2019-10-12 21:52:04 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
# Specifications for behavior common to all objects with an email attribute.
# Takes a list of email-format attributes and requires:
# - subject { "the object with a attribute= setter" }
# Note: You have access to `email_value` which is the email address value
# being currently tested).
def assign_session_token(provider)
session[:"#{provider}_access_token"] = 'asdasd12345'
end
2020-03-13 15:44:24 +05:30
RSpec.shared_examples 'a GitHub-ish import controller: POST personal_access_token' do
2017-08-17 22:00:37 +05:30
let(:status_import_url) { public_send("status_import_#{provider}_url") }
it "updates access token" do
token = 'asdfasdf9876'
2018-03-17 18:26:18 +05:30
allow_any_instance_of(Gitlab::LegacyGithubImport::Client)
2017-09-10 17:25:29 +05:30
.to receive(:user).and_return(true)
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :personal_access_token, params: { personal_access_token: token }
2017-08-17 22:00:37 +05:30
expect(session[:"#{provider}_access_token"]).to eq(token)
expect(controller).to redirect_to(status_import_url)
end
2018-12-13 13:39:08 +05:30
it "strips access token with spaces" do
token = 'asdfasdf9876'
allow_any_instance_of(Gitlab::LegacyGithubImport::Client)
.to receive(:user).and_return(true)
2019-02-15 15:39:39 +05:30
post :personal_access_token, params: { personal_access_token: " #{token} " }
2018-12-13 13:39:08 +05:30
expect(session[:"#{provider}_access_token"]).to eq(token)
expect(controller).to redirect_to(status_import_url)
end
2017-08-17 22:00:37 +05:30
end
2020-03-13 15:44:24 +05:30
RSpec.shared_examples 'a GitHub-ish import controller: GET new' do
2017-08-17 22:00:37 +05:30
let(:status_import_url) { public_send("status_import_#{provider}_url") }
it "redirects to status if we already have a token" do
assign_session_token(provider)
allow(controller).to receive(:logged_in_with_provider?).and_return(false)
get :new
expect(controller).to redirect_to(status_import_url)
end
it "renders the :new page if no token is present in session" do
get :new
expect(response).to render_template(:new)
end
end
2020-03-13 15:44:24 +05:30
RSpec.shared_examples 'a GitHub-ish import controller: GET status' do
2017-08-17 22:00:37 +05:30
let(:new_import_url) { public_send("new_import_#{provider}_url") }
let(:user) { create(:user) }
2019-07-07 11:18:12 +05:30
let(:repo) { OpenStruct.new(login: 'vim', full_name: 'asd/vim', name: 'vim', owner: { login: 'owner' }) }
2017-08-17 22:00:37 +05:30
let(:org) { OpenStruct.new(login: 'company') }
2019-07-07 11:18:12 +05:30
let(:org_repo) { OpenStruct.new(login: 'company', full_name: 'company/repo', name: 'repo', owner: { login: 'owner' }) }
2017-08-17 22:00:37 +05:30
before do
assign_session_token(provider)
end
2019-07-07 11:18:12 +05:30
it "returns variables for json request" do
project = create(:project, import_type: provider, namespace: user.namespace, import_status: :finished, import_source: 'example/repo')
group = create(:group)
group.add_owner(user)
2020-10-24 23:57:45 +05:30
stub_client(repos: [repo, org_repo], orgs: [org], org_repos: [org_repo], each_page: [OpenStruct.new(objects: [repo, org_repo])].to_enum)
2017-08-17 22:00:37 +05:30
2019-07-07 11:18:12 +05:30
get :status, format: :json
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-07-07 11:18:12 +05:30
expect(json_response.dig("imported_projects", 0, "id")).to eq(project.id)
expect(json_response.dig("provider_repos", 0, "id")).to eq(repo.id)
expect(json_response.dig("provider_repos", 1, "id")).to eq(org_repo.id)
expect(json_response.dig("namespaces", 0, "id")).to eq(group.id)
2017-08-17 22:00:37 +05:30
end
it "does not show already added project" do
2019-07-07 11:18:12 +05:30
project = create(:project, import_type: provider, namespace: user.namespace, import_status: :finished, import_source: 'asd/vim')
2020-10-24 23:57:45 +05:30
stub_client(repos: [repo], orgs: [], each_page: [OpenStruct.new(objects: [repo])].to_enum)
2017-08-17 22:00:37 +05:30
2019-07-07 11:18:12 +05:30
get :status, format: :json
expect(json_response.dig("imported_projects", 0, "id")).to eq(project.id)
expect(json_response.dig("provider_repos")).to eq([])
end
it "touches the etag cache store" do
2020-10-24 23:57:45 +05:30
stub_client(repos: [], orgs: [], each_page: [])
2019-07-07 11:18:12 +05:30
expect_next_instance_of(Gitlab::EtagCaching::Store) do |store|
expect(store).to receive(:touch) { "realtime_changes_import_#{provider}_path" }
end
get :status, format: :json
end
2017-08-17 22:00:37 +05:30
it "handles an invalid access token" do
2020-10-24 23:57:45 +05:30
client = stub_client(repos: [], orgs: [], each_page: [])
allow(client).to receive(:repos).and_raise(Octokit::Unauthorized)
allow(client).to receive(:each_page).and_raise(Octokit::Unauthorized)
2017-08-17 22:00:37 +05:30
get :status
expect(session[:"#{provider}_access_token"]).to be_nil
expect(controller).to redirect_to(new_import_url)
expect(flash[:alert]).to eq("Access denied to your #{Gitlab::ImportSources.title(provider.to_s)} account.")
end
2019-07-07 11:18:12 +05:30
it "does not produce N+1 database queries" do
2020-10-24 23:57:45 +05:30
stub_client(repos: [repo], orgs: [], each_page: [].to_enum)
2019-07-07 11:18:12 +05:30
group_a = create(:group)
group_a.add_owner(user)
create(:project, :import_started, import_type: provider, namespace: user.namespace)
control_count = ActiveRecord::QueryRecorder.new(skip_cached: false) do
get :status, format: :json
end.count
stub_client(repos: [repo, org_repo], orgs: [])
group_b = create(:group)
group_b.add_owner(user)
create(:project, :import_started, import_type: provider, namespace: user.namespace)
expect { get :status, format: :json }
.not_to exceed_all_query_limit(control_count)
end
2019-12-21 20:55:43 +05:30
context 'when filtering' do
let(:repo_2) { OpenStruct.new(login: 'emacs', full_name: 'asd/emacs', name: 'emacs', owner: { login: 'owner' }) }
let(:project) { create(:project, import_type: provider, namespace: user.namespace, import_status: :finished, import_source: 'example/repo') }
let(:group) { create(:group) }
2020-10-24 23:57:45 +05:30
let(:repos) { [repo, repo_2, org_repo] }
2019-12-21 20:55:43 +05:30
before do
group.add_owner(user)
2020-10-24 23:57:45 +05:30
client = stub_client(repos: repos, orgs: [org], org_repos: [org_repo])
allow(client).to receive(:each_page).and_return([OpenStruct.new(objects: repos)].to_enum)
2021-01-29 00:20:46 +05:30
# GitHub controller has filtering done using GitHub Search API
stub_feature_flags(remove_legacy_github_client: false)
2019-12-21 20:55:43 +05:30
end
it 'filters list of repositories by name' do
get :status, params: { filter: 'emacs' }, format: :json
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-12-21 20:55:43 +05:30
expect(json_response.dig("imported_projects").count).to eq(0)
expect(json_response.dig("provider_repos").count).to eq(1)
expect(json_response.dig("provider_repos", 0, "id")).to eq(repo_2.id)
expect(json_response.dig("namespaces", 0, "id")).to eq(group.id)
end
2021-01-29 00:20:46 +05:30
it 'filters the list, ignoring the case of the name' do
get :status, params: { filter: 'EMACS' }, format: :json
expect(response).to have_gitlab_http_status(:ok)
expect(json_response.dig("imported_projects").count).to eq(0)
expect(json_response.dig("provider_repos").count).to eq(1)
expect(json_response.dig("provider_repos", 0, "id")).to eq(repo_2.id)
expect(json_response.dig("namespaces", 0, "id")).to eq(group.id)
end
2019-12-21 20:55:43 +05:30
context 'when user input contains html' do
let(:expected_filter) { 'test' }
let(:filter) { "<html>#{expected_filter}</html>" }
it 'sanitizes user input' do
get :status, params: { filter: filter }, format: :json
expect(assigns(:filter)).to eq(expected_filter)
end
end
2021-01-29 00:20:46 +05:30
context 'when the client returns a non-string name' do
before do
repos = [build(:project, name: 2, path: 'test')]
client = stub_client(repos: repos)
allow(client).to receive(:each_page).and_return([OpenStruct.new(objects: repos)].to_enum)
end
it 'does not raise an error' do
get :status, params: { filter: '2' }, format: :json
expect(response).to have_gitlab_http_status :ok
expect(json_response.dig("provider_repos").count).to eq(1)
end
end
2019-12-21 20:55:43 +05:30
end
2017-08-17 22:00:37 +05:30
end
2020-03-13 15:44:24 +05:30
RSpec.shared_examples 'a GitHub-ish import controller: POST create' do
2017-08-17 22:00:37 +05:30
let(:user) { create(:user) }
let(:provider_username) { user.username }
let(:provider_user) { OpenStruct.new(login: provider_username) }
2019-07-07 11:18:12 +05:30
let(:project) { create(:project, import_type: provider, import_status: :finished, import_source: "#{provider_username}/vim") }
2017-08-17 22:00:37 +05:30
let(:provider_repo) do
OpenStruct.new(
name: 'vim',
full_name: "#{provider_username}/vim",
owner: OpenStruct.new(login: provider_username)
)
end
before do
2020-10-24 23:57:45 +05:30
stub_client(user: provider_user, repo: provider_repo, repository: provider_repo)
2017-08-17 22:00:37 +05:30
assign_session_token(provider)
end
2018-03-27 19:54:05 +05:30
it 'returns 200 response when the project is imported successfully' do
allow(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2018-03-27 19:54:05 +05:30
post :create, format: :json
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2018-03-27 19:54:05 +05:30
end
2018-11-08 19:23:39 +05:30
it 'returns 422 response with the base error when the project could not be imported' do
project = build(:project)
project.errors.add(:name, 'is invalid')
project.errors.add(:path, 'is old')
2018-03-27 19:54:05 +05:30
allow(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2018-03-27 19:54:05 +05:30
post :create, format: :json
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:unprocessable_entity)
2018-11-08 19:23:39 +05:30
expect(json_response['errors']).to eq('Name is invalid, Path is old')
2018-03-27 19:54:05 +05:30
end
2019-07-07 11:18:12 +05:30
it "touches the etag cache store" do
allow(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2019-07-07 11:18:12 +05:30
expect_next_instance_of(Gitlab::EtagCaching::Store) do |store|
expect(store).to receive(:touch) { "realtime_changes_import_#{provider}_path" }
end
post :create, format: :json
end
2017-08-17 22:00:37 +05:30
context "when the repository owner is the provider user" do
context "when the provider user and GitLab user's usernames match" do
it "takes the current user's namespace" do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2018-03-27 19:54:05 +05:30
post :create, format: :json
2017-08-17 22:00:37 +05:30
end
end
context "when the provider user and GitLab user's usernames don't match" do
let(:provider_username) { "someone_else" }
it "takes the current user's namespace" do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2018-03-27 19:54:05 +05:30
post :create, format: :json
2017-08-17 22:00:37 +05:30
end
end
end
context "when the repository owner is not the provider user" do
let(:other_username) { "someone_else" }
before do
provider_repo.owner = OpenStruct.new(login: other_username)
assign_session_token(provider)
end
context "when a namespace with the provider user's username already exists" do
2018-03-17 18:26:18 +05:30
let!(:existing_namespace) { user.namespace }
2017-08-17 22:00:37 +05:30
context "when the namespace is owned by the GitLab user" do
2018-03-17 18:26:18 +05:30
before do
user.username = other_username
2021-01-03 14:25:43 +05:30
user.save!
2018-03-17 18:26:18 +05:30
end
2017-08-17 22:00:37 +05:30
it "takes the existing namespace" do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, existing_namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2018-03-27 19:54:05 +05:30
post :create, format: :json
2017-08-17 22:00:37 +05:30
end
end
context "when the namespace is not owned by the GitLab user" do
it "creates a project using user's namespace" do
2018-03-17 18:26:18 +05:30
create(:user, username: other_username)
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2018-03-27 19:54:05 +05:30
post :create, format: :json
2017-08-17 22:00:37 +05:30
end
end
end
context "when a namespace with the provider user's username doesn't exist" do
context "when current user can create namespaces" do
it "creates the namespace" do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2018-03-27 19:54:05 +05:30
.to receive(:new).and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
expect { post :create, params: { target_namespace: provider_repo.name }, format: :json }.to change(Namespace, :count).by(1)
2017-08-17 22:00:37 +05:30
end
it "takes the new namespace" do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, an_instance_of(Group), user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: provider_repo.name }, format: :json
2017-08-17 22:00:37 +05:30
end
end
context "when current user can't create namespaces" do
before do
user.update_attribute(:can_create_group, false)
end
it "doesn't create the namespace" do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2018-03-27 19:54:05 +05:30
.to receive(:new).and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2018-03-27 19:54:05 +05:30
expect { post :create, format: :json }.not_to change(Namespace, :count)
2017-08-17 22:00:37 +05:30
end
it "takes the current user's namespace" do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, provider_repo.name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2018-03-27 19:54:05 +05:30
post :create, format: :json
2017-08-17 22:00:37 +05:30
end
end
end
context 'user has chosen a namespace and name for the project' do
2017-09-10 17:25:29 +05:30
let(:test_namespace) { create(:group, name: 'test_namespace') }
2017-08-17 22:00:37 +05:30
let(:test_name) { 'test_name' }
2017-09-10 17:25:29 +05:30
before do
test_namespace.add_owner(user)
end
2017-08-17 22:00:37 +05:30
it 'takes the selected namespace and name' do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, test_namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: test_namespace.name, new_name: test_name }, format: :json
2017-08-17 22:00:37 +05:30
end
it 'takes the selected name and default namespace' do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { new_name: test_name }, format: :json
2017-08-17 22:00:37 +05:30
end
end
2019-10-12 21:52:04 +05:30
context 'user has chosen an existing nested namespace and name for the project' do
2018-10-15 14:42:47 +05:30
let(:parent_namespace) { create(:group, name: 'foo') }
2017-09-10 17:25:29 +05:30
let(:nested_namespace) { create(:group, name: 'bar', parent: parent_namespace) }
2017-08-17 22:00:37 +05:30
let(:test_name) { 'test_name' }
2017-09-10 17:25:29 +05:30
before do
2018-10-15 14:42:47 +05:30
parent_namespace.add_owner(user)
2017-09-10 17:25:29 +05:30
nested_namespace.add_owner(user)
end
2017-08-17 22:00:37 +05:30
it 'takes the selected namespace and name' do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, nested_namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: nested_namespace.full_path, new_name: test_name }, format: :json
2017-08-17 22:00:37 +05:30
end
end
2019-10-12 21:52:04 +05:30
context 'user has chosen a non-existent nested namespaces and name for the project' do
2017-08-17 22:00:37 +05:30
let(:test_name) { 'test_name' }
it 'takes the selected namespace and name' do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, kind_of(Namespace), user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: 'foo/bar', new_name: test_name }, format: :json
2017-08-17 22:00:37 +05:30
end
it 'creates the namespaces' do
2018-03-17 18:26:18 +05:30
allow(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, kind_of(Namespace), user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
expect { post :create, params: { target_namespace: 'foo/bar', new_name: test_name }, format: :json }
2017-08-17 22:00:37 +05:30
.to change { Namespace.count }.by(2)
end
it 'new namespace has the right parent' do
2018-03-17 18:26:18 +05:30
allow(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, kind_of(Namespace), user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: 'foo/bar', new_name: test_name }, format: :json
2017-08-17 22:00:37 +05:30
expect(Namespace.find_by_path_or_name('bar').parent.path).to eq('foo')
end
end
2019-10-12 21:52:04 +05:30
context 'user has chosen existent and non-existent nested namespaces and name for the project' do
2017-08-17 22:00:37 +05:30
let(:test_name) { 'test_name' }
2018-10-15 14:42:47 +05:30
let!(:parent_namespace) { create(:group, name: 'foo') }
2017-08-17 22:00:37 +05:30
2018-03-17 18:26:18 +05:30
before do
parent_namespace.add_owner(user)
end
2017-08-17 22:00:37 +05:30
it 'takes the selected namespace and name' do
2018-03-17 18:26:18 +05:30
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, kind_of(Namespace), user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: 'foo/foobar/bar', new_name: test_name }, format: :json
2017-08-17 22:00:37 +05:30
end
it 'creates the namespaces' do
2018-03-17 18:26:18 +05:30
allow(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, kind_of(Namespace), user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2017-08-17 22:00:37 +05:30
2019-02-15 15:39:39 +05:30
expect { post :create, params: { target_namespace: 'foo/foobar/bar', new_name: test_name }, format: :json }
2017-08-17 22:00:37 +05:30
.to change { Namespace.count }.by(2)
end
2018-03-17 18:26:18 +05:30
it 'does not create a new namespace under the user namespace' do
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2018-03-17 18:26:18 +05:30
2019-02-15 15:39:39 +05:30
expect { post :create, params: { target_namespace: "#{user.namespace_path}/test_group", new_name: test_name }, format: :js }
2020-10-24 23:57:45 +05:30
.not_to change { Namespace.count }
2018-03-17 18:26:18 +05:30
end
end
context 'user cannot create a subgroup inside a group is not a member of' do
let(:test_name) { 'test_name' }
let!(:parent_namespace) { create(:group, name: 'foo') }
it 'does not take the selected namespace and name' do
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, user.namespace, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2018-03-17 18:26:18 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: 'foo/foobar/bar', new_name: test_name }, format: :js
2018-03-17 18:26:18 +05:30
end
it 'does not create the namespaces' do
allow(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, kind_of(Namespace), user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2018-03-17 18:26:18 +05:30
2019-02-15 15:39:39 +05:30
expect { post :create, params: { target_namespace: 'foo/foobar/bar', new_name: test_name }, format: :js }
2020-10-24 23:57:45 +05:30
.not_to change { Namespace.count }
2018-03-17 18:26:18 +05:30
end
end
context 'user can use a group without having permissions to create a group' do
let(:test_name) { 'test_name' }
let!(:group) { create(:group, name: 'foo') }
it 'takes the selected namespace and name' do
group.add_owner(user)
user.update!(can_create_group: false)
expect(Gitlab::LegacyGithubImport::ProjectCreator)
2021-02-22 17:27:13 +05:30
.to receive(:new).with(provider_repo, test_name, group, user, type: provider, **access_params)
2020-10-24 23:57:45 +05:30
.and_return(double(execute: project))
2018-03-17 18:26:18 +05:30
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: 'foo', new_name: test_name }, format: :js
2018-03-17 18:26:18 +05:30
end
2017-08-17 22:00:37 +05:30
end
2018-03-27 19:54:05 +05:30
context 'when user can not create projects in the chosen namespace' do
it 'returns 422 response' do
other_namespace = create(:group, name: 'other_namespace')
2019-02-15 15:39:39 +05:30
post :create, params: { target_namespace: other_namespace.name }, format: :json
2018-03-27 19:54:05 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:unprocessable_entity)
2018-03-27 19:54:05 +05:30
end
end
2017-08-17 22:00:37 +05:30
end
end
2019-07-07 11:18:12 +05:30
2020-03-13 15:44:24 +05:30
RSpec.shared_examples 'a GitHub-ish import controller: GET realtime_changes' do
2019-07-07 11:18:12 +05:30
let(:user) { create(:user) }
before do
assign_session_token(provider)
end
it 'sets a Poll-Interval header' do
project = create(:project, import_type: provider, namespace: user.namespace, import_status: :finished, import_source: 'example/repo')
get :realtime_changes
expect(json_response).to eq([{ "id" => project.id, "import_status" => project.import_status }])
expect(Integer(response.headers['Poll-Interval'])).to be > -1
end
end