debian-mirror-gitlab/spec/requests/api/projects_spec.rb

1734 lines
60 KiB
Ruby
Raw Normal View History

2015-04-26 12:48:37 +05:30
# -*- coding: utf-8 -*-
2014-09-02 18:07:02 +05:30
require 'spec_helper'
2017-08-17 22:00:37 +05:30
describe API::Projects do
2015-04-26 12:48:37 +05:30
include Gitlab::CurrentSettings
2017-08-17 22:00:37 +05:30
2014-09-02 18:07:02 +05:30
let(:user) { create(:user) }
let(:user2) { create(:user) }
let(:user3) { create(:user) }
let(:admin) { create(:admin) }
2017-09-10 17:25:29 +05:30
let(:project) { create(:project, creator_id: user.id, namespace: user.namespace) }
let(:project2) { create(:project, path: 'project2', creator_id: user.id, namespace: user.namespace) }
2016-06-02 11:05:42 +05:30
let(:snippet) { create(:project_snippet, :public, author: user, project: project, title: 'example') }
2017-09-10 17:25:29 +05:30
let(:project_member) { create(:project_member, :developer, user: user3, project: project) }
2015-04-26 12:48:37 +05:30
let(:user4) { create(:user) }
let(:project3) do
create(:project,
2016-06-02 11:05:42 +05:30
:private,
2017-08-17 22:00:37 +05:30
:repository,
2015-04-26 12:48:37 +05:30
name: 'second_project',
path: 'second_project',
creator_id: user.id,
namespace: user.namespace,
merge_requests_enabled: false,
issues_enabled: false, wiki_enabled: false,
2017-08-17 22:00:37 +05:30
builds_enabled: false,
2016-06-02 11:05:42 +05:30
snippets_enabled: false)
2015-04-26 12:48:37 +05:30
end
2017-09-10 17:25:29 +05:30
let(:project_member2) do
2015-04-26 12:48:37 +05:30
create(:project_member,
user: user4,
project: project3,
access_level: ProjectMember::MASTER)
end
let(:project4) do
2017-09-10 17:25:29 +05:30
create(:project,
2015-04-26 12:48:37 +05:30
name: 'third_project',
path: 'third_project',
creator_id: user4.id,
namespace: user4.namespace)
end
2014-09-02 18:07:02 +05:30
2015-04-26 12:48:37 +05:30
describe 'GET /projects' do
2017-08-17 22:00:37 +05:30
shared_examples_for 'projects response' do
it 'returns an array of projects' do
get api('/projects', current_user), filter
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.map { |p| p['id'] }).to contain_exactly(*projects.map(&:id))
end
end
2017-09-10 17:25:29 +05:30
shared_examples_for 'projects response without N + 1 queries' do
it 'avoids N + 1 queries' do
control_count = ActiveRecord::QueryRecorder.new do
get api('/projects', current_user)
end.count
if defined?(additional_project)
additional_project
else
create(:project, :public)
end
expect do
get api('/projects', current_user)
end.not_to exceed_query_limit(control_count + 8)
end
end
let!(:public_project) { create(:project, :public, name: 'public_project') }
2017-08-17 22:00:37 +05:30
before do
project
project2
project3
project4
end
2014-09-02 18:07:02 +05:30
2015-04-26 12:48:37 +05:30
context 'when unauthenticated' do
2017-08-17 22:00:37 +05:30
it_behaves_like 'projects response' do
2017-09-10 17:25:29 +05:30
let(:filter) { { search: project.name } }
let(:current_user) { user }
let(:projects) { [project] }
end
it_behaves_like 'projects response without N + 1 queries' do
2017-08-17 22:00:37 +05:30
let(:current_user) { nil }
2014-09-02 18:07:02 +05:30
end
end
2017-08-17 22:00:37 +05:30
context 'when authenticated as regular user' do
it_behaves_like 'projects response' do
let(:filter) { {} }
let(:current_user) { user }
let(:projects) { [public_project, project, project2, project3] }
2015-04-26 12:48:37 +05:30
end
2015-09-11 14:41:01 +05:30
2017-09-10 17:25:29 +05:30
it_behaves_like 'projects response without N + 1 queries' do
let(:current_user) { user }
end
context 'when some projects are in a group' do
before do
create(:project, :public, group: create(:group))
end
it_behaves_like 'projects response without N + 1 queries' do
let(:current_user) { user }
let(:additional_project) { create(:project, :public, group: create(:group)) }
end
end
2016-09-13 17:45:13 +05:30
it 'includes the project labels as the tag_list' do
2015-04-26 12:48:37 +05:30
get api('/projects', user)
2017-08-17 22:00:37 +05:30
2015-09-11 14:41:01 +05:30
expect(response.status).to eq 200
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2015-09-11 14:41:01 +05:30
expect(json_response).to be_an Array
expect(json_response.first.keys).to include('tag_list')
2015-04-26 12:48:37 +05:30
end
2015-09-11 14:41:01 +05:30
2016-09-13 17:45:13 +05:30
it 'includes open_issues_count' do
2015-12-23 02:04:40 +05:30
get api('/projects', user)
2017-08-17 22:00:37 +05:30
2015-12-23 02:04:40 +05:30
expect(response.status).to eq 200
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2015-12-23 02:04:40 +05:30
expect(json_response).to be_an Array
expect(json_response.first.keys).to include('open_issues_count')
end
2017-08-17 22:00:37 +05:30
it 'does not include open_issues_count if issues are disabled' do
2016-09-29 09:46:39 +05:30
project.project_feature.update_attribute(:issues_access_level, ProjectFeature::DISABLED)
2015-12-23 02:04:40 +05:30
get api('/projects', user)
2017-08-17 22:00:37 +05:30
2015-12-23 02:04:40 +05:30
expect(response.status).to eq 200
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.find { |hash| hash['id'] == project.id }.keys).not_to include('open_issues_count')
end
it "does not include statistics by default" do
get api('/projects', user)
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.first).not_to include('statistics')
end
it "includes statistics if requested" do
get api('/projects', user), statistics: true
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
2015-12-23 02:04:40 +05:30
expect(json_response).to be_an Array
2017-08-17 22:00:37 +05:30
expect(json_response.first).to include 'statistics'
2015-12-23 02:04:40 +05:30
end
2017-09-10 17:25:29 +05:30
context 'when external issue tracker is enabled' do
let!(:jira_service) { create(:jira_service, project: project) }
it 'includes open_issues_count' do
get api('/projects', user)
expect(response.status).to eq 200
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.first.keys).to include('open_issues_count')
expect(json_response.find { |hash| hash['id'] == project.id }.keys).to include('open_issues_count')
end
it 'does not include open_issues_count if issues are disabled' do
project.project_feature.update_attribute(:issues_access_level, ProjectFeature::DISABLED)
get api('/projects', user)
expect(response.status).to eq 200
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.find { |hash| hash['id'] == project.id }.keys).not_to include('open_issues_count')
end
end
2017-08-17 22:00:37 +05:30
context 'and with simple=true' do
2016-08-24 12:49:21 +05:30
it 'returns a simplified version of all the projects' do
2017-09-10 17:25:29 +05:30
expected_keys = %w(
id description default_branch tag_list
ssh_url_to_repo http_url_to_repo web_url
name name_with_namespace
path path_with_namespace
star_count forks_count
created_at last_activity_at
)
2016-08-24 12:49:21 +05:30
get api('/projects?simple=true', user)
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2016-08-24 12:49:21 +05:30
expect(json_response).to be_an Array
expect(json_response.first.keys).to match_array expected_keys
end
end
2015-04-26 12:48:37 +05:30
context 'and using search' do
2017-08-17 22:00:37 +05:30
it_behaves_like 'projects response' do
let(:filter) { { search: project.name } }
let(:current_user) { user }
let(:projects) { [project] }
end
end
context 'and membership=true' do
it_behaves_like 'projects response' do
let(:filter) { { membership: true } }
let(:current_user) { user }
let(:projects) { [project, project2, project3] }
2015-04-26 12:48:37 +05:30
end
end
2016-04-02 18:10:28 +05:30
context 'and using the visibility filter' do
2016-09-13 17:45:13 +05:30
it 'filters based on private visibility param' do
2016-04-02 18:10:28 +05:30
get api('/projects', user), { visibility: 'private' }
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2016-04-02 18:10:28 +05:30
expect(json_response).to be_an Array
2017-08-17 22:00:37 +05:30
expect(json_response.map { |p| p['id'] }).to contain_exactly(project.id, project2.id, project3.id)
2016-04-02 18:10:28 +05:30
end
2016-09-13 17:45:13 +05:30
it 'filters based on internal visibility param' do
2017-08-17 22:00:37 +05:30
project2.update_attribute(:visibility_level, Gitlab::VisibilityLevel::INTERNAL)
2016-04-02 18:10:28 +05:30
get api('/projects', user), { visibility: 'internal' }
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2016-04-02 18:10:28 +05:30
expect(json_response).to be_an Array
2017-08-17 22:00:37 +05:30
expect(json_response.map { |p| p['id'] }).to contain_exactly(project2.id)
2016-04-02 18:10:28 +05:30
end
2016-09-13 17:45:13 +05:30
it 'filters based on public visibility param' do
2016-04-02 18:10:28 +05:30
get api('/projects', user), { visibility: 'public' }
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2016-04-02 18:10:28 +05:30
expect(json_response).to be_an Array
2017-08-17 22:00:37 +05:30
expect(json_response.map { |p| p['id'] }).to contain_exactly(public_project.id)
2016-04-02 18:10:28 +05:30
end
end
2015-04-26 12:48:37 +05:30
context 'and using sorting' do
2016-09-13 17:45:13 +05:30
it 'returns the correct order when sorted by id' do
2015-09-11 14:41:01 +05:30
get api('/projects', user), { order_by: 'id', sort: 'desc' }
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2015-04-26 12:48:37 +05:30
expect(json_response).to be_an Array
expect(json_response.first['id']).to eq(project3.id)
end
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
context 'and with owned=true' do
it 'returns an array of projects the user owns' do
get api('/projects', user4), owned: true
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.first['name']).to eq(project4.name)
expect(json_response.first['owner']['username']).to eq(user4.username)
end
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
context 'and with starred=true' do
2017-09-10 17:25:29 +05:30
let(:public_project) { create(:project, :public) }
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
before do
2017-09-10 17:25:29 +05:30
project_member
2017-08-17 22:00:37 +05:30
user3.update_attributes(starred_projects: [project, project2, project3, public_project])
end
2015-04-26 12:48:37 +05:30
2017-08-17 22:00:37 +05:30
it 'returns the starred projects viewable by the user' do
get api('/projects', user3), starred: true
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.map { |project| project['id'] }).to contain_exactly(project.id, public_project.id)
2015-09-11 14:41:01 +05:30
end
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
context 'and with all query parameters' do
2017-09-10 17:25:29 +05:30
let!(:project5) { create(:project, :public, path: 'gitlab5', namespace: create(:namespace)) }
let!(:project6) { create(:project, :public, path: 'project6', namespace: user.namespace) }
let!(:project7) { create(:project, :public, path: 'gitlab7', namespace: user.namespace) }
let!(:project8) { create(:project, path: 'gitlab8', namespace: user.namespace) }
let!(:project9) { create(:project, :public, path: 'gitlab9') }
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
before do
user.update_attributes(starred_projects: [project5, project7, project8, project9])
end
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
context 'including owned filter' do
it 'returns only projects that satisfy all query parameters' do
get api('/projects', user), { visibility: 'public', owned: true, starred: true, search: 'gitlab' }
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.size).to eq(1)
expect(json_response.first['id']).to eq(project7.id)
end
end
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
context 'including membership filter' do
before do
create(:project_member,
user: user,
project: project5,
access_level: ProjectMember::MASTER)
end
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
it 'returns only projects that satisfy all query parameters' do
get api('/projects', user), { visibility: 'public', membership: true, starred: true, search: 'gitlab' }
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.size).to eq(2)
expect(json_response.map { |project| project['id'] }).to contain_exactly(project5.id, project7.id)
end
end
end
end
2016-06-02 11:05:42 +05:30
2017-08-17 22:00:37 +05:30
context 'when authenticated as a different user' do
it_behaves_like 'projects response' do
let(:filter) { {} }
let(:current_user) { user2 }
let(:projects) { [public_project] }
end
2015-12-23 02:04:40 +05:30
end
2017-08-17 22:00:37 +05:30
context 'when authenticated as admin' do
it_behaves_like 'projects response' do
let(:filter) { {} }
let(:current_user) { admin }
let(:projects) { Project.all }
end
2015-12-23 02:04:40 +05:30
end
end
2015-04-26 12:48:37 +05:30
describe 'POST /projects' do
context 'maximum number of projects reached' do
2016-09-13 17:45:13 +05:30
it 'does not create new project and respond with 403' do
2015-04-26 12:48:37 +05:30
allow_any_instance_of(User).to receive(:projects_limit_left).and_return(0)
2017-09-10 17:25:29 +05:30
expect { post api('/projects', user2), name: 'foo' }
.to change {Project.count}.by(0)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2014-09-02 18:07:02 +05:30
end
end
2017-08-17 22:00:37 +05:30
it 'creates new project without path but with name and returns 201' do
2017-09-10 17:25:29 +05:30
expect { post api('/projects', user), name: 'Foo Project' }
.to change { Project.count }.by(1)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
project = Project.first
expect(project.name).to eq('Foo Project')
expect(project.path).to eq('foo-project')
end
it 'creates new project without name but with path and returns 201' do
2017-09-10 17:25:29 +05:30
expect { post api('/projects', user), path: 'foo_project' }
.to change { Project.count }.by(1)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
project = Project.first
expect(project.name).to eq('foo_project')
expect(project.path).to eq('foo_project')
end
2017-09-10 17:25:29 +05:30
it 'creates new project with name and path and returns 201' do
expect { post api('/projects', user), path: 'path-project-Foo', name: 'Foo Project' }
.to change { Project.count }.by(1)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2017-08-17 22:00:37 +05:30
project = Project.first
expect(project.name).to eq('Foo Project')
2017-09-10 17:25:29 +05:30
expect(project.path).to eq('path-project-Foo')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'creates last project before reaching project limit' do
2015-04-26 12:48:37 +05:30
allow_any_instance_of(User).to receive(:projects_limit_left).and_return(1)
post api('/projects', user2), name: 'foo'
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'does not create new project without name or path and returns 400' do
2015-09-11 14:41:01 +05:30
expect { post api('/projects', user) }.not_to change { Project.count }
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(400)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it "assigns attributes to project" do
2014-09-02 18:07:02 +05:30
project = attributes_for(:project, {
2015-04-26 12:48:37 +05:30
path: 'camelCasePath',
2014-09-02 18:07:02 +05:30
issues_enabled: false,
2017-08-17 22:00:37 +05:30
jobs_enabled: false,
2014-09-02 18:07:02 +05:30
merge_requests_enabled: false,
2016-09-29 09:46:39 +05:30
wiki_enabled: false,
2017-08-17 22:00:37 +05:30
only_allow_merge_if_pipeline_succeeds: false,
request_access_enabled: true,
2017-09-10 17:25:29 +05:30
only_allow_merge_if_all_discussions_are_resolved: false,
ci_config_path: 'a/custom/path'
2014-09-02 18:07:02 +05:30
})
2015-04-26 12:48:37 +05:30
post api('/projects', user), project
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
2016-08-24 12:49:21 +05:30
project.each_pair do |k, v|
2016-11-03 12:29:30 +05:30
next if %i[has_external_issue_tracker issues_enabled merge_requests_enabled wiki_enabled].include?(k)
2015-04-26 12:48:37 +05:30
expect(json_response[k.to_s]).to eq(v)
2014-09-02 18:07:02 +05:30
end
2016-09-29 09:46:39 +05:30
# Check feature permissions attributes
project = Project.find_by_path(project[:path])
expect(project.project_feature.issues_access_level).to eq(ProjectFeature::DISABLED)
expect(project.project_feature.merge_requests_access_level).to eq(ProjectFeature::DISABLED)
expect(project.project_feature.wiki_access_level).to eq(ProjectFeature::DISABLED)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'sets a project as public' do
2017-08-17 22:00:37 +05:30
project = attributes_for(:project, visibility: 'public')
2015-04-26 12:48:37 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(json_response['visibility']).to eq('public')
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as internal' do
project = attributes_for(:project, visibility: 'internal')
2015-04-26 12:48:37 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(json_response['visibility']).to eq('internal')
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as private' do
project = attributes_for(:project, visibility: 'private')
2015-04-26 12:48:37 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(json_response['visibility']).to eq('private')
2014-09-02 18:07:02 +05:30
end
2017-09-10 17:25:29 +05:30
it 'sets tag list to a project' do
project = attributes_for(:project, tag_list: %w[tagFirst tagSecond])
post api('/projects', user), project
expect(json_response['tag_list']).to eq(%w[tagFirst tagSecond])
end
it 'uploads avatar for project a project' do
project = attributes_for(:project, avatar: fixture_file_upload(Rails.root + 'spec/fixtures/banana_sample.gif', 'image/gif'))
post api('/projects', user), project
project_id = json_response['id']
expect(json_response['avatar_url']).to eq("http://localhost/uploads/-/system/project/avatar/#{project_id}/banana_sample.gif")
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge even if build fails' do
project = attributes_for(:project, { only_allow_merge_if_pipeline_succeeds: false })
2015-04-26 12:48:37 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_pipeline_succeeds']).to be_falsey
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge only if merge_when_pipeline_succeeds' do
project = attributes_for(:project, { only_allow_merge_if_pipeline_succeeds: true })
2015-04-26 12:48:37 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_pipeline_succeeds']).to be_truthy
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge even if discussions are unresolved' do
project = attributes_for(:project, { only_allow_merge_if_all_discussions_are_resolved: false })
2015-04-26 12:48:37 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_all_discussions_are_resolved']).to be_falsey
2015-04-26 12:48:37 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge if only_allow_merge_if_all_discussions_are_resolved is nil' do
project = attributes_for(:project, only_allow_merge_if_all_discussions_are_resolved: nil)
2016-09-29 09:46:39 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_all_discussions_are_resolved']).to be_falsey
2016-09-29 09:46:39 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge only if all discussions are resolved' do
project = attributes_for(:project, { only_allow_merge_if_all_discussions_are_resolved: true })
post api('/projects', user), project
expect(json_response['only_allow_merge_if_all_discussions_are_resolved']).to be_truthy
end
it 'ignores import_url when it is nil' do
project = attributes_for(:project, { import_url: nil })
2016-09-29 09:46:39 +05:30
post api('/projects', user), project
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
2016-09-29 09:46:39 +05:30
end
2015-04-26 12:48:37 +05:30
context 'when a visibility level is restricted' do
2017-08-17 22:00:37 +05:30
let(:project_param) { attributes_for(:project, visibility: 'public') }
2015-04-26 12:48:37 +05:30
before do
2015-09-11 14:41:01 +05:30
stub_application_setting(restricted_visibility_levels: [Gitlab::VisibilityLevel::PUBLIC])
2015-04-26 12:48:37 +05:30
end
2016-09-13 17:45:13 +05:30
it 'does not allow a non-admin to use a restricted visibility level' do
2017-08-17 22:00:37 +05:30
post api('/projects', user), project_param
2016-06-02 11:05:42 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(400)
2015-04-26 12:48:37 +05:30
expect(json_response['message']['visibility_level'].first).to(
match('restricted by your GitLab administrator')
)
end
2016-09-13 17:45:13 +05:30
it 'allows an admin to override restricted visibility settings' do
2017-08-17 22:00:37 +05:30
post api('/projects', admin), project_param
expect(json_response['visibility']).to eq('public')
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
end
end
2017-09-10 17:25:29 +05:30
describe 'GET /users/:user_id/projects/' do
let!(:public_project) { create(:project, :public, name: 'public_project', creator_id: user4.id, namespace: user4.namespace) }
it 'returns error when user not found' do
get api('/users/9999/projects/')
expect(response).to have_http_status(404)
expect(json_response['message']).to eq('404 User Not Found')
end
it 'returns projects filtered by user' do
get api("/users/#{user4.id}/projects/", user)
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.map { |project| project['id'] }).to contain_exactly(public_project.id)
end
end
2015-04-26 12:48:37 +05:30
describe 'POST /projects/user/:id' do
2017-09-10 17:25:29 +05:30
before do
expect(project).to be_persisted
end
it 'creates new project without path but with name and return 201' do
expect { post api("/projects/user/#{user.id}", admin), name: 'Foo Project' }.to change {Project.count}.by(1)
expect(response).to have_http_status(201)
project = Project.first
expect(project.name).to eq('Foo Project')
expect(project.path).to eq('foo-project')
end
2014-09-02 18:07:02 +05:30
2017-09-10 17:25:29 +05:30
it 'creates new project with name and path and returns 201' do
expect { post api("/projects/user/#{user.id}", admin), path: 'path-project-Foo', name: 'Foo Project' }
.to change { Project.count }.by(1)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2017-09-10 17:25:29 +05:30
project = Project.first
expect(project.name).to eq('Foo Project')
expect(project.path).to eq('path-project-Foo')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'responds with 400 on failure and not project' do
2017-09-10 17:25:29 +05:30
expect { post api("/projects/user/#{user.id}", admin) }
.not_to change { Project.count }
2014-09-02 18:07:02 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(400)
2017-08-17 22:00:37 +05:30
expect(json_response['error']).to eq('name is missing')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'assigns attributes to project' do
2014-09-02 18:07:02 +05:30
project = attributes_for(:project, {
issues_enabled: false,
merge_requests_enabled: false,
2016-09-29 09:46:39 +05:30
wiki_enabled: false,
request_access_enabled: true
2014-09-02 18:07:02 +05:30
})
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
2016-08-24 12:49:21 +05:30
project.each_pair do |k, v|
2016-11-03 12:29:30 +05:30
next if %i[has_external_issue_tracker path].include?(k)
2015-04-26 12:48:37 +05:30
expect(json_response[k.to_s]).to eq(v)
2014-09-02 18:07:02 +05:30
end
end
2016-09-13 17:45:13 +05:30
it 'sets a project as public' do
2017-08-17 22:00:37 +05:30
project = attributes_for(:project, visibility: 'public')
2014-09-02 18:07:02 +05:30
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
expect(json_response['visibility']).to eq('public')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'sets a project as internal' do
2017-08-17 22:00:37 +05:30
project = attributes_for(:project, visibility: 'internal')
2014-09-02 18:07:02 +05:30
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
expect(json_response['visibility']).to eq('internal')
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as private' do
project = attributes_for(:project, visibility: 'private')
2014-09-02 18:07:02 +05:30
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(json_response['visibility']).to eq('private')
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge even if build fails' do
project = attributes_for(:project, { only_allow_merge_if_pipeline_succeeds: false })
2014-09-02 18:07:02 +05:30
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_pipeline_succeeds']).to be_falsey
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge only if merge_when_pipeline_succeeds' do
project = attributes_for(:project, { only_allow_merge_if_pipeline_succeeds: true })
2014-09-02 18:07:02 +05:30
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_pipeline_succeeds']).to be_truthy
2014-09-02 18:07:02 +05:30
end
2016-09-29 09:46:39 +05:30
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge even if discussions are unresolved' do
project = attributes_for(:project, { only_allow_merge_if_all_discussions_are_resolved: false })
2016-09-29 09:46:39 +05:30
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_all_discussions_are_resolved']).to be_falsey
2016-09-29 09:46:39 +05:30
end
2017-08-17 22:00:37 +05:30
it 'sets a project as allowing merge only if all discussions are resolved' do
project = attributes_for(:project, { only_allow_merge_if_all_discussions_are_resolved: true })
2016-09-29 09:46:39 +05:30
post api("/projects/user/#{user.id}", admin), project
2017-08-17 22:00:37 +05:30
expect(json_response['only_allow_merge_if_all_discussions_are_resolved']).to be_truthy
2016-09-29 09:46:39 +05:30
end
2014-09-02 18:07:02 +05:30
end
describe "POST /projects/:id/uploads" do
2017-09-10 17:25:29 +05:30
before do
project
end
it "uploads the file and returns its info" do
post api("/projects/#{project.id}/uploads", user), file: fixture_file_upload(Rails.root + "spec/fixtures/dk.png", "image/png")
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
expect(json_response['alt']).to eq("dk")
expect(json_response['url']).to start_with("/uploads/")
expect(json_response['url']).to end_with("/dk.png")
end
end
2015-04-26 12:48:37 +05:30
describe 'GET /projects/:id' do
2017-08-17 22:00:37 +05:30
context 'when unauthenticated' do
it 'returns the public projects' do
2017-09-10 17:25:29 +05:30
public_project = create(:project, :public)
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
get api("/projects/#{public_project.id}")
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(json_response['id']).to eq(public_project.id)
expect(json_response['description']).to eq(public_project.description)
2017-09-10 17:25:29 +05:30
expect(json_response['default_branch']).to eq(public_project.default_branch)
2017-08-17 22:00:37 +05:30
expect(json_response.keys).not_to include('permissions')
end
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
context 'when authenticated' do
before do
project
project_member
end
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
it 'returns a project by id' do
group = create(:group)
link = create(:project_group_link, project: project, group: group)
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
get api("/projects/#{project.id}", user)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(json_response['id']).to eq(project.id)
expect(json_response['description']).to eq(project.description)
expect(json_response['default_branch']).to eq(project.default_branch)
expect(json_response['tag_list']).to be_an Array
expect(json_response['archived']).to be_falsey
expect(json_response['visibility']).to be_present
expect(json_response['ssh_url_to_repo']).to be_present
expect(json_response['http_url_to_repo']).to be_present
expect(json_response['web_url']).to be_present
expect(json_response['owner']).to be_a Hash
expect(json_response['owner']).to be_a Hash
expect(json_response['name']).to eq(project.name)
expect(json_response['path']).to be_present
expect(json_response['issues_enabled']).to be_present
expect(json_response['merge_requests_enabled']).to be_present
expect(json_response['wiki_enabled']).to be_present
expect(json_response['jobs_enabled']).to be_present
expect(json_response['snippets_enabled']).to be_present
expect(json_response['container_registry_enabled']).to be_present
expect(json_response['created_at']).to be_present
expect(json_response['last_activity_at']).to be_present
expect(json_response['shared_runners_enabled']).to be_present
expect(json_response['creator_id']).to be_present
expect(json_response['namespace']).to be_present
2017-09-10 17:25:29 +05:30
expect(json_response['import_status']).to be_present
expect(json_response).to include("import_error")
2017-08-17 22:00:37 +05:30
expect(json_response['avatar_url']).to be_nil
expect(json_response['star_count']).to be_present
expect(json_response['forks_count']).to be_present
expect(json_response['public_jobs']).to be_present
2017-09-10 17:25:29 +05:30
expect(json_response['ci_config_path']).to be_nil
2017-08-17 22:00:37 +05:30
expect(json_response['shared_with_groups']).to be_an Array
expect(json_response['shared_with_groups'].length).to eq(1)
expect(json_response['shared_with_groups'][0]['group_id']).to eq(group.id)
expect(json_response['shared_with_groups'][0]['group_name']).to eq(group.name)
expect(json_response['shared_with_groups'][0]['group_access_level']).to eq(link.group_access)
expect(json_response['only_allow_merge_if_pipeline_succeeds']).to eq(project.only_allow_merge_if_pipeline_succeeds)
expect(json_response['only_allow_merge_if_all_discussions_are_resolved']).to eq(project.only_allow_merge_if_all_discussions_are_resolved)
end
it 'returns a project by path name' do
get api("/projects/#{project.id}", user)
expect(response).to have_http_status(200)
expect(json_response['name']).to eq(project.name)
end
2017-08-17 22:00:37 +05:30
it 'returns a 404 error if not found' do
get api('/projects/42', user)
expect(response).to have_http_status(404)
expect(json_response['message']).to eq('404 Project Not Found')
end
2016-06-22 15:30:34 +05:30
2017-08-17 22:00:37 +05:30
it 'returns a 404 error if user is not a member' do
other_user = create(:user)
get api("/projects/#{project.id}", other_user)
expect(response).to have_http_status(404)
end
2017-08-17 22:00:37 +05:30
it 'handles users with dots' do
dot_user = create(:user, username: 'dot.user')
2017-09-10 17:25:29 +05:30
project = create(:project, creator_id: dot_user.id, namespace: dot_user.namespace)
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
get api("/projects/#{CGI.escape(project.full_path)}", dot_user)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(json_response['name']).to eq(project.name)
end
2017-08-17 22:00:37 +05:30
it 'exposes namespace fields' do
get api("/projects/#{project.id}", user)
2015-04-26 12:48:37 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(json_response['namespace']).to eq({
'id' => user.namespace.id,
'name' => user.namespace.name,
'path' => user.namespace.path,
'kind' => user.namespace.kind,
'full_path' => user.namespace.full_path,
2017-09-10 17:25:29 +05:30
'parent_id' => nil
2017-08-17 22:00:37 +05:30
})
end
it "does not include statistics by default" do
get api("/projects/#{project.id}", user)
expect(response).to have_http_status(200)
expect(json_response).not_to include 'statistics'
end
it "includes statistics if requested" do
get api("/projects/#{project.id}", user), statistics: true
expect(response).to have_http_status(200)
expect(json_response).to include 'statistics'
end
2017-09-10 17:25:29 +05:30
it "includes import_error if user can admin project" do
get api("/projects/#{project.id}", user)
expect(response).to have_http_status(200)
expect(json_response).to include("import_error")
end
it "does not include import_error if user cannot admin project" do
get api("/projects/#{project.id}", user3)
expect(response).to have_http_status(200)
expect(json_response).not_to include("import_error")
end
context 'links exposure' do
it 'exposes related resources full URIs' do
get api("/projects/#{project.id}", user)
links = json_response['_links']
expect(links['self']).to end_with("/api/v4/projects/#{project.id}")
expect(links['issues']).to end_with("/api/v4/projects/#{project.id}/issues")
expect(links['merge_requests']).to end_with("/api/v4/projects/#{project.id}/merge_requests")
expect(links['repo_branches']).to end_with("/api/v4/projects/#{project.id}/repository/branches")
expect(links['labels']).to end_with("/api/v4/projects/#{project.id}/labels")
expect(links['events']).to end_with("/api/v4/projects/#{project.id}/events")
expect(links['members']).to end_with("/api/v4/projects/#{project.id}/members")
end
it 'filters related URIs when their feature is not enabled' do
project = create(:project, :public,
:merge_requests_disabled,
:issues_disabled,
creator_id: user.id,
namespace: user.namespace)
get api("/projects/#{project.id}", user)
links = json_response['_links']
expect(links.has_key?('merge_requests')).to be_falsy
expect(links.has_key?('issues')).to be_falsy
expect(links['self']).to end_with("/api/v4/projects/#{project.id}")
end
end
2017-08-17 22:00:37 +05:30
describe 'permissions' do
context 'all projects' do
2017-09-10 17:25:29 +05:30
before do
project.team << [user, :master]
end
2017-08-17 22:00:37 +05:30
it 'contains permission information' do
get api("/projects", user)
expect(response).to have_http_status(200)
2017-09-10 17:25:29 +05:30
expect(json_response.first['permissions']['project_access']['access_level'])
.to eq(Gitlab::Access::MASTER)
2017-08-17 22:00:37 +05:30
expect(json_response.first['permissions']['group_access']).to be_nil
end
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
context 'personal project' do
it 'sets project access and returns 200' do
project.team << [user, :master]
get api("/projects/#{project.id}", user)
2016-06-22 15:30:34 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
2017-09-10 17:25:29 +05:30
expect(json_response['permissions']['project_access']['access_level'])
.to eq(Gitlab::Access::MASTER)
2017-08-17 22:00:37 +05:30
expect(json_response['permissions']['group_access']).to be_nil
end
end
2016-06-22 15:30:34 +05:30
2017-08-17 22:00:37 +05:30
context 'group project' do
2017-09-10 17:25:29 +05:30
let(:project2) { create(:project, group: create(:group)) }
2014-09-02 18:07:02 +05:30
2017-09-10 17:25:29 +05:30
before do
project2.group.add_owner(user)
end
2017-08-17 22:00:37 +05:30
it 'sets the owner and return 200' do
get api("/projects/#{project2.id}", user)
expect(response).to have_http_status(200)
expect(json_response['permissions']['project_access']).to be_nil
2017-09-10 17:25:29 +05:30
expect(json_response['permissions']['group_access']['access_level'])
.to eq(Gitlab::Access::OWNER)
2017-08-17 22:00:37 +05:30
end
2015-04-26 12:48:37 +05:30
end
2014-09-02 18:07:02 +05:30
end
end
end
2017-08-17 22:00:37 +05:30
describe 'GET /projects/:id/users' do
shared_examples_for 'project users response' do
it 'returns the project users' do
get api("/projects/#{project.id}/users", current_user)
2016-11-03 12:29:30 +05:30
2017-09-10 17:25:29 +05:30
user = project.namespace.owner
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.size).to eq(1)
first_user = json_response.first
2017-09-10 17:25:29 +05:30
expect(first_user['username']).to eq(user.username)
expect(first_user['name']).to eq(user.name)
2017-08-17 22:00:37 +05:30
expect(first_user.keys).to contain_exactly(*%w[name username id state avatar_url web_url])
end
end
context 'when unauthenticated' do
it_behaves_like 'project users response' do
2017-09-10 17:25:29 +05:30
let(:project) { create(:project, :public) }
2017-08-17 22:00:37 +05:30
let(:current_user) { nil }
end
end
context 'when authenticated' do
context 'valid request' do
it_behaves_like 'project users response' do
let(:current_user) { user }
end
end
it 'returns a 404 error if not found' do
get api('/projects/42/users', user)
expect(response).to have_http_status(404)
expect(json_response['message']).to eq('404 Project Not Found')
end
it 'returns a 404 error if user is not a member' do
other_user = create(:user)
get api("/projects/#{project.id}/users", other_user)
expect(response).to have_http_status(404)
end
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
describe 'GET /projects/:id/snippets' do
2017-09-10 17:25:29 +05:30
before do
snippet
end
2014-09-02 18:07:02 +05:30
2016-09-13 17:45:13 +05:30
it 'returns an array of project snippets' do
2014-09-02 18:07:02 +05:30
get api("/projects/#{project.id}/snippets", user)
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
expect(response).to include_pagination_headers
2015-04-26 12:48:37 +05:30
expect(json_response).to be_an Array
expect(json_response.first['title']).to eq(snippet.title)
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
describe 'GET /projects/:id/snippets/:snippet_id' do
2016-09-13 17:45:13 +05:30
it 'returns a project snippet' do
2014-09-02 18:07:02 +05:30
get api("/projects/#{project.id}/snippets/#{snippet.id}", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2015-04-26 12:48:37 +05:30
expect(json_response['title']).to eq(snippet.title)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'returns a 404 error if snippet id not found' do
2014-09-02 18:07:02 +05:30
get api("/projects/#{project.id}/snippets/1234", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
describe 'POST /projects/:id/snippets' do
2016-09-13 17:45:13 +05:30
it 'creates a new project snippet' do
2014-09-02 18:07:02 +05:30
post api("/projects/#{project.id}/snippets", user),
2017-08-17 22:00:37 +05:30
title: 'api test', file_name: 'sample.rb', code: 'test', visibility: 'private'
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2015-04-26 12:48:37 +05:30
expect(json_response['title']).to eq('api test')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'returns a 400 error if invalid snippet is given' do
2015-04-26 12:48:37 +05:30
post api("/projects/#{project.id}/snippets", user)
expect(status).to eq(400)
2014-09-02 18:07:02 +05:30
end
end
2015-12-23 02:04:40 +05:30
describe 'PUT /projects/:id/snippets/:snippet_id' do
2016-09-13 17:45:13 +05:30
it 'updates an existing project snippet' do
2014-09-02 18:07:02 +05:30
put api("/projects/#{project.id}/snippets/#{snippet.id}", user),
code: 'updated code'
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2015-04-26 12:48:37 +05:30
expect(json_response['title']).to eq('example')
expect(snippet.reload.content).to eq('updated code')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'updates an existing project snippet with new title' do
2014-09-02 18:07:02 +05:30
put api("/projects/#{project.id}/snippets/#{snippet.id}", user),
title: 'other api test'
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2015-04-26 12:48:37 +05:30
expect(json_response['title']).to eq('other api test')
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
describe 'DELETE /projects/:id/snippets/:snippet_id' do
2017-09-10 17:25:29 +05:30
before do
snippet
end
2014-09-02 18:07:02 +05:30
2016-09-13 17:45:13 +05:30
it 'deletes existing project snippet' do
2015-09-11 14:41:01 +05:30
expect do
2014-09-02 18:07:02 +05:30
delete api("/projects/#{project.id}/snippets/#{snippet.id}", user)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(204)
2015-09-11 14:41:01 +05:30
end.to change { Snippet.count }.by(-1)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'returns 404 when deleting unknown snippet id' do
2014-09-02 18:07:02 +05:30
delete api("/projects/#{project.id}/snippets/1234", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
describe 'GET /projects/:id/snippets/:snippet_id/raw' do
2016-09-13 17:45:13 +05:30
it 'gets a raw project snippet' do
2014-09-02 18:07:02 +05:30
get api("/projects/#{project.id}/snippets/#{snippet.id}/raw", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'returns a 404 error if raw project snippet not found' do
2014-09-02 18:07:02 +05:30
get api("/projects/#{project.id}/snippets/5555/raw", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
end
2017-08-17 22:00:37 +05:30
describe 'fork management' do
2017-09-10 17:25:29 +05:30
let(:project_fork_target) { create(:project) }
let(:project_fork_source) { create(:project, :public) }
2014-09-02 18:07:02 +05:30
2015-04-26 12:48:37 +05:30
describe 'POST /projects/:id/fork/:forked_from_id' do
2017-09-10 17:25:29 +05:30
let(:new_project_fork_source) { create(:project, :public) }
2014-09-02 18:07:02 +05:30
2016-09-13 17:45:13 +05:30
it "is not available for non admin users" do
2014-09-02 18:07:02 +05:30
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'allows project to be forked from an existing project' do
2015-04-26 12:48:37 +05:30
expect(project_fork_target.forked?).not_to be_truthy
2014-09-02 18:07:02 +05:30
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", admin)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2014-09-02 18:07:02 +05:30
project_fork_target.reload
2015-04-26 12:48:37 +05:30
expect(project_fork_target.forked_from_project.id).to eq(project_fork_source.id)
expect(project_fork_target.forked_project_link).not_to be_nil
expect(project_fork_target.forked?).to be_truthy
2014-09-02 18:07:02 +05:30
end
2017-09-10 17:25:29 +05:30
it 'refreshes the forks count cachce' do
expect(project_fork_source.forks_count).to be_zero
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", admin)
expect(project_fork_source.forks_count).to eq(1)
end
2016-09-13 17:45:13 +05:30
it 'fails if forked_from project which does not exist' do
2014-09-02 18:07:02 +05:30
post api("/projects/#{project_fork_target.id}/fork/9999", admin)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'fails with 409 if already forked' do
2014-09-02 18:07:02 +05:30
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", admin)
project_fork_target.reload
2015-04-26 12:48:37 +05:30
expect(project_fork_target.forked_from_project.id).to eq(project_fork_source.id)
2014-09-02 18:07:02 +05:30
post api("/projects/#{project_fork_target.id}/fork/#{new_project_fork_source.id}", admin)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(409)
2014-09-02 18:07:02 +05:30
project_fork_target.reload
2015-04-26 12:48:37 +05:30
expect(project_fork_target.forked_from_project.id).to eq(project_fork_source.id)
expect(project_fork_target.forked?).to be_truthy
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
describe 'DELETE /projects/:id/fork' do
2016-09-13 17:45:13 +05:30
it "is not visible to users outside group" do
2014-09-02 18:07:02 +05:30
delete api("/projects/#{project_fork_target.id}/fork", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
2015-11-26 14:37:03 +05:30
context 'when users belong to project group' do
2017-09-10 17:25:29 +05:30
let(:project_fork_target) { create(:project, group: create(:group)) }
2014-09-02 18:07:02 +05:30
2015-11-26 14:37:03 +05:30
before do
project_fork_target.group.add_owner user
project_fork_target.group.add_developer user2
end
2016-09-13 17:45:13 +05:30
it 'is forbidden to non-owner users' do
2015-11-26 14:37:03 +05:30
delete api("/projects/#{project_fork_target.id}/fork", user2)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2015-11-26 14:37:03 +05:30
end
2016-09-13 17:45:13 +05:30
it 'makes forked project unforked' do
2015-11-26 14:37:03 +05:30
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", admin)
project_fork_target.reload
expect(project_fork_target.forked_from_project).not_to be_nil
expect(project_fork_target.forked?).to be_truthy
2017-08-17 22:00:37 +05:30
2015-11-26 14:37:03 +05:30
delete api("/projects/#{project_fork_target.id}/fork", admin)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(204)
2015-11-26 14:37:03 +05:30
project_fork_target.reload
expect(project_fork_target.forked_from_project).to be_nil
expect(project_fork_target.forked?).not_to be_truthy
end
2016-09-13 17:45:13 +05:30
it 'is idempotent if not forked' do
2015-11-26 14:37:03 +05:30
expect(project_fork_target.forked_from_project).to be_nil
delete api("/projects/#{project_fork_target.id}/fork", admin)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(304)
2015-11-26 14:37:03 +05:30
expect(project_fork_target.reload.forked_from_project).to be_nil
end
2014-09-02 18:07:02 +05:30
end
end
end
2016-06-02 11:05:42 +05:30
describe "POST /projects/:id/share" do
let(:group) { create(:group) }
2016-09-13 17:45:13 +05:30
it "shares project with group" do
2016-11-03 12:29:30 +05:30
expires_at = 10.days.from_now.to_date
2016-06-02 11:05:42 +05:30
expect do
2016-11-03 12:29:30 +05:30
post api("/projects/#{project.id}/share", user), group_id: group.id, group_access: Gitlab::Access::DEVELOPER, expires_at: expires_at
2016-06-02 11:05:42 +05:30
end.to change { ProjectGroupLink.count }.by(1)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
2016-11-03 12:29:30 +05:30
expect(json_response['group_id']).to eq(group.id)
expect(json_response['group_access']).to eq(Gitlab::Access::DEVELOPER)
expect(json_response['expires_at']).to eq(expires_at.to_s)
2016-06-02 11:05:42 +05:30
end
2016-09-13 17:45:13 +05:30
it "returns a 400 error when group id is not given" do
2016-06-02 11:05:42 +05:30
post api("/projects/#{project.id}/share", user), group_access: Gitlab::Access::DEVELOPER
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(400)
2016-06-02 11:05:42 +05:30
end
2016-09-13 17:45:13 +05:30
it "returns a 400 error when access level is not given" do
2016-06-02 11:05:42 +05:30
post api("/projects/#{project.id}/share", user), group_id: group.id
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(400)
2016-06-02 11:05:42 +05:30
end
2016-09-13 17:45:13 +05:30
it "returns a 400 error when sharing is disabled" do
2016-06-02 11:05:42 +05:30
project.namespace.update(share_with_group_lock: true)
post api("/projects/#{project.id}/share", user), group_id: group.id, group_access: Gitlab::Access::DEVELOPER
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(400)
2016-06-02 11:05:42 +05:30
end
2016-11-03 12:29:30 +05:30
it 'returns a 404 error when user cannot read group' do
private_group = create(:group, :private)
post api("/projects/#{project.id}/share", user), group_id: private_group.id, group_access: Gitlab::Access::DEVELOPER
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(404)
2016-11-03 12:29:30 +05:30
end
it 'returns a 404 error when group does not exist' do
post api("/projects/#{project.id}/share", user), group_id: 1234, group_access: Gitlab::Access::DEVELOPER
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(404)
2016-11-03 12:29:30 +05:30
end
2017-08-17 22:00:37 +05:30
it "returns a 400 error when wrong params passed" do
2016-06-02 11:05:42 +05:30
post api("/projects/#{project.id}/share", user), group_id: group.id, group_access: 1234
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(400)
expect(json_response['error']).to eq 'group_access does not have a valid value'
2016-06-02 11:05:42 +05:30
end
end
2017-08-17 22:00:37 +05:30
describe 'DELETE /projects/:id/share/:group_id' do
it 'returns 204 when deleting a group share' do
group = create(:group, :public)
create(:project_group_link, group: group, project: project)
2014-09-02 18:07:02 +05:30
2017-08-17 22:00:37 +05:30
delete api("/projects/#{project.id}/share/#{group.id}", user)
expect(response).to have_http_status(204)
expect(project.project_group_links).to be_empty
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'returns a 400 when group id is not an integer' do
delete api("/projects/#{project.id}/share/foo", user)
expect(response).to have_http_status(400)
2014-09-02 18:07:02 +05:30
end
2017-08-17 22:00:37 +05:30
it 'returns a 404 error when group link does not exist' do
delete api("/projects/#{project.id}/share/1234", user)
expect(response).to have_http_status(404)
end
it 'returns a 404 error when project does not exist' do
delete api("/projects/123/share/1234", user)
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
end
2017-08-17 22:00:37 +05:30
describe 'PUT /projects/:id' do
2017-09-10 17:25:29 +05:30
before do
expect(project).to be_persisted
expect(user).to be_persisted
expect(user3).to be_persisted
expect(user4).to be_persisted
expect(project3).to be_persisted
expect(project4).to be_persisted
expect(project_member2).to be_persisted
expect(project_member).to be_persisted
end
2015-04-26 12:48:37 +05:30
2017-08-17 22:00:37 +05:30
it 'returns 400 when nothing sent' do
project_param = {}
put api("/projects/#{project.id}", user), project_param
expect(response).to have_http_status(400)
expect(json_response['error']).to match('at least one parameter must be provided')
end
2015-04-26 12:48:37 +05:30
context 'when unauthenticated' do
2016-09-13 17:45:13 +05:30
it 'returns authentication error' do
2015-04-26 12:48:37 +05:30
project_param = { name: 'bar' }
2017-08-17 22:00:37 +05:30
2015-04-26 12:48:37 +05:30
put api("/projects/#{project.id}"), project_param
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(401)
2015-04-26 12:48:37 +05:30
end
end
context 'when authenticated as project owner' do
2016-09-13 17:45:13 +05:30
it 'updates name' do
2015-04-26 12:48:37 +05:30
project_param = { name: 'bar' }
2017-08-17 22:00:37 +05:30
2015-04-26 12:48:37 +05:30
put api("/projects/#{project.id}", user), project_param
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
2015-04-26 12:48:37 +05:30
project_param.each_pair do |k, v|
expect(json_response[k.to_s]).to eq(v)
end
end
2016-09-13 17:45:13 +05:30
it 'updates visibility_level' do
2017-08-17 22:00:37 +05:30
project_param = { visibility: 'public' }
2015-04-26 12:48:37 +05:30
put api("/projects/#{project3.id}", user), project_param
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
2015-04-26 12:48:37 +05:30
project_param.each_pair do |k, v|
expect(json_response[k.to_s]).to eq(v)
end
end
2016-09-13 17:45:13 +05:30
it 'updates visibility_level from public to private' do
2015-12-23 02:04:40 +05:30
project3.update_attributes({ visibility_level: Gitlab::VisibilityLevel::PUBLIC })
2017-08-17 22:00:37 +05:30
project_param = { visibility: 'private' }
2015-12-23 02:04:40 +05:30
put api("/projects/#{project3.id}", user), project_param
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
2015-12-23 02:04:40 +05:30
project_param.each_pair do |k, v|
expect(json_response[k.to_s]).to eq(v)
end
2017-08-17 22:00:37 +05:30
expect(json_response['visibility']).to eq('private')
2015-12-23 02:04:40 +05:30
end
2016-09-13 17:45:13 +05:30
it 'does not update name to existing name' do
2015-04-26 12:48:37 +05:30
project_param = { name: project3.name }
2017-08-17 22:00:37 +05:30
2015-04-26 12:48:37 +05:30
put api("/projects/#{project.id}", user), project_param
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(400)
2015-04-26 12:48:37 +05:30
expect(json_response['message']['name']).to eq(['has already been taken'])
end
2016-09-29 09:46:39 +05:30
it 'updates request_access_enabled' do
project_param = { request_access_enabled: false }
put api("/projects/#{project.id}", user), project_param
expect(response).to have_http_status(200)
expect(json_response['request_access_enabled']).to eq(false)
end
2016-09-13 17:45:13 +05:30
it 'updates path & name to existing path & name in different namespace' do
2015-04-26 12:48:37 +05:30
project_param = { path: project4.path, name: project4.name }
2017-08-17 22:00:37 +05:30
2015-04-26 12:48:37 +05:30
put api("/projects/#{project3.id}", user), project_param
2017-08-17 22:00:37 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2017-08-17 22:00:37 +05:30
project_param.each_pair do |k, v|
expect(json_response[k.to_s]).to eq(v)
end
end
it 'updates jobs_enabled' do
project_param = { jobs_enabled: true }
put api("/projects/#{project3.id}", user), project_param
expect(response).to have_http_status(200)
2015-04-26 12:48:37 +05:30
project_param.each_pair do |k, v|
expect(json_response[k.to_s]).to eq(v)
end
end
end
context 'when authenticated as project master' do
2016-09-13 17:45:13 +05:30
it 'updates path' do
2015-04-26 12:48:37 +05:30
project_param = { path: 'bar' }
put api("/projects/#{project3.id}", user4), project_param
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2015-04-26 12:48:37 +05:30
project_param.each_pair do |k, v|
expect(json_response[k.to_s]).to eq(v)
end
end
2016-09-13 17:45:13 +05:30
it 'updates other attributes' do
2015-04-26 12:48:37 +05:30
project_param = { issues_enabled: true,
wiki_enabled: true,
snippets_enabled: true,
merge_requests_enabled: true,
description: 'new description' }
put api("/projects/#{project3.id}", user4), project_param
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(200)
2015-04-26 12:48:37 +05:30
project_param.each_pair do |k, v|
expect(json_response[k.to_s]).to eq(v)
end
end
2016-09-13 17:45:13 +05:30
it 'does not update path to existing path' do
2015-04-26 12:48:37 +05:30
project_param = { path: project.path }
put api("/projects/#{project3.id}", user4), project_param
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(400)
2015-04-26 12:48:37 +05:30
expect(json_response['message']['path']).to eq(['has already been taken'])
end
2016-09-13 17:45:13 +05:30
it 'does not update name' do
2015-04-26 12:48:37 +05:30
project_param = { name: 'bar' }
put api("/projects/#{project3.id}", user4), project_param
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2015-04-26 12:48:37 +05:30
end
2016-09-13 17:45:13 +05:30
it 'does not update visibility_level' do
2017-08-17 22:00:37 +05:30
project_param = { visibility: 'public' }
2015-04-26 12:48:37 +05:30
put api("/projects/#{project3.id}", user4), project_param
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2015-04-26 12:48:37 +05:30
end
end
context 'when authenticated as project developer' do
2016-09-13 17:45:13 +05:30
it 'does not update other attributes' do
2015-04-26 12:48:37 +05:30
project_param = { path: 'bar',
issues_enabled: true,
wiki_enabled: true,
snippets_enabled: true,
merge_requests_enabled: true,
2016-09-29 09:46:39 +05:30
description: 'new description',
request_access_enabled: true }
2015-04-26 12:48:37 +05:30
put api("/projects/#{project.id}", user3), project_param
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2015-04-26 12:48:37 +05:30
end
end
end
2016-06-02 11:05:42 +05:30
describe 'POST /projects/:id/archive' do
context 'on an unarchived project' do
it 'archives the project' do
post api("/projects/#{project.id}/archive", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2016-06-02 11:05:42 +05:30
expect(json_response['archived']).to be_truthy
end
end
context 'on an archived project' do
before do
project.archive!
end
it 'remains archived' do
post api("/projects/#{project.id}/archive", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2016-06-02 11:05:42 +05:30
expect(json_response['archived']).to be_truthy
end
end
context 'user without archiving rights to the project' do
before do
project.team << [user3, :developer]
end
it 'rejects the action' do
post api("/projects/#{project.id}/archive", user3)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2016-06-02 11:05:42 +05:30
end
end
end
describe 'POST /projects/:id/unarchive' do
context 'on an unarchived project' do
it 'remains unarchived' do
post api("/projects/#{project.id}/unarchive", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2016-06-02 11:05:42 +05:30
expect(json_response['archived']).to be_falsey
end
end
context 'on an archived project' do
before do
project.archive!
end
it 'unarchives the project' do
post api("/projects/#{project.id}/unarchive", user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2016-06-02 11:05:42 +05:30
expect(json_response['archived']).to be_falsey
end
end
context 'user without archiving rights to the project' do
before do
project.team << [user3, :developer]
end
it 'rejects the action' do
post api("/projects/#{project.id}/unarchive", user3)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2016-06-02 11:05:42 +05:30
end
end
end
describe 'POST /projects/:id/star' do
context 'on an unstarred project' do
it 'stars the project' do
expect { post api("/projects/#{project.id}/star", user) }.to change { project.reload.star_count }.by(1)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(201)
2016-06-02 11:05:42 +05:30
expect(json_response['star_count']).to eq(1)
end
end
context 'on a starred project' do
before do
user.toggle_star(project)
project.reload
end
it 'does not modify the star count' do
expect { post api("/projects/#{project.id}/star", user) }.not_to change { project.reload.star_count }
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(304)
2016-06-02 11:05:42 +05:30
end
end
end
2017-08-17 22:00:37 +05:30
describe 'POST /projects/:id/unstar' do
2016-06-02 11:05:42 +05:30
context 'on a starred project' do
before do
user.toggle_star(project)
project.reload
end
it 'unstars the project' do
2017-08-17 22:00:37 +05:30
expect { post api("/projects/#{project.id}/unstar", user) }.to change { project.reload.star_count }.by(-1)
2016-06-02 11:05:42 +05:30
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(201)
2016-06-02 11:05:42 +05:30
expect(json_response['star_count']).to eq(0)
end
end
context 'on an unstarred project' do
it 'does not modify the star count' do
2017-08-17 22:00:37 +05:30
expect { post api("/projects/#{project.id}/unstar", user) }.not_to change { project.reload.star_count }
2016-06-02 11:05:42 +05:30
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(304)
2016-06-02 11:05:42 +05:30
end
end
end
2015-04-26 12:48:37 +05:30
describe 'DELETE /projects/:id' do
context 'when authenticated as user' do
2016-09-13 17:45:13 +05:30
it 'removes project' do
2014-09-02 18:07:02 +05:30
delete api("/projects/#{project.id}", user)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(202)
expect(json_response['message']).to eql('202 Accepted')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'does not remove a project if not an owner' do
2014-09-02 18:07:02 +05:30
user3 = create(:user)
project.team << [user3, :developer]
delete api("/projects/#{project.id}", user3)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(403)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'does not remove a non existing project' do
2015-04-26 12:48:37 +05:30
delete api('/projects/1328', user)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'does not remove a project not attached to user' do
2014-09-02 18:07:02 +05:30
delete api("/projects/#{project.id}", user2)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
end
2015-04-26 12:48:37 +05:30
context 'when authenticated as admin' do
2016-09-13 17:45:13 +05:30
it 'removes any existing project' do
2014-09-02 18:07:02 +05:30
delete api("/projects/#{project.id}", admin)
2017-08-17 22:00:37 +05:30
expect(response).to have_http_status(202)
expect(json_response['message']).to eql('202 Accepted')
2014-09-02 18:07:02 +05:30
end
2016-09-13 17:45:13 +05:30
it 'does not remove a non existing project' do
2015-04-26 12:48:37 +05:30
delete api('/projects/1328', admin)
2016-08-24 12:49:21 +05:30
expect(response).to have_http_status(404)
2014-09-02 18:07:02 +05:30
end
end
end
2017-08-17 22:00:37 +05:30
describe 'POST /projects/:id/fork' do
let(:project) do
create(:project, :repository, creator: user, namespace: user.namespace)
end
let(:group) { create(:group) }
let(:group2) do
group = create(:group, name: 'group2_name')
group.add_owner(user2)
group
end
before do
project.add_reporter(user2)
end
context 'when authenticated' do
it 'forks if user has sufficient access to project' do
post api("/projects/#{project.id}/fork", user2)
expect(response).to have_http_status(201)
expect(json_response['name']).to eq(project.name)
expect(json_response['path']).to eq(project.path)
expect(json_response['owner']['id']).to eq(user2.id)
expect(json_response['namespace']['id']).to eq(user2.namespace.id)
expect(json_response['forked_from_project']['id']).to eq(project.id)
2017-09-10 17:25:29 +05:30
expect(json_response['import_status']).to eq('scheduled')
expect(json_response).to include("import_error")
2017-08-17 22:00:37 +05:30
end
it 'forks if user is admin' do
post api("/projects/#{project.id}/fork", admin)
expect(response).to have_http_status(201)
expect(json_response['name']).to eq(project.name)
expect(json_response['path']).to eq(project.path)
expect(json_response['owner']['id']).to eq(admin.id)
expect(json_response['namespace']['id']).to eq(admin.namespace.id)
expect(json_response['forked_from_project']['id']).to eq(project.id)
2017-09-10 17:25:29 +05:30
expect(json_response['import_status']).to eq('scheduled')
expect(json_response).to include("import_error")
2017-08-17 22:00:37 +05:30
end
it 'fails on missing project access for the project to fork' do
new_user = create(:user)
post api("/projects/#{project.id}/fork", new_user)
expect(response).to have_http_status(404)
expect(json_response['message']).to eq('404 Project Not Found')
end
it 'fails if forked project exists in the user namespace' do
post api("/projects/#{project.id}/fork", user)
expect(response).to have_http_status(409)
expect(json_response['message']['name']).to eq(['has already been taken'])
expect(json_response['message']['path']).to eq(['has already been taken'])
end
it 'fails if project to fork from does not exist' do
post api('/projects/424242/fork', user)
expect(response).to have_http_status(404)
expect(json_response['message']).to eq('404 Project Not Found')
end
it 'forks with explicit own user namespace id' do
post api("/projects/#{project.id}/fork", user2), namespace: user2.namespace.id
expect(response).to have_http_status(201)
expect(json_response['owner']['id']).to eq(user2.id)
end
it 'forks with explicit own user name as namespace' do
post api("/projects/#{project.id}/fork", user2), namespace: user2.username
expect(response).to have_http_status(201)
expect(json_response['owner']['id']).to eq(user2.id)
end
it 'forks to another user when admin' do
post api("/projects/#{project.id}/fork", admin), namespace: user2.username
expect(response).to have_http_status(201)
expect(json_response['owner']['id']).to eq(user2.id)
end
it 'fails if trying to fork to another user when not admin' do
post api("/projects/#{project.id}/fork", user2), namespace: admin.namespace.id
expect(response).to have_http_status(404)
end
it 'fails if trying to fork to non-existent namespace' do
post api("/projects/#{project.id}/fork", user2), namespace: 42424242
expect(response).to have_http_status(404)
expect(json_response['message']).to eq('404 Target Namespace Not Found')
end
it 'forks to owned group' do
post api("/projects/#{project.id}/fork", user2), namespace: group2.name
expect(response).to have_http_status(201)
expect(json_response['namespace']['name']).to eq(group2.name)
end
it 'fails to fork to not owned group' do
post api("/projects/#{project.id}/fork", user2), namespace: group.name
expect(response).to have_http_status(404)
end
it 'forks to not owned group when admin' do
post api("/projects/#{project.id}/fork", admin), namespace: group.name
expect(response).to have_http_status(201)
expect(json_response['namespace']['name']).to eq(group.name)
end
end
context 'when unauthenticated' do
it 'returns authentication error' do
post api("/projects/#{project.id}/fork")
expect(response).to have_http_status(401)
expect(json_response['message']).to eq('401 Unauthorized')
end
end
end
describe 'POST /projects/:id/housekeeping' do
let(:housekeeping) { Projects::HousekeepingService.new(project) }
before do
allow(Projects::HousekeepingService).to receive(:new).with(project).and_return(housekeeping)
end
context 'when authenticated as owner' do
it 'starts the housekeeping process' do
expect(housekeeping).to receive(:execute).once
post api("/projects/#{project.id}/housekeeping", user)
expect(response).to have_http_status(201)
end
context 'when housekeeping lease is taken' do
it 'returns conflict' do
expect(housekeeping).to receive(:execute).once.and_raise(Projects::HousekeepingService::LeaseTaken)
post api("/projects/#{project.id}/housekeeping", user)
expect(response).to have_http_status(409)
expect(json_response['message']).to match(/Somebody already triggered housekeeping for this project/)
end
end
end
context 'when authenticated as developer' do
before do
2017-09-10 17:25:29 +05:30
project_member
2017-08-17 22:00:37 +05:30
end
it 'returns forbidden error' do
post api("/projects/#{project.id}/housekeeping", user3)
expect(response).to have_http_status(403)
end
end
context 'when unauthenticated' do
it 'returns authentication error' do
post api("/projects/#{project.id}/housekeeping")
expect(response).to have_http_status(401)
end
end
end
2014-09-02 18:07:02 +05:30
end