2019-07-31 22:56:46 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-04-26 12:48:37 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
RSpec.describe Import::GithubController do
|
2015-09-11 14:41:01 +05:30
|
|
|
include ImportSpecHelper
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:provider) { :github }
|
2022-01-12 12:59:36 +05:30
|
|
|
let(:new_import_url) { public_send("new_import_#{provider}_url") }
|
2015-09-25 12:07:36 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
include_context 'a GitHub-ish import controller'
|
2015-04-26 12:48:37 +05:30
|
|
|
|
2016-08-24 12:49:21 +05:30
|
|
|
describe "GET new" do
|
2017-08-17 22:00:37 +05:30
|
|
|
it_behaves_like 'a GitHub-ish import controller: GET new'
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it "redirects to GitHub for an access token if logged in with GitHub" do
|
|
|
|
allow(controller).to receive(:logged_in_with_provider?).and_return(true)
|
2019-02-02 18:00:53 +05:30
|
|
|
expect(controller).to receive(:go_to_provider_for_permissions).and_call_original
|
2020-10-24 23:57:45 +05:30
|
|
|
allow(controller).to receive(:authorize_url).and_call_original
|
2016-08-24 12:49:21 +05:30
|
|
|
|
|
|
|
get :new
|
2019-02-02 18:00:53 +05:30
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:found)
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
2019-02-15 15:39:39 +05:30
|
|
|
|
|
|
|
it "prompts for an access token if GitHub not configured" do
|
|
|
|
allow(controller).to receive(:github_import_configured?).and_return(false)
|
|
|
|
expect(controller).not_to receive(:go_to_provider_for_permissions)
|
|
|
|
|
|
|
|
get :new
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2019-02-15 15:39:39 +05:30
|
|
|
end
|
2019-10-12 21:52:04 +05:30
|
|
|
|
|
|
|
context 'when importing a CI/CD project' do
|
|
|
|
it 'always prompts for an access token' do
|
|
|
|
allow(controller).to receive(:github_import_configured?).and_return(true)
|
|
|
|
|
|
|
|
get :new, params: { ci_cd_only: true }
|
|
|
|
|
|
|
|
expect(response).to render_template(:new)
|
|
|
|
end
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
|
|
|
|
2015-04-26 12:48:37 +05:30
|
|
|
describe "GET callback" do
|
2022-01-12 12:59:36 +05:30
|
|
|
context "when auth state param is missing from session" do
|
|
|
|
it "reports an error" do
|
|
|
|
get :callback
|
2015-04-26 12:48:37 +05:30
|
|
|
|
2022-01-12 12:59:36 +05:30
|
|
|
expect(controller).to redirect_to(new_import_url)
|
|
|
|
expect(flash[:alert]).to eq('Access denied to your GitHub account.')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "when auth state param is present in session" do
|
|
|
|
let(:valid_auth_state) { "secret-state" }
|
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
context 'when remove_legacy_github_client feature is disabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(remove_legacy_github_client: false)
|
|
|
|
allow_next_instance_of(Gitlab::LegacyGithubImport::Client) do |client|
|
|
|
|
allow(client).to receive(:get_token).and_return(token)
|
|
|
|
end
|
|
|
|
session[:github_auth_state_key] = valid_auth_state
|
|
|
|
end
|
|
|
|
|
|
|
|
it "updates access token if state param is valid" do
|
|
|
|
token = "asdasd12345"
|
2015-04-26 12:48:37 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
get :callback, params: { state: valid_auth_state }
|
2022-01-12 12:59:36 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
expect(session[:github_access_token]).to eq(token)
|
|
|
|
expect(controller).to redirect_to(status_import_github_url)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "includes namespace_id from query params if it is present" do
|
|
|
|
namespace_id = 1
|
|
|
|
|
|
|
|
get :callback, params: { state: valid_auth_state, namespace_id: namespace_id }
|
2022-01-12 12:59:36 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
expect(controller).to redirect_to(status_import_github_url(namespace_id: namespace_id))
|
|
|
|
end
|
2022-01-12 12:59:36 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it "reports an error if state param is invalid" do
|
|
|
|
get :callback, params: { state: "different-state" }
|
|
|
|
|
|
|
|
expect(controller).to redirect_to(new_import_url)
|
|
|
|
expect(flash[:alert]).to eq('Access denied to your GitHub account.')
|
|
|
|
end
|
2022-06-21 17:19:12 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
context 'when remove_legacy_github_client feature is enabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(remove_legacy_github_client: true)
|
|
|
|
allow_next_instance_of(OAuth2::Client) do |client|
|
|
|
|
allow(client).to receive_message_chain(:auth_code, :get_token, :token).and_return(token)
|
|
|
|
end
|
|
|
|
session[:github_auth_state_key] = valid_auth_state
|
|
|
|
end
|
|
|
|
|
|
|
|
it "updates access token if state param is valid" do
|
|
|
|
token = "asdasd12345"
|
2022-06-21 17:19:12 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
get :callback, params: { state: valid_auth_state }
|
|
|
|
|
|
|
|
expect(session[:github_access_token]).to eq(token)
|
|
|
|
expect(controller).to redirect_to(status_import_github_url)
|
|
|
|
end
|
2022-06-21 17:19:12 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
it "includes namespace_id from query params if it is present" do
|
|
|
|
namespace_id = 1
|
|
|
|
|
|
|
|
get :callback, params: { state: valid_auth_state, namespace_id: namespace_id }
|
|
|
|
|
|
|
|
expect(controller).to redirect_to(status_import_github_url(namespace_id: namespace_id))
|
|
|
|
end
|
2022-06-21 17:19:12 +05:30
|
|
|
end
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-08-24 12:49:21 +05:30
|
|
|
describe "POST personal_access_token" do
|
2017-08-17 22:00:37 +05:30
|
|
|
it_behaves_like 'a GitHub-ish import controller: POST personal_access_token'
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
|
|
|
|
2015-04-26 12:48:37 +05:30
|
|
|
describe "GET status" do
|
2020-10-24 23:57:45 +05:30
|
|
|
context 'when using OAuth' do
|
|
|
|
before do
|
|
|
|
allow(controller).to receive(:logged_in_with_provider?).and_return(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when OAuth config is missing' do
|
|
|
|
before do
|
|
|
|
allow(controller).to receive(:oauth_config).and_return(nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns missing config error' do
|
|
|
|
expect(controller).to receive(:go_to_provider_for_permissions).and_call_original
|
|
|
|
|
|
|
|
get :status
|
|
|
|
|
|
|
|
expect(session[:"#{provider}_access_token"]).to be_nil
|
|
|
|
expect(controller).to redirect_to(new_import_url)
|
|
|
|
expect(flash[:alert]).to eq('Missing OAuth configuration for GitHub.')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when feature remove_legacy_github_client is disabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(remove_legacy_github_client: false)
|
|
|
|
session[:"#{provider}_access_token"] = 'asdasd12345'
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'a GitHub-ish import controller: GET status'
|
|
|
|
|
|
|
|
it 'uses Gitlab::LegacyGitHubImport::Client' do
|
|
|
|
expect(controller.send(:client)).to be_instance_of(Gitlab::LegacyGithubImport::Client)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'fetches repos using legacy client' do
|
|
|
|
expect_next_instance_of(Gitlab::LegacyGithubImport::Client) do |client|
|
2022-10-11 01:57:18 +05:30
|
|
|
expect(client).to receive(:repos).and_return([])
|
2020-10-24 23:57:45 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
get :status
|
|
|
|
end
|
2022-01-12 12:59:36 +05:30
|
|
|
|
|
|
|
it 'gets authorization url using legacy client' do
|
|
|
|
allow(controller).to receive(:logged_in_with_provider?).and_return(true)
|
|
|
|
expect(controller).to receive(:go_to_provider_for_permissions).and_call_original
|
|
|
|
expect_next_instance_of(Gitlab::LegacyGithubImport::Client) do |client|
|
|
|
|
expect(client).to receive(:authorize_url).and_call_original
|
|
|
|
end
|
|
|
|
|
|
|
|
get :new
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when feature remove_legacy_github_client is enabled' do
|
|
|
|
before do
|
|
|
|
stub_feature_flags(remove_legacy_github_client: true)
|
|
|
|
session[:"#{provider}_access_token"] = 'asdasd12345'
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'a GitHub-ish import controller: GET status'
|
|
|
|
|
|
|
|
it 'uses Gitlab::GithubImport::Client' do
|
|
|
|
expect(controller.send(:client)).to be_instance_of(Gitlab::GithubImport::Client)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'fetches repos using latest github client' do
|
2022-10-11 01:57:18 +05:30
|
|
|
expect_next_instance_of(Gitlab::GithubImport::Client) do |client|
|
|
|
|
expect(client).to receive(:repos).and_return([])
|
2020-10-24 23:57:45 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
get :status
|
|
|
|
end
|
|
|
|
|
2022-01-12 12:59:36 +05:30
|
|
|
it 'gets authorization url using oauth client' do
|
|
|
|
allow(controller).to receive(:logged_in_with_provider?).and_return(true)
|
|
|
|
expect(controller).to receive(:go_to_provider_for_permissions).and_call_original
|
|
|
|
expect_next_instance_of(OAuth2::Client) do |client|
|
|
|
|
expect(client.auth_code).to receive(:authorize_url).and_call_original
|
|
|
|
end
|
|
|
|
|
|
|
|
get :new
|
|
|
|
end
|
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
context 'pagination' do
|
|
|
|
context 'when no page is specified' do
|
|
|
|
it 'requests first page' do
|
2022-10-11 01:57:18 +05:30
|
|
|
expect_next_instance_of(Gitlab::GithubImport::Client) do |client|
|
|
|
|
expect(client).to receive(:repos).with({ page: 1, per_page: 25 }).and_return([])
|
2021-02-22 17:27:13 +05:30
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
get :status
|
|
|
|
end
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
context 'when page is specified' do
|
|
|
|
it 'requests repos with specified page' do
|
|
|
|
expect_next_instance_of(Octokit::Client) do |client|
|
|
|
|
expect(client).to receive(:repos).with(nil, { page: 2, per_page: 25 }).and_return([].to_enum)
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
get :status, params: { page: 2 }
|
|
|
|
end
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
|
|
|
|
context 'when filtering' do
|
|
|
|
let(:filter) { 'test' }
|
|
|
|
let(:user_login) { 'user' }
|
|
|
|
let(:collaborations_subquery) { 'repo:repo1 repo:repo2' }
|
|
|
|
let(:organizations_subquery) { 'org:org1 org:org2' }
|
2021-02-22 17:27:13 +05:30
|
|
|
let(:search_query) { "test in:name is:public,private user:#{user_login} #{collaborations_subquery} #{organizations_subquery}" }
|
2021-01-29 00:20:46 +05:30
|
|
|
|
|
|
|
before do
|
|
|
|
allow_next_instance_of(Octokit::Client) do |client|
|
|
|
|
allow(client).to receive(:user).and_return(double(login: user_login))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'makes request to github search api' do
|
2021-02-22 17:27:13 +05:30
|
|
|
expect_next_instance_of(Octokit::Client) do |client|
|
2022-11-25 23:54:43 +05:30
|
|
|
expect(client).to receive(:user).and_return({ login: user_login })
|
2021-02-22 17:27:13 +05:30
|
|
|
expect(client).to receive(:search_repositories).with(search_query, { page: 1, per_page: 25 }).and_return({ items: [].to_enum })
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
|
|
|
|
expect_next_instance_of(Gitlab::GithubImport::Client) do |client|
|
|
|
|
expect(client).to receive(:collaborations_subquery).and_return(collaborations_subquery)
|
|
|
|
expect(client).to receive(:organizations_subquery).and_return(organizations_subquery)
|
|
|
|
end
|
|
|
|
|
|
|
|
get :status, params: { filter: filter }, format: :json
|
|
|
|
end
|
|
|
|
|
2021-02-22 17:27:13 +05:30
|
|
|
context 'pagination' do
|
|
|
|
context 'when no page is specified' do
|
|
|
|
it 'requests first page' do
|
|
|
|
expect_next_instance_of(Octokit::Client) do |client|
|
2022-11-25 23:54:43 +05:30
|
|
|
expect(client).to receive(:user).and_return({ login: user_login })
|
2021-02-22 17:27:13 +05:30
|
|
|
expect(client).to receive(:search_repositories).with(search_query, { page: 1, per_page: 25 }).and_return({ items: [].to_enum })
|
|
|
|
end
|
|
|
|
|
|
|
|
expect_next_instance_of(Gitlab::GithubImport::Client) do |client|
|
|
|
|
expect(client).to receive(:collaborations_subquery).and_return(collaborations_subquery)
|
|
|
|
expect(client).to receive(:organizations_subquery).and_return(organizations_subquery)
|
|
|
|
end
|
|
|
|
|
|
|
|
get :status, params: { filter: filter }, format: :json
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when page is specified' do
|
|
|
|
it 'requests repos with specified page' do
|
|
|
|
expect_next_instance_of(Octokit::Client) do |client|
|
2022-11-25 23:54:43 +05:30
|
|
|
expect(client).to receive(:user).and_return({ login: user_login })
|
2021-02-22 17:27:13 +05:30
|
|
|
expect(client).to receive(:search_repositories).with(search_query, { page: 2, per_page: 25 }).and_return({ items: [].to_enum })
|
|
|
|
end
|
|
|
|
|
|
|
|
expect_next_instance_of(Gitlab::GithubImport::Client) do |client|
|
|
|
|
expect(client).to receive(:collaborations_subquery).and_return(collaborations_subquery)
|
|
|
|
expect(client).to receive(:organizations_subquery).and_return(organizations_subquery)
|
|
|
|
end
|
|
|
|
|
|
|
|
get :status, params: { filter: filter, page: 2 }, format: :json
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-01-29 00:20:46 +05:30
|
|
|
context 'when user input contains colons and spaces' do
|
|
|
|
before do
|
2022-06-21 17:19:12 +05:30
|
|
|
allow_next_instance_of(Gitlab::GithubImport::Client) do |client|
|
|
|
|
allow(client).to receive(:search_repos_by_name).and_return(items: [])
|
|
|
|
end
|
2021-01-29 00:20:46 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'sanitizes user input' do
|
|
|
|
filter = ' test1:test2 test3 : test4 '
|
|
|
|
expected_filter = 'test1test2test3test4'
|
|
|
|
|
|
|
|
get :status, params: { filter: filter }, format: :json
|
|
|
|
|
|
|
|
expect(assigns(:filter)).to eq(expected_filter)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when rate limit threshold is exceeded' do
|
|
|
|
before do
|
|
|
|
allow(controller).to receive(:status).and_raise(Gitlab::GithubImport::RateLimitError)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns 429' do
|
|
|
|
get :status, params: { filter: 'test' }, format: :json
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:too_many_requests)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-10-24 23:57:45 +05:30
|
|
|
end
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe "POST create" do
|
2017-08-17 22:00:37 +05:30
|
|
|
it_behaves_like 'a GitHub-ish import controller: POST create'
|
2020-03-13 15:44:24 +05:30
|
|
|
|
|
|
|
it_behaves_like 'project import rate limiter'
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|
2019-07-07 11:18:12 +05:30
|
|
|
|
|
|
|
describe "GET realtime_changes" do
|
2022-06-21 17:19:12 +05:30
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it_behaves_like 'a GitHub-ish import controller: GET realtime_changes'
|
2022-06-21 17:19:12 +05:30
|
|
|
|
|
|
|
before do
|
|
|
|
assign_session_token(provider)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'includes stats in response' do
|
|
|
|
create(:project, import_type: provider, namespace: user.namespace, import_status: :finished, import_source: 'example/repo')
|
|
|
|
|
|
|
|
get :realtime_changes
|
|
|
|
|
|
|
|
expect(json_response[0]).to include('stats')
|
|
|
|
expect(json_response[0]['stats']).to include('fetched')
|
|
|
|
expect(json_response[0]['stats']).to include('imported')
|
|
|
|
end
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
2022-11-25 23:54:43 +05:30
|
|
|
|
|
|
|
describe "POST cancel" do
|
|
|
|
let_it_be(:project) { create(:project, :import_started, import_type: 'github', import_url: 'https://fake.url') }
|
|
|
|
|
|
|
|
context 'when project import was canceled' do
|
|
|
|
before do
|
|
|
|
allow(Import::Github::CancelProjectImportService)
|
|
|
|
.to receive(:new).with(project, user)
|
|
|
|
.and_return(double(execute: { status: :success, project: project }))
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns success' do
|
|
|
|
post :cancel, params: { project_id: project.id }
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when project import was not canceled' do
|
|
|
|
before do
|
|
|
|
allow(Import::Github::CancelProjectImportService)
|
|
|
|
.to receive(:new).with(project, user)
|
|
|
|
.and_return(double(execute: { status: :error, message: 'The import cannot be canceled because it is finished', http_status: :bad_request }))
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns error' do
|
|
|
|
post :cancel, params: { project_id: project.id }
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:bad_request)
|
|
|
|
expect(json_response['errors']).to eq('The import cannot be canceled because it is finished')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|