debian-mirror-gitlab/spec/lib/gitlab/gfm/uploads_rewriter_spec.rb

110 lines
3.1 KiB
Ruby
Raw Normal View History

2019-12-26 22:10:19 +05:30
# frozen_string_literal: true
2016-06-02 11:05:42 +05:30
require 'spec_helper'
describe Gitlab::Gfm::UploadsRewriter do
let(:user) { create(:user) }
2017-09-10 17:25:29 +05:30
let(:old_project) { create(:project) }
let(:new_project) { create(:project) }
2016-06-02 11:05:42 +05:30
let(:rewriter) { described_class.new(text, old_project, user) }
context 'text contains links to uploads' do
let(:image_uploader) do
build(:file_uploader, project: old_project)
end
let(:zip_uploader) do
build(:file_uploader, project: old_project,
fixture: 'ci_build_artifacts.zip')
end
let(:text) do
2018-03-17 18:26:18 +05:30
"Text and #{image_uploader.markdown_link} and #{zip_uploader.markdown_link}"
2016-06-02 11:05:42 +05:30
end
2018-11-08 19:23:39 +05:30
shared_examples "files are accessible" do
describe '#rewrite' do
let!(:new_text) { rewriter.rewrite(new_project) }
2016-06-02 11:05:42 +05:30
2018-11-08 19:23:39 +05:30
let(:old_files) { [image_uploader, zip_uploader] }
let(:new_files) do
described_class.new(new_text, new_project, user).files
end
2016-06-02 11:05:42 +05:30
2018-11-08 19:23:39 +05:30
let(:old_paths) { old_files.map(&:path) }
let(:new_paths) { new_files.map(&:path) }
2016-06-02 11:05:42 +05:30
2018-11-08 19:23:39 +05:30
it 'rewrites content' do
expect(new_text).not_to eq text
expect(new_text.length).to eq text.length
end
2016-06-02 11:05:42 +05:30
2018-11-08 19:23:39 +05:30
it 'copies files' do
expect(new_files).to all(exist)
expect(old_paths).not_to match_array new_paths
expect(old_paths).to all(include(old_project.disk_path))
expect(new_paths).to all(include(new_project.disk_path))
end
2016-06-02 11:05:42 +05:30
2018-11-08 19:23:39 +05:30
it 'does not remove old files' do
expect(old_files).to all(exist)
end
it 'generates a new secret for each file' do
expect(new_paths).not_to include image_uploader.secret
expect(new_paths).not_to include zip_uploader.secret
end
2016-06-02 11:05:42 +05:30
end
2018-11-08 19:23:39 +05:30
end
2016-06-02 11:05:42 +05:30
2019-10-12 21:52:04 +05:30
it 'does not rewrite plain links as embedded' do
embedded_link = image_uploader.markdown_link
plain_image_link = embedded_link.sub(/\A!/, "")
text = "#{plain_image_link} and #{embedded_link}"
moved_text = described_class.new(text, old_project, user).rewrite(new_project)
expect(moved_text.scan(/!\[.*?\]/).count).to eq(1)
expect(moved_text.scan(/\A\[.*?\]/).count).to eq(1)
end
2020-03-28 13:19:24 +05:30
context 'path traversal in file name' do
let(:text) do
"![a](/uploads/11111111111111111111111111111111/../../../../../../../../../../../../../../etc/passwd)"
end
it 'throw an error' do
2020-04-22 19:07:51 +05:30
expect { rewriter.rewrite(new_project) }.to raise_error(an_instance_of(StandardError).and(having_attributes(message: "Invalid path")))
2020-03-28 13:19:24 +05:30
end
end
2018-11-08 19:23:39 +05:30
context "file are stored locally" do
include_examples "files are accessible"
end
context "files are stored remotely" do
before do
stub_uploads_object_storage(FileUploader)
old_files.each do |file|
file.migrate!(ObjectStorage::Store::REMOTE)
end
2016-06-02 11:05:42 +05:30
end
2018-11-08 19:23:39 +05:30
include_examples "files are accessible"
2016-06-02 11:05:42 +05:30
end
describe '#needs_rewrite?' do
subject { rewriter.needs_rewrite? }
2019-12-21 20:55:43 +05:30
2016-06-02 11:05:42 +05:30
it { is_expected.to eq true }
end
describe '#files' do
subject { rewriter.files }
2019-12-21 20:55:43 +05:30
2016-06-02 11:05:42 +05:30
it { is_expected.to be_an(Array) }
end
end
end