2019-07-07 11:18:12 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
RSpec.describe GraphqlController do
|
2020-05-24 23:13:21 +05:30
|
|
|
include GraphqlHelpers
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
before do
|
|
|
|
stub_feature_flags(graphql: true)
|
|
|
|
end
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
describe 'ArgumentError' do
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
let(:message) { 'green ideas sleep furiously' }
|
|
|
|
|
|
|
|
before do
|
|
|
|
sign_in(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'handles argument errors' do
|
|
|
|
allow(subject).to receive(:execute) do
|
|
|
|
raise Gitlab::Graphql::Errors::ArgumentError, message
|
|
|
|
end
|
|
|
|
|
|
|
|
post :execute
|
|
|
|
|
|
|
|
expect(json_response).to include(
|
|
|
|
'errors' => include(a_hash_including('message' => message))
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
describe 'POST #execute' do
|
|
|
|
context 'when user is logged in' do
|
2020-05-24 23:13:21 +05:30
|
|
|
let(:user) { create(:user, last_activity_on: Date.yesterday) }
|
2018-11-08 19:23:39 +05:30
|
|
|
|
|
|
|
before do
|
2019-07-07 11:18:12 +05:30
|
|
|
sign_in(user)
|
2018-11-29 20:51:05 +05:30
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'returns 200 when user can access API' do
|
|
|
|
post :execute
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2018-11-29 20:51:05 +05:30
|
|
|
end
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'returns access denied template when user cannot access API' do
|
|
|
|
# User cannot access API in a couple of cases
|
|
|
|
# * When user is internal(like ghost users)
|
|
|
|
# * When user is blocked
|
2020-04-22 19:07:51 +05:30
|
|
|
expect(Ability).to receive(:allowed?).with(user, :log_in, :global).and_call_original
|
2019-07-07 11:18:12 +05:30
|
|
|
expect(Ability).to receive(:allowed?).with(user, :access_api, :global).and_return(false)
|
2018-11-29 20:51:05 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
post :execute
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2020-04-22 19:07:51 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:forbidden)
|
2019-07-07 11:18:12 +05:30
|
|
|
expect(response).to render_template('errors/access_denied')
|
2018-11-29 20:51:05 +05:30
|
|
|
end
|
2020-05-24 23:13:21 +05:30
|
|
|
|
|
|
|
it 'updates the users last_activity_on field' do
|
|
|
|
expect { post :execute }.to change { user.reload.last_activity_on }
|
|
|
|
end
|
2020-11-24 15:15:51 +05:30
|
|
|
|
|
|
|
it "sets context's sessionless value as false" do
|
|
|
|
post :execute
|
|
|
|
|
|
|
|
expect(assigns(:context)[:is_sessionless_user]).to be false
|
|
|
|
end
|
2021-03-11 19:13:27 +05:30
|
|
|
|
|
|
|
it 'calls the track api when trackable method' do
|
|
|
|
agent = 'vs-code-gitlab-workflow/3.11.1 VSCode/1.52.1 Node.js/12.14.1 (darwin; x64)'
|
|
|
|
request.env['HTTP_USER_AGENT'] = agent
|
|
|
|
|
|
|
|
expect(Gitlab::UsageDataCounters::VSCodeExtensionActivityUniqueCounter)
|
|
|
|
.to receive(:track_api_request_when_trackable).with(user_agent: agent, user: user)
|
|
|
|
|
|
|
|
post :execute
|
|
|
|
end
|
2020-05-24 23:13:21 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user uses an API token' do
|
|
|
|
let(:user) { create(:user, last_activity_on: Date.yesterday) }
|
|
|
|
let(:token) { create(:personal_access_token, user: user, scopes: [:api]) }
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
subject { post :execute, params: { access_token: token.token } }
|
|
|
|
|
2020-05-24 23:13:21 +05:30
|
|
|
it 'updates the users last_activity_on field' do
|
2020-11-24 15:15:51 +05:30
|
|
|
expect { subject }.to change { user.reload.last_activity_on }
|
|
|
|
end
|
|
|
|
|
|
|
|
it "sets context's sessionless value as true" do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(assigns(:context)[:is_sessionless_user]).to be true
|
2020-05-24 23:13:21 +05:30
|
|
|
end
|
2021-03-11 19:13:27 +05:30
|
|
|
|
|
|
|
it 'calls the track api when trackable method' do
|
|
|
|
agent = 'vs-code-gitlab-workflow/3.11.1 VSCode/1.52.1 Node.js/12.14.1 (darwin; x64)'
|
|
|
|
request.env['HTTP_USER_AGENT'] = agent
|
|
|
|
|
|
|
|
expect(Gitlab::UsageDataCounters::VSCodeExtensionActivityUniqueCounter)
|
|
|
|
.to receive(:track_api_request_when_trackable).with(user_agent: agent, user: user)
|
|
|
|
|
|
|
|
subject
|
|
|
|
end
|
2018-11-29 20:51:05 +05:30
|
|
|
end
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'when user is not logged in' do
|
|
|
|
it 'returns 200' do
|
|
|
|
post :execute
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2019-05-30 16:15:17 +05:30
|
|
|
end
|
2020-11-24 15:15:51 +05:30
|
|
|
|
|
|
|
it "sets context's sessionless value as false" do
|
|
|
|
post :execute
|
|
|
|
|
|
|
|
expect(assigns(:context)[:is_sessionless_user]).to be false
|
|
|
|
end
|
2019-05-30 16:15:17 +05:30
|
|
|
end
|
2021-01-03 14:25:43 +05:30
|
|
|
|
|
|
|
it 'includes request object in context' do
|
|
|
|
post :execute
|
|
|
|
|
|
|
|
expect(assigns(:context)[:request]).to eq request
|
|
|
|
end
|
2019-05-30 16:15:17 +05:30
|
|
|
end
|
2020-05-24 23:13:21 +05:30
|
|
|
|
|
|
|
describe 'Admin Mode' do
|
|
|
|
let(:admin) { create(:admin) }
|
|
|
|
let(:project) { create(:project) }
|
|
|
|
let(:graphql_query) { graphql_query_for('project', { 'fullPath' => project.full_path }, %w(id name)) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
sign_in(admin)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode enabled' do
|
|
|
|
before do
|
|
|
|
Gitlab::Session.with_session(controller.session) do
|
|
|
|
controller.current_user_mode.request_admin_mode!
|
|
|
|
controller.current_user_mode.enable_admin_mode!(password: admin.password)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can query project data' do
|
|
|
|
post :execute, params: { query: graphql_query }
|
|
|
|
|
|
|
|
expect(controller.current_user_mode.admin_mode?).to be(true)
|
|
|
|
expect(json_response['data']['project']['name']).to eq(project.name)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin mode disabled' do
|
|
|
|
it 'cannot query project data' do
|
|
|
|
post :execute, params: { query: graphql_query }
|
|
|
|
|
|
|
|
expect(controller.current_user_mode.admin_mode?).to be(false)
|
|
|
|
expect(json_response['data']['project']).to be_nil
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when admin is member of the project' do
|
|
|
|
before do
|
|
|
|
project.add_developer(admin)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can query project data' do
|
|
|
|
post :execute, params: { query: graphql_query }
|
|
|
|
|
|
|
|
expect(controller.current_user_mode.admin_mode?).to be(false)
|
|
|
|
expect(json_response['data']['project']['name']).to eq(project.name)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-11-24 15:15:51 +05:30
|
|
|
|
|
|
|
describe '#append_info_to_payload' do
|
2021-04-29 21:17:54 +05:30
|
|
|
let(:query_1) { { query: graphql_query_for('project', { 'fullPath' => 'foo' }, %w(id name), 'getProject_1') } }
|
|
|
|
let(:query_2) { { query: graphql_query_for('project', { 'fullPath' => 'bar' }, %w(id), 'getProject_2') } }
|
|
|
|
let(:graphql_queries) { [query_1, query_2] }
|
2020-11-24 15:15:51 +05:30
|
|
|
let(:log_payload) { {} }
|
2021-04-29 21:17:54 +05:30
|
|
|
let(:expected_logs) do
|
|
|
|
[
|
|
|
|
{
|
|
|
|
operation_name: 'getProject_1',
|
|
|
|
complexity: 3,
|
|
|
|
depth: 2,
|
|
|
|
used_deprecated_fields: [],
|
|
|
|
used_fields: ['Project.id', 'Project.name', 'Query.project'],
|
|
|
|
variables: '{}'
|
|
|
|
},
|
|
|
|
{
|
|
|
|
operation_name: 'getProject_2',
|
|
|
|
complexity: 2,
|
|
|
|
depth: 2,
|
|
|
|
used_deprecated_fields: [],
|
|
|
|
used_fields: ['Project.id', 'Query.project'],
|
|
|
|
variables: '{}'
|
|
|
|
}
|
|
|
|
]
|
|
|
|
end
|
2020-11-24 15:15:51 +05:30
|
|
|
|
|
|
|
before do
|
2021-04-29 21:17:54 +05:30
|
|
|
RequestStore.clear!
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
allow(controller).to receive(:append_info_to_payload).and_wrap_original do |method, *|
|
|
|
|
method.call(log_payload)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'appends metadata for logging' do
|
2021-04-29 21:17:54 +05:30
|
|
|
post :execute, params: { _json: graphql_queries }
|
2020-11-24 15:15:51 +05:30
|
|
|
|
|
|
|
expect(controller).to have_received(:append_info_to_payload)
|
2021-04-29 21:17:54 +05:30
|
|
|
expect(log_payload.dig(:metadata, :graphql)).to match_array(expected_logs)
|
2020-11-24 15:15:51 +05:30
|
|
|
end
|
|
|
|
end
|
2018-11-08 19:23:39 +05:30
|
|
|
end
|