debian-mirror-gitlab/spec/services/import/github_service_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

252 lines
7.9 KiB
Ruby
Raw Normal View History

2020-06-23 00:09:42 +05:30
# frozen_string_literal: true
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Import::GithubService do
2020-06-23 00:09:42 +05:30
let_it_be(:user) { create(:user) }
let_it_be(:token) { 'complex-token' }
let_it_be(:access_params) { { github_access_token: 'github-complex-token' } }
2022-11-25 23:54:43 +05:30
let(:settings) { instance_double(Gitlab::GithubImport::Settings) }
let(:optional_stages) { nil }
let(:params) do
{
repo_id: 123,
new_name: 'new_repo',
target_namespace: 'root',
optional_stages: optional_stages
}
end
2020-06-23 00:09:42 +05:30
2022-01-26 12:08:38 +05:30
subject(:github_importer) { described_class.new(client, user, params) }
2020-06-23 00:09:42 +05:30
before do
allow(subject).to receive(:authorized?).and_return(true)
end
2020-10-24 23:57:45 +05:30
shared_examples 'handles errors' do |klass|
let(:client) { klass.new(token) }
2022-11-25 23:54:43 +05:30
let(:project_double) { instance_double(Project, persisted?: true) }
before do
allow(Gitlab::GithubImport::Settings).to receive(:new).with(project_double).and_return(settings)
allow(settings).to receive(:write).with(optional_stages)
end
2020-06-23 00:09:42 +05:30
2020-10-24 23:57:45 +05:30
context 'do not raise an exception on input error' do
let(:exception) { Octokit::ClientError.new(status: 404, body: 'Not Found') }
before do
expect(client).to receive(:repository).and_raise(exception)
end
2020-06-23 00:09:42 +05:30
2020-10-24 23:57:45 +05:30
it 'logs the original error' do
expect(Gitlab::Import::Logger).to receive(:error).with({
message: 'Import failed due to a GitHub error',
status: 404,
error: 'Not Found'
}).and_call_original
2020-06-23 00:09:42 +05:30
2020-10-24 23:57:45 +05:30
subject.execute(access_params, :github)
end
2022-06-21 17:19:12 +05:30
it 'returns an error with message and code' do
2020-10-24 23:57:45 +05:30
result = subject.execute(access_params, :github)
expect(result).to include(
2022-06-21 17:19:12 +05:30
message: 'Import failed due to a GitHub error: Not Found (HTTP 404)',
2020-10-24 23:57:45 +05:30
status: :error,
http_status: :unprocessable_entity
)
end
2020-06-23 00:09:42 +05:30
end
2020-10-24 23:57:45 +05:30
it 'raises an exception for unknown error causes' do
exception = StandardError.new('Not Implemented')
expect(client).to receive(:repository).and_raise(exception)
2020-06-23 00:09:42 +05:30
2020-10-24 23:57:45 +05:30
expect(Gitlab::Import::Logger).not_to receive(:error)
expect { subject.execute(access_params, :github) }.to raise_error(exception)
2020-06-23 00:09:42 +05:30
end
2021-04-17 20:07:23 +05:30
context 'repository size validation' do
2022-10-11 01:57:18 +05:30
let(:repository_double) { { name: 'repository', size: 99 } }
2021-04-17 20:07:23 +05:30
before do
expect(client).to receive(:repository).and_return(repository_double)
allow_next_instance_of(Gitlab::LegacyGithubImport::ProjectCreator) do |creator|
2022-11-25 23:54:43 +05:30
allow(creator).to receive(:execute).and_return(project_double)
2021-04-17 20:07:23 +05:30
end
end
context 'when there is no repository size limit defined' do
2023-03-04 22:38:38 +05:30
it 'skips the check, succeeds, and tracks an access level' do
2021-04-17 20:07:23 +05:30
expect(subject.execute(access_params, :github)).to include(status: :success)
2022-11-25 23:54:43 +05:30
expect(settings).to have_received(:write).with(nil)
2023-03-04 22:38:38 +05:30
expect_snowplow_event(
category: 'Import::GithubService',
action: 'create',
label: 'import_access_level',
user: user,
extra: { import_type: 'github', user_role: 'Owner' }
)
2021-04-17 20:07:23 +05:30
end
end
context 'when the target namespace repository size limit is defined' do
let_it_be(:group) { create(:group, repository_size_limit: 100) }
before do
params[:target_namespace] = group.full_path
end
it 'succeeds when the repository is smaller than the limit' do
expect(subject.execute(access_params, :github)).to include(status: :success)
2022-11-25 23:54:43 +05:30
expect(settings).to have_received(:write).with(nil)
2023-03-04 22:38:38 +05:30
expect_snowplow_event(
category: 'Import::GithubService',
action: 'create',
label: 'import_access_level',
user: user,
extra: { import_type: 'github', user_role: 'Not a member' }
)
2021-04-17 20:07:23 +05:30
end
it 'returns error when the repository is larger than the limit' do
2022-10-11 01:57:18 +05:30
repository_double[:size] = 101
2021-04-17 20:07:23 +05:30
expect(subject.execute(access_params, :github)).to include(size_limit_error)
end
end
context 'when target namespace repository limit is not defined' do
let_it_be(:group) { create(:group) }
before do
stub_application_setting(repository_size_limit: 100)
end
context 'when application size limit is defined' do
it 'succeeds when the repository is smaller than the limit' do
expect(subject.execute(access_params, :github)).to include(status: :success)
2022-11-25 23:54:43 +05:30
expect(settings).to have_received(:write).with(nil)
2023-03-04 22:38:38 +05:30
expect_snowplow_event(
category: 'Import::GithubService',
action: 'create',
label: 'import_access_level',
user: user,
extra: { import_type: 'github', user_role: 'Owner' }
)
2021-04-17 20:07:23 +05:30
end
it 'returns error when the repository is larger than the limit' do
2022-10-11 01:57:18 +05:30
repository_double[:size] = 101
2021-04-17 20:07:23 +05:30
expect(subject.execute(access_params, :github)).to include(size_limit_error)
end
end
end
2022-11-25 23:54:43 +05:30
context 'when optional stages params present' do
let(:optional_stages) do
{
single_endpoint_issue_events_import: true,
single_endpoint_notes_import: 'false',
attachments_import: false
}
end
it 'saves optional stages choice to import_data' do
subject.execute(access_params, :github)
expect(settings).to have_received(:write).with(optional_stages)
end
end
2021-04-17 20:07:23 +05:30
end
2022-01-26 12:08:38 +05:30
2022-07-16 23:28:13 +05:30
context 'when import source is disabled' do
let(:repository_double) do
2022-10-11 01:57:18 +05:30
{
2022-07-16 23:28:13 +05:30
name: 'vim',
description: 'test',
full_name: 'test/vim',
clone_url: 'http://repo.com/repo/repo.git',
private: false,
has_wiki?: false
2022-10-11 01:57:18 +05:30
}
2022-07-16 23:28:13 +05:30
end
before do
stub_application_setting(import_sources: nil)
allow(client).to receive(:repository).and_return(repository_double)
end
it 'returns forbidden' do
result = subject.execute(access_params, :github)
expect(result).to include(
status: :error,
http_status: :forbidden
)
end
end
2022-01-26 12:08:38 +05:30
context 'when a blocked/local URL is used as github_hostname' do
let(:message) { 'Error while attempting to import from GitHub' }
let(:error) { "Invalid URL: #{url}" }
before do
stub_application_setting(allow_local_requests_from_web_hooks_and_services: false)
end
where(url: %w[https://localhost https://10.0.0.1])
with_them do
it 'returns and logs an error' do
allow(github_importer).to receive(:url).and_return(url)
expect(Gitlab::Import::Logger).to receive(:error).with({
message: message,
error: error
}).and_call_original
expect(github_importer.execute(access_params, :github)).to include(blocked_url_error(url))
end
end
end
2020-06-23 00:09:42 +05:30
end
2020-10-24 23:57:45 +05:30
context 'when remove_legacy_github_client feature flag is enabled' do
before do
stub_feature_flags(remove_legacy_github_client: true)
end
2020-06-23 00:09:42 +05:30
2020-10-24 23:57:45 +05:30
include_examples 'handles errors', Gitlab::GithubImport::Client
end
2020-06-23 00:09:42 +05:30
2022-11-25 23:54:43 +05:30
context 'when remove_legacy_github_client feature flag is disabled' do
2020-10-24 23:57:45 +05:30
before do
stub_feature_flags(remove_legacy_github_client: false)
end
2020-06-23 00:09:42 +05:30
2020-10-24 23:57:45 +05:30
include_examples 'handles errors', Gitlab::LegacyGithubImport::Client
2020-06-23 00:09:42 +05:30
end
2021-04-17 20:07:23 +05:30
def size_limit_error
{
status: :error,
http_status: :unprocessable_entity,
message: '"repository" size (101 Bytes) is larger than the limit of 100 Bytes.'
}
end
2022-01-26 12:08:38 +05:30
def blocked_url_error(url)
{
status: :error,
http_status: :bad_request,
message: "Invalid URL: #{url}"
}
end
2020-06-23 00:09:42 +05:30
end