debian-mirror-gitlab/spec/controllers/projects/notes_controller_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1038 lines
32 KiB
Ruby
Raw Normal View History

2019-07-31 22:56:46 +05:30
# frozen_string_literal: true
2016-09-13 17:45:13 +05:30
require 'spec_helper'
2023-04-23 21:23:45 +05:30
RSpec.describe Projects::NotesController, type: :controller, feature_category: :team_planning do
2018-03-17 18:26:18 +05:30
include ProjectForksHelper
let(:user) { create(:user) }
2017-09-10 17:25:29 +05:30
let(:project) { create(:project) }
let(:issue) { create(:issue, project: project) }
let(:note) { create(:note, noteable: issue, project: project) }
2016-09-13 17:45:13 +05:30
let(:request_params) do
{
namespace_id: project.namespace,
project_id: project,
id: note
}
end
2017-08-17 22:00:37 +05:30
describe 'GET index' do
let(:request_params) do
{
namespace_id: project.namespace,
project_id: project,
target_type: 'issue',
target_id: issue.id,
format: 'json'
}
end
2019-09-30 21:07:59 +05:30
let(:parsed_response) { json_response.with_indifferent_access }
2017-08-17 22:00:37 +05:30
let(:note_json) { parsed_response[:notes].first }
before do
sign_in(user)
2018-03-17 18:26:18 +05:30
project.add_developer(user)
2017-08-17 22:00:37 +05:30
end
2023-05-27 22:25:52 +05:30
specify { expect(get(:index, params: request_params)).to have_request_urgency(:medium) }
2020-06-23 00:09:42 +05:30
it 'passes last_fetched_at from headers to NotesFinder and MergeIntoNotesService' do
2020-07-28 23:09:34 +05:30
last_fetched_at = Time.zone.at(3.hours.ago.to_i) # remove nanoseconds
2017-08-17 22:00:37 +05:30
2020-07-28 23:09:34 +05:30
request.headers['X-Last-Fetched-At'] = microseconds(last_fetched_at)
2017-08-17 22:00:37 +05:30
expect(NotesFinder).to receive(:new)
2019-10-12 21:52:04 +05:30
.with(anything, hash_including(last_fetched_at: last_fetched_at))
2017-08-17 22:00:37 +05:30
.and_call_original
2020-06-23 00:09:42 +05:30
expect(ResourceEvents::MergeIntoNotesService).to receive(:new)
.with(anything, anything, hash_including(last_fetched_at: last_fetched_at))
.and_call_original
2019-02-15 15:39:39 +05:30
get :index, params: request_params
2017-08-17 22:00:37 +05:30
end
2018-12-13 13:39:08 +05:30
context 'when user notes_filter is present' do
let(:notes_json) { parsed_response[:notes] }
let!(:comment) { create(:note, noteable: issue, project: project) }
let!(:system_note) { create(:note, noteable: issue, project: project, system: true) }
it 'filters system notes by comments' do
user.set_notes_filter(UserPreference::NOTES_FILTERS[:only_comments], issue)
2019-02-15 15:39:39 +05:30
get :index, params: request_params
2018-12-13 13:39:08 +05:30
expect(notes_json.count).to eq(1)
expect(notes_json.first[:id].to_i).to eq(comment.id)
end
it 'returns all notes' do
user.set_notes_filter(UserPreference::NOTES_FILTERS[:all_notes], issue)
2019-02-15 15:39:39 +05:30
get :index, params: request_params
2018-12-13 13:39:08 +05:30
expect(notes_json.map { |note| note[:id].to_i }).to contain_exactly(comment.id, system_note.id)
end
it 'does not merge label event notes' do
user.set_notes_filter(UserPreference::NOTES_FILTERS[:only_comments], issue)
expect(ResourceEvents::MergeIntoNotesService).not_to receive(:new)
2019-02-15 15:39:39 +05:30
get :index, params: request_params
2018-12-13 13:39:08 +05:30
end
end
2017-08-17 22:00:37 +05:30
context 'for a discussion note' do
2018-03-17 18:26:18 +05:30
let(:project) { create(:project, :repository) }
let!(:note) { create(:discussion_note_on_merge_request, project: project) }
2018-11-08 19:23:39 +05:30
let(:params) { request_params.merge(target_type: 'merge_request', target_id: note.noteable_id, html: true) }
2017-08-17 22:00:37 +05:30
it 'responds with the expected attributes' do
2019-02-15 15:39:39 +05:30
get :index, params: params
2017-08-17 22:00:37 +05:30
expect(note_json[:id]).to eq(note.id)
expect(note_json[:discussion_html]).not_to be_nil
expect(note_json[:diff_discussion_html]).to be_nil
2018-03-17 18:26:18 +05:30
expect(note_json[:discussion_line_code]).to be_nil
2017-08-17 22:00:37 +05:30
end
end
context 'for a diff discussion note' do
let(:project) { create(:project, :repository) }
let!(:note) { create(:diff_note_on_merge_request, project: project) }
2018-11-08 19:23:39 +05:30
let(:params) { request_params.merge(target_type: 'merge_request', target_id: note.noteable_id, html: true) }
2017-08-17 22:00:37 +05:30
it 'responds with the expected attributes' do
2019-02-15 15:39:39 +05:30
get :index, params: params
2017-08-17 22:00:37 +05:30
expect(note_json[:id]).to eq(note.id)
expect(note_json[:discussion_html]).not_to be_nil
expect(note_json[:diff_discussion_html]).not_to be_nil
2018-03-17 18:26:18 +05:30
expect(note_json[:discussion_line_code]).not_to be_nil
2017-08-17 22:00:37 +05:30
end
end
context 'for a commit note' do
let(:project) { create(:project, :repository) }
let!(:note) { create(:note_on_commit, project: project) }
context 'when displayed on a merge request' do
let(:merge_request) { create(:merge_request, source_project: project) }
2018-11-08 19:23:39 +05:30
let(:params) { request_params.merge(target_type: 'merge_request', target_id: merge_request.id, html: true) }
2017-08-17 22:00:37 +05:30
it 'responds with the expected attributes' do
2019-02-15 15:39:39 +05:30
get :index, params: params
2017-08-17 22:00:37 +05:30
expect(note_json[:id]).to eq(note.id)
expect(note_json[:discussion_html]).not_to be_nil
expect(note_json[:diff_discussion_html]).to be_nil
2018-03-17 18:26:18 +05:30
expect(note_json[:discussion_line_code]).to be_nil
2017-08-17 22:00:37 +05:30
end
end
context 'when displayed on the commit' do
2018-11-08 19:23:39 +05:30
let(:params) { request_params.merge(target_type: 'commit', target_id: note.commit_id, html: true) }
2017-08-17 22:00:37 +05:30
it 'responds with the expected attributes' do
2019-02-15 15:39:39 +05:30
get :index, params: params
2017-08-17 22:00:37 +05:30
expect(note_json[:id]).to eq(note.id)
expect(note_json[:discussion_html]).to be_nil
expect(note_json[:diff_discussion_html]).to be_nil
2018-03-17 18:26:18 +05:30
expect(note_json[:discussion_line_code]).to be_nil
end
context 'when user cannot read commit' do
before do
allow(Ability).to receive(:allowed?).and_call_original
2023-03-04 22:38:38 +05:30
allow(Ability).to receive(:allowed?).with(user, :read_code, project).and_return(false)
2018-03-17 18:26:18 +05:30
end
it 'renders 404' do
2019-02-15 15:39:39 +05:30
get :index, params: params
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2018-03-17 18:26:18 +05:30
end
2017-08-17 22:00:37 +05:30
end
end
end
context 'for a regular note' do
2018-03-17 18:26:18 +05:30
let!(:note) { create(:note_on_merge_request, project: project) }
2018-11-08 19:23:39 +05:30
let(:params) { request_params.merge(target_type: 'merge_request', target_id: note.noteable_id, html: true) }
2017-08-17 22:00:37 +05:30
it 'responds with the expected attributes' do
2019-02-15 15:39:39 +05:30
get :index, params: params
2017-08-17 22:00:37 +05:30
expect(note_json[:id]).to eq(note.id)
expect(note_json[:html]).not_to be_nil
expect(note_json[:discussion_html]).to be_nil
expect(note_json[:diff_discussion_html]).to be_nil
2018-03-17 18:26:18 +05:30
expect(note_json[:discussion_line_code]).to be_nil
end
end
context 'with cross-reference system note', :request_store do
let(:new_issue) { create(:issue) }
let(:cross_reference) { "mentioned in #{new_issue.to_reference(issue.project)}" }
before do
note
create(:discussion_note_on_issue, :system, noteable: issue, project: issue.project, note: cross_reference)
end
it 'filters notes that the user should not see' do
2019-02-15 15:39:39 +05:30
get :index, params: request_params
2018-03-17 18:26:18 +05:30
expect(parsed_response[:notes].count).to eq(1)
2018-11-20 20:47:30 +05:30
expect(note_json[:id]).to eq(note.id.to_s)
2018-03-17 18:26:18 +05:30
end
it 'does not result in N+1 queries' do
# Instantiate the controller variables to ensure QueryRecorder has an accurate base count
2019-02-15 15:39:39 +05:30
get :index, params: request_params
2018-03-17 18:26:18 +05:30
RequestStore.clear!
control_count = ActiveRecord::QueryRecorder.new do
2019-02-15 15:39:39 +05:30
get :index, params: request_params
2018-03-17 18:26:18 +05:30
end.count
RequestStore.clear!
create_list(:discussion_note_on_issue, 2, :system, noteable: issue, project: issue.project, note: cross_reference)
2019-02-15 15:39:39 +05:30
expect { get :index, params: request_params }.not_to exceed_query_limit(control_count)
2017-08-17 22:00:37 +05:30
end
end
end
describe 'POST create' do
let(:merge_request) { create(:merge_request) }
let(:project) { merge_request.source_project }
2019-09-04 21:01:54 +05:30
let(:note_text) { 'some note' }
2017-08-17 22:00:37 +05:30
let(:request_params) do
{
2021-03-11 19:13:27 +05:30
note: { note: note_text, noteable_id: merge_request.id, noteable_type: 'MergeRequest' }.merge(extra_note_params),
2017-08-17 22:00:37 +05:30
namespace_id: project.namespace,
project_id: project,
2018-03-17 18:26:18 +05:30
merge_request_diff_head_sha: 'sha',
target_type: 'merge_request',
target_id: merge_request.id
2019-09-04 21:01:54 +05:30
}.merge(extra_request_params)
end
2020-10-24 23:57:45 +05:30
2019-09-04 21:01:54 +05:30
let(:extra_request_params) { {} }
2021-03-11 19:13:27 +05:30
let(:extra_note_params) { {} }
2019-09-04 21:01:54 +05:30
let(:project_visibility) { Gitlab::VisibilityLevel::PUBLIC }
let(:merge_requests_access_level) { ProjectFeature::ENABLED }
def create!
post :create, params: request_params
2017-08-17 22:00:37 +05:30
end
before do
2019-09-04 21:01:54 +05:30
project.update_attribute(:visibility_level, project_visibility)
2021-04-29 21:17:54 +05:30
project.project_feature.update!(merge_requests_access_level: merge_requests_access_level)
2017-08-17 22:00:37 +05:30
sign_in(user)
end
2023-05-27 22:25:52 +05:30
specify { expect(create!).to have_request_urgency(:low) }
2019-09-04 21:01:54 +05:30
describe 'making the creation request' do
before do
create!
end
context 'the project is publically available' do
context 'for HTML' do
it "returns status 302" do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2019-09-04 21:01:54 +05:30
end
end
context 'for JSON' do
let(:extra_request_params) { { format: :json } }
it "returns status 200 for json" do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-09-04 21:01:54 +05:30
end
end
end
2020-01-01 13:55:28 +05:30
context 'the note does not have commands_only errors' do
context 'for empty note' do
let(:note_text) { '' }
let(:extra_request_params) { { format: :json } }
it "returns status 422 for json" do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:unprocessable_entity)
2020-01-01 13:55:28 +05:30
end
end
end
2019-09-04 21:01:54 +05:30
context 'the project is a private project' do
let(:project_visibility) { Gitlab::VisibilityLevel::PRIVATE }
2017-08-17 22:00:37 +05:30
2019-09-04 21:01:54 +05:30
[{}, { format: :json }].each do |extra|
context "format is #{extra[:format]}" do
let(:extra_request_params) { extra }
it "returns status 404" do
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-09-04 21:01:54 +05:30
end
end
end
end
2017-08-17 22:00:37 +05:30
end
2019-09-04 21:01:54 +05:30
context 'the user is a developer on a private project' do
let(:project_visibility) { Gitlab::VisibilityLevel::PRIVATE }
before do
project.add_developer(user)
end
context 'HTML requests' do
it "returns status 302 (redirect)" do
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2019-09-04 21:01:54 +05:30
end
end
context 'JSON requests' do
let(:extra_request_params) { { format: :json } }
it "returns status 200" do
create!
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-09-04 21:01:54 +05:30
end
end
context 'the return_discussion param is set' do
let(:extra_request_params) { { format: :json, return_discussion: 'true' } }
it 'returns discussion JSON when the return_discussion param is set' do
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-09-04 21:01:54 +05:30
expect(json_response).to have_key 'discussion'
expect(json_response.dig('discussion', 'notes', 0, 'note')).to eq(request_params[:note][:note])
end
end
2021-03-11 19:13:27 +05:30
context 'when creating a confidential note' do
2022-06-21 17:19:12 +05:30
let(:project) { create(:project) }
let(:note_params) do
{ note: note_text, noteable_id: issue.id, noteable_type: 'Issue' }.merge(extra_note_params)
end
let(:request_params) do
{
note: note_params,
namespace_id: project.namespace,
project_id: project,
target_type: 'issue',
target_id: issue.id,
format: :json
}
end
2021-03-11 19:13:27 +05:30
2022-08-27 11:52:29 +05:30
context 'when parameter is not provided' do
it 'sets `confidential` and `internal` to `false` in JSON response' do
2021-03-11 19:13:27 +05:30
create!
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['confidential']).to be false
2022-08-27 11:52:29 +05:30
expect(json_response['internal']).to be false
2021-03-11 19:13:27 +05:30
end
end
2022-08-27 11:52:29 +05:30
context 'when is not a confidential note' do
context 'when using the `internal` parameter' do
let(:extra_note_params) { { internal: false } }
2021-03-11 19:13:27 +05:30
2022-08-27 11:52:29 +05:30
it 'sets `confidential` and `internal` to `false` in JSON response' do
create!
2021-03-11 19:13:27 +05:30
2022-08-27 11:52:29 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['confidential']).to be false
expect(json_response['internal']).to be false
end
end
context 'when using deprecated `confidential` parameter' do
let(:extra_note_params) { { confidential: false } }
it 'sets `confidential` and `internal` to `false` in JSON response' do
create!
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['confidential']).to be false
expect(json_response['internal']).to be false
end
2021-03-11 19:13:27 +05:30
end
end
2022-08-27 11:52:29 +05:30
context 'when is a confidential note' do
context 'when using the `internal` parameter' do
let(:extra_note_params) { { internal: true } }
2021-03-11 19:13:27 +05:30
2022-08-27 11:52:29 +05:30
it 'sets `confidential` and `internal` to `true` in JSON response' do
create!
2021-03-11 19:13:27 +05:30
2022-08-27 11:52:29 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['confidential']).to be true
expect(json_response['internal']).to be true
end
end
context 'when using deprecated `confidential` parameter' do
let(:extra_note_params) { { confidential: true } }
it 'sets `confidential` and `internal` to `true` in JSON response' do
create!
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['confidential']).to be true
expect(json_response['internal']).to be true
end
end
context 'when `internal` parameter is `true` and `confidential` parameter is `false`' do
let(:extra_note_params) { { internal: true, confidential: false } }
it 'uses the `internal` param as source of truth' do
create!
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['confidential']).to be true
expect(json_response['internal']).to be true
end
2021-03-11 19:13:27 +05:30
end
end
end
2019-09-04 21:01:54 +05:30
context 'when creating a note with quick actions' do
context 'with commands that return changes' do
let(:note_text) { "/award :thumbsup:\n/estimate 1d\n/spend 3h" }
let(:extra_request_params) { { format: :json } }
2021-02-22 17:27:13 +05:30
it 'includes changes in commands_changes' do
2019-09-04 21:01:54 +05:30
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-09-04 21:01:54 +05:30
expect(json_response['commands_changes']).to include('emoji_award', 'time_estimate', 'spend_time')
expect(json_response['commands_changes']).not_to include('target_project', 'title')
end
2023-05-27 22:25:52 +05:30
it 'includes command_names' do
create!
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['command_names']).to include('award', 'estimate', 'spend')
end
2019-09-04 21:01:54 +05:30
end
context 'with commands that do not return changes' do
let(:issue) { create(:issue, project: project) }
let(:other_project) { create(:project) }
let(:note_text) { "/move #{other_project.full_path}\n/title AAA" }
let(:extra_request_params) { { format: :json, target_id: issue.id, target_type: 'issue' } }
before do
other_project.add_developer(user)
end
it 'does not include changes in commands_changes' do
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2019-09-04 21:01:54 +05:30
expect(json_response['commands_changes']).not_to include('target_project', 'title')
end
2023-05-27 22:25:52 +05:30
it 'includes command_names' do
create!
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['command_names']).to include('move', 'title')
end
2019-09-04 21:01:54 +05:30
end
end
2017-08-17 22:00:37 +05:30
end
2019-09-04 21:01:54 +05:30
context 'when the internal project prohibits non-members from accessing merge requests' do
let(:project_visibility) { Gitlab::VisibilityLevel::INTERNAL }
let(:merge_requests_access_level) { ProjectFeature::PRIVATE }
it "prevents a non-member user from creating a note on one of the project's merge requests" do
create!
2018-12-05 23:21:45 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-09-04 21:01:54 +05:30
end
context 'when the user is a team member' do
before do
project.add_developer(user)
end
it 'can add comments' do
expect { create! }.to change { project.notes.count }.by(1)
end
end
# Illustration of the attack vector for posting comments to discussions that should
# be inaccessible.
#
# This relies on posting a note to a commit that is not necessarily even in the
# merge request, with a value of :in_reply_to_discussion_id that points to a
# discussion on a merge_request that should not be accessible.
context 'when the request includes a :in_reply_to_discussion_id designed to fool us' do
let(:commit) { create(:commit, project: project) }
let(:existing_comment) do
2023-05-27 22:25:52 +05:30
create(:note_on_commit, note: 'first', project: project, commit_id: merge_request.commit_shas.first)
2019-09-04 21:01:54 +05:30
end
let(:discussion) { existing_comment.discussion }
# see !60465 for details of the structure of this request
let(:request_params) do
{ "utf8" => "",
"authenticity_token" => "1",
"view" => "inline",
"line_type" => "",
"merge_request_diff_head_sha" => "",
"in_reply_to_discussion_id" => discussion.id,
"note_project_id" => project.id,
"project_id" => project.id,
"namespace_id" => project.namespace,
"target_type" => "commit",
"target_id" => commit.id,
"note" => {
"noteable_type" => "",
"noteable_id" => "",
"commit_id" => "",
"type" => "",
"line_code" => "",
"position" => "",
"note" => "ThisReplyWillGoToMergeRequest"
} }
end
it 'prevents the request from adding notes to the spoofed discussion' do
expect { create! }.not_to change { discussion.notes.count }
end
it 'returns an error to the user' do
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-09-04 21:01:54 +05:30
end
end
end
context 'when the public project prohibits non-members from accessing merge requests' do
let(:project_visibility) { Gitlab::VisibilityLevel::PUBLIC }
let(:merge_requests_access_level) { ProjectFeature::PRIVATE }
it "prevents a non-member user from creating a note on one of the project's merge requests" do
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2019-09-04 21:01:54 +05:30
end
context 'when the user is a team member' do
before do
project.add_developer(user)
create!
end
it 'can add comments' do
expect(response).to be_redirect
end
end
2018-12-05 23:21:45 +05:30
end
2017-08-17 22:00:37 +05:30
context 'when merge_request_diff_head_sha present' do
before do
2019-02-15 15:39:39 +05:30
service_params = ActionController::Parameters.new({
2017-08-17 22:00:37 +05:30
note: 'some note',
2019-07-07 11:18:12 +05:30
noteable_id: merge_request.id,
2017-08-17 22:00:37 +05:30
noteable_type: 'MergeRequest',
2019-07-07 11:18:12 +05:30
commit_id: nil,
merge_request_diff_head_sha: 'sha'
2019-02-15 15:39:39 +05:30
}).permit!
2017-08-17 22:00:37 +05:30
expect(Notes::CreateService).to receive(:new).with(project, user, service_params).and_return(double(execute: true))
end
it "returns status 302 for html" do
2019-09-04 21:01:54 +05:30
create!
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2017-08-17 22:00:37 +05:30
end
end
2017-09-10 17:25:29 +05:30
2019-07-07 11:18:12 +05:30
context 'when creating a comment on a commit with SHA1 starting with a large number' do
let(:commit) { create(:commit, project: project, id: '842616594688d2351480dfebd67b3d8d15571e6d') }
it 'creates a note successfully' do
expect do
post :create, params: {
note: { note: 'some note', commit_id: commit.id },
namespace_id: project.namespace,
project_id: project,
target_type: 'commit',
target_id: commit.id
}
end.to change { Note.count }.by(1)
end
end
2017-09-10 17:25:29 +05:30
context 'when creating a commit comment from an MR fork' do
2019-09-04 21:01:54 +05:30
let(:project) { create(:project, :repository, :public) }
2017-09-10 17:25:29 +05:30
2018-03-17 18:26:18 +05:30
let(:forked_project) do
fork_project(project, nil, repository: true)
2017-09-10 17:25:29 +05:30
end
let(:merge_request) do
2018-03-17 18:26:18 +05:30
create(:merge_request, source_project: forked_project, target_project: project, source_branch: 'feature', target_branch: 'master')
2017-09-10 17:25:29 +05:30
end
let(:existing_comment) do
2018-03-17 18:26:18 +05:30
create(:note_on_commit, note: 'a note', project: forked_project, commit_id: merge_request.commit_shas.first)
2017-09-10 17:25:29 +05:30
end
2019-09-04 21:01:54 +05:30
let(:note_project_id) do
forked_project.id
end
let(:request_params) do
{
2018-11-29 20:51:05 +05:30
note: { note: 'some other note', noteable_id: merge_request.id },
namespace_id: project.namespace,
project_id: project,
target_type: 'merge_request',
target_id: merge_request.id,
2019-09-04 21:01:54 +05:30
note_project_id: note_project_id,
2018-11-29 20:51:05 +05:30
in_reply_to_discussion_id: existing_comment.discussion_id
2019-09-04 21:01:54 +05:30
}
end
let(:fork_visibility) { Gitlab::VisibilityLevel::PUBLIC }
before do
forked_project.update_attribute(:visibility_level, fork_visibility)
2017-09-10 17:25:29 +05:30
end
context 'when the note_project_id is not correct' do
2019-09-04 21:01:54 +05:30
let(:note_project_id) do
project.id && Project.maximum(:id).succ
end
2017-09-10 17:25:29 +05:30
2019-12-26 22:10:19 +05:30
it 'returns a 404', :sidekiq_might_not_need_inline do
2019-09-04 21:01:54 +05:30
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2017-09-10 17:25:29 +05:30
end
end
context 'when the user has no access to the fork' do
2019-09-04 21:01:54 +05:30
let(:fork_visibility) { Gitlab::VisibilityLevel::PRIVATE }
2017-09-10 17:25:29 +05:30
2019-12-26 22:10:19 +05:30
it 'returns a 404', :sidekiq_might_not_need_inline do
2019-09-04 21:01:54 +05:30
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2017-09-10 17:25:29 +05:30
end
end
2019-12-26 22:10:19 +05:30
context 'when the user has access to the fork', :sidekiq_might_not_need_inline do
2019-09-04 21:01:54 +05:30
let!(:discussion) { forked_project.notes.find_discussion(existing_comment.discussion_id) }
let(:fork_visibility) { Gitlab::VisibilityLevel::PUBLIC }
2017-09-10 17:25:29 +05:30
2019-09-04 21:01:54 +05:30
it 'is successful' do
create!
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2017-09-10 17:25:29 +05:30
end
it 'creates the note' do
2019-09-04 21:01:54 +05:30
expect { create! }.to change { forked_project.notes.count }.by(1)
2018-03-17 18:26:18 +05:30
end
end
end
2018-11-29 20:51:05 +05:30
context 'when target_id and noteable_id do not match' do
2018-12-05 23:21:45 +05:30
let(:locked_issue) { create(:issue, :locked, project: project) }
2022-10-11 01:57:18 +05:30
let(:issue) { create(:issue, project: project) }
2018-11-29 20:51:05 +05:30
it 'uses target_id and ignores noteable_id' do
request_params = {
note: { note: 'some note', noteable_type: 'Issue', noteable_id: locked_issue.id },
target_type: 'issue',
target_id: issue.id,
project_id: project,
namespace_id: project.namespace
}
2019-02-15 15:39:39 +05:30
expect { post :create, params: request_params }.to change { issue.notes.count }.by(1)
2018-11-29 20:51:05 +05:30
.and change { locked_issue.notes.count }.by(0)
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2018-11-29 20:51:05 +05:30
end
end
2018-03-17 18:26:18 +05:30
context 'when the merge request discussion is locked' do
before do
merge_request.update_attribute(:discussion_locked, true)
end
context 'when a noteable is not found' do
it 'returns 404 status' do
2020-04-22 19:07:51 +05:30
request_params[:target_id] = non_existing_record_id
2019-02-15 15:39:39 +05:30
post :create, params: request_params.merge(format: :json)
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2018-03-17 18:26:18 +05:30
end
end
context 'when a user is a team member' do
2019-09-04 21:01:54 +05:30
before do
project.add_developer(user)
end
2018-03-17 18:26:18 +05:30
it 'returns 302 status for html' do
2019-02-15 15:39:39 +05:30
post :create, params: request_params
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:found)
2018-03-17 18:26:18 +05:30
end
it 'returns 200 status for json' do
2019-02-15 15:39:39 +05:30
post :create, params: request_params.merge(format: :json)
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2018-03-17 18:26:18 +05:30
end
it 'creates a new note' do
2019-02-15 15:39:39 +05:30
expect { post :create, params: request_params }.to change { Note.count }.by(1)
2018-03-17 18:26:18 +05:30
end
end
context 'when a user is not a team member' do
it 'returns 404 status' do
2019-02-15 15:39:39 +05:30
post :create, params: request_params
2018-03-17 18:26:18 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2018-03-17 18:26:18 +05:30
end
it 'does not create a new note' do
2019-02-15 15:39:39 +05:30
expect { post :create, params: request_params }.not_to change { Note.count }
2017-09-10 17:25:29 +05:30
end
end
end
2021-03-11 19:13:27 +05:30
2022-03-02 08:16:31 +05:30
it_behaves_like 'create notes request exceeding rate limit', :clean_gitlab_redis_cache do
let(:current_user) { user }
def request
post :create, params: request_params.except(:format)
end
2021-03-11 19:13:27 +05:30
end
2017-08-17 22:00:37 +05:30
end
2018-03-17 18:26:18 +05:30
describe 'PUT update' do
2023-05-27 22:25:52 +05:30
let(:request_params) do
{
namespace_id: project.namespace,
project_id: project,
id: note,
format: :json,
note: {
note: "New comment"
2019-07-07 11:18:12 +05:30
}
2023-05-27 22:25:52 +05:30
}
end
specify { expect(put(:update, params: request_params)).to have_request_urgency(:low) }
2019-05-03 19:53:19 +05:30
2023-05-27 22:25:52 +05:30
context "should update the note with a valid issue" do
2019-07-07 11:18:12 +05:30
before do
sign_in(note.author)
project.add_developer(note.author)
end
2019-05-30 16:15:17 +05:30
2019-07-07 11:18:12 +05:30
it "updates the note" do
expect { put :update, params: request_params }.to change { note.reload.note }
2018-11-29 20:51:05 +05:30
end
2018-03-17 18:26:18 +05:30
end
2023-03-04 22:38:38 +05:30
2018-11-29 20:51:05 +05:30
context "doesnt update the note" do
let(:issue) { create(:issue, :confidential, project: project) }
let(:note) { create(:note, noteable: issue, project: project) }
before do
sign_in(user)
project.add_guest(user)
end
2018-03-17 18:26:18 +05:30
2018-11-29 20:51:05 +05:30
it "disallows edits when the issue is confidential and the user has guest permissions" do
request_params = {
namespace_id: project.namespace,
project_id: project,
id: note,
format: :json,
note: {
note: "New comment"
}
}
2019-02-15 15:39:39 +05:30
expect { put :update, params: request_params }.not_to change { note.reload.note }
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2018-11-29 20:51:05 +05:30
end
2018-03-17 18:26:18 +05:30
end
end
2017-08-17 22:00:37 +05:30
describe 'DELETE destroy' do
let(:request_params) do
{
2018-11-29 20:51:05 +05:30
namespace_id: project.namespace,
project_id: project,
id: note,
format: :js
2017-08-17 22:00:37 +05:30
}
end
2023-05-27 22:25:52 +05:30
specify { expect(delete(:destroy, params: request_params)).to have_request_urgency(:low) }
2017-08-17 22:00:37 +05:30
context 'user is the author of a note' do
before do
sign_in(note.author)
2018-03-17 18:26:18 +05:30
project.add_developer(note.author)
2017-08-17 22:00:37 +05:30
end
it "returns status 200 for html" do
2019-02-15 15:39:39 +05:30
delete :destroy, params: request_params
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-08-17 22:00:37 +05:30
end
it "deletes the note" do
2019-02-15 15:39:39 +05:30
expect { delete :destroy, params: request_params }.to change { Note.count }.from(1).to(0)
2017-08-17 22:00:37 +05:30
end
end
context 'user is not the author of a note' do
before do
sign_in(user)
2018-03-17 18:26:18 +05:30
project.add_developer(user)
2017-08-17 22:00:37 +05:30
end
it "returns status 404" do
2019-02-15 15:39:39 +05:30
delete :destroy, params: request_params
2017-08-17 22:00:37 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2017-08-17 22:00:37 +05:30
end
end
end
2016-09-13 17:45:13 +05:30
describe 'POST toggle_award_emoji' do
before do
sign_in(user)
2018-03-17 18:26:18 +05:30
project.add_developer(user)
end
2019-12-04 20:38:33 +05:30
subject { post(:toggle_award_emoji, params: request_params.merge(name: emoji_name)) }
2019-12-21 20:55:43 +05:30
2019-12-04 20:38:33 +05:30
let(:emoji_name) { 'thumbsup' }
2023-05-27 22:25:52 +05:30
it { is_expected.to have_request_urgency(:low) }
it "toggles the award emoji" do
expect do
2019-12-04 20:38:33 +05:30
subject
end.to change { note.award_emoji.count }.by(1)
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
end
it "removes the already awarded emoji" do
2019-12-04 20:38:33 +05:30
create(:award_emoji, awardable: note, name: emoji_name, user: user)
2019-12-04 20:38:33 +05:30
expect { subject }.to change { AwardEmoji.count }.by(-1)
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
end
2019-12-04 20:38:33 +05:30
it 'marks Todos on the Noteable as done' do
todo = create(:todo, target: note.noteable, project: project, user: user)
subject
expect(todo.reload).to be_done
end
end
2016-09-13 17:45:13 +05:30
describe "resolving and unresolving" do
2017-08-17 22:00:37 +05:30
let(:project) { create(:project, :repository) }
2016-09-13 17:45:13 +05:30
let(:merge_request) { create(:merge_request, source_project: project) }
let(:note) { create(:diff_note_on_merge_request, noteable: merge_request, project: project) }
describe 'POST resolve' do
before do
sign_in user
end
2023-05-27 22:25:52 +05:30
specify { expect(post(:resolve, params: request_params)).to have_request_urgency(:low) }
2016-09-13 17:45:13 +05:30
context "when the user is not authorized to resolve the note" do
it "returns status 404" do
2019-02-15 15:39:39 +05:30
post :resolve, params: request_params
2016-09-13 17:45:13 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2016-09-13 17:45:13 +05:30
end
end
context "when the user is authorized to resolve the note" do
before do
2018-03-17 18:26:18 +05:30
project.add_developer(user)
2016-09-13 17:45:13 +05:30
end
context "when the note is not resolvable" do
before do
2021-04-29 21:17:54 +05:30
note.update!(system: true)
2016-09-13 17:45:13 +05:30
end
it "returns status 404" do
2019-02-15 15:39:39 +05:30
post :resolve, params: request_params
2016-09-13 17:45:13 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2016-09-13 17:45:13 +05:30
end
end
context "when the note is resolvable" do
it "resolves the note" do
2019-02-15 15:39:39 +05:30
post :resolve, params: request_params
2016-09-13 17:45:13 +05:30
expect(note.reload.resolved?).to be true
expect(note.reload.resolved_by).to eq(user)
end
it "sends notifications if all discussions are resolved" do
2019-12-26 22:10:19 +05:30
expect_next_instance_of(MergeRequests::ResolvedDiscussionNotificationService) do |instance|
expect(instance).to receive(:execute).with(merge_request)
end
2016-09-13 17:45:13 +05:30
2019-02-15 15:39:39 +05:30
post :resolve, params: request_params
2016-09-13 17:45:13 +05:30
end
it "returns the name of the resolving user" do
2019-02-15 15:39:39 +05:30
post :resolve, params: request_params.merge(html: true)
2016-09-13 17:45:13 +05:30
2019-09-30 21:07:59 +05:30
expect(json_response["resolved_by"]).to eq(user.name)
2016-09-13 17:45:13 +05:30
end
it "returns status 200" do
2019-02-15 15:39:39 +05:30
post :resolve, params: request_params
2016-09-13 17:45:13 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2016-09-13 17:45:13 +05:30
end
end
end
end
describe 'DELETE unresolve' do
before do
sign_in user
note.resolve!(user)
end
2023-05-27 22:25:52 +05:30
specify { expect(delete(:unresolve, params: request_params)).to have_request_urgency(:low) }
2016-09-13 17:45:13 +05:30
context "when the user is not authorized to resolve the note" do
it "returns status 404" do
2019-02-15 15:39:39 +05:30
delete :unresolve, params: request_params
2016-09-13 17:45:13 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2016-09-13 17:45:13 +05:30
end
end
context "when the user is authorized to resolve the note" do
before do
2018-03-17 18:26:18 +05:30
project.add_developer(user)
2016-09-13 17:45:13 +05:30
end
context "when the note is not resolvable" do
before do
2021-04-29 21:17:54 +05:30
note.update!(system: true)
2016-09-13 17:45:13 +05:30
end
it "returns status 404" do
2019-02-15 15:39:39 +05:30
delete :unresolve, params: request_params
2016-09-13 17:45:13 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2016-09-13 17:45:13 +05:30
end
end
context "when the note is resolvable" do
it "unresolves the note" do
2019-02-15 15:39:39 +05:30
delete :unresolve, params: request_params
2016-09-13 17:45:13 +05:30
expect(note.reload.resolved?).to be false
end
it "returns status 200" do
2019-02-15 15:39:39 +05:30
delete :unresolve, params: request_params
2016-09-13 17:45:13 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2016-09-13 17:45:13 +05:30
end
end
end
end
end
2020-07-28 23:09:34 +05:30
2021-12-11 22:18:48 +05:30
describe 'GET outdated_line_change' do
let(:request_params) do
{
namespace_id: project.namespace,
project_id: project,
id: note,
format: 'json'
}
end
before do
service = double
allow(service).to receive(:execute).and_return([{ line_text: 'Test' }])
allow(MergeRequests::OutdatedDiscussionDiffLinesService).to receive(:new).once.and_return(service)
sign_in(user)
project.add_developer(user)
end
it "successfully renders expected JSON response" do
get :outdated_line_change, params: request_params
expect(response).to have_gitlab_http_status(:ok)
expect(json_response).to be_an(Array)
expect(json_response.count).to eq(1)
expect(json_response.first).to include({ "line_text" => "Test" })
end
2023-05-27 22:25:52 +05:30
specify { expect(get(:outdated_line_change, params: request_params)).to have_request_urgency(:low) }
2021-12-11 22:18:48 +05:30
end
2020-07-28 23:09:34 +05:30
# Convert a time to an integer number of microseconds
def microseconds(time)
(time.to_i * 1_000_000) + time.usec
end
end