2019-12-26 22:10:19 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2014-09-02 18:07:02 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
RSpec.describe API::Branches, feature_category: :source_code_management do
|
2020-03-13 15:44:24 +05:30
|
|
|
let_it_be(:user) { create(:user) }
|
2021-09-30 23:02:18 +05:30
|
|
|
|
2022-08-27 11:52:29 +05:30
|
|
|
let(:project) { create(:project, :repository, creator: user, path: 'my.project', create_branch: 'ends-with.txt') }
|
2018-03-17 18:26:18 +05:30
|
|
|
let(:guest) { create(:user).tap { |u| project.add_guest(u) } }
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:branch_name) { 'feature' }
|
|
|
|
let(:branch_sha) { '0b4bc9a49b562e85de7cc9e834518ea6828729b9' }
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_with_dot) { 'ends-with.json' }
|
|
|
|
let(:branch_with_slash) { 'improve/awesome' }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
|
|
|
let(:project_id) { project.id }
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
before do
|
2018-11-18 11:00:15 +05:30
|
|
|
project.add_maintainer(user)
|
2020-07-28 23:09:34 +05:30
|
|
|
stub_feature_flags(branch_list_keyset_pagination: false)
|
2017-09-10 17:25:29 +05:30
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2021-09-30 23:02:18 +05:30
|
|
|
describe "GET /projects/:id/repository/branches", :use_clean_rails_redis_caching, :clean_gitlab_redis_shared_state do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches" }
|
2015-09-11 14:41:01 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
shared_examples_for 'repository branches' do
|
2019-07-07 11:18:12 +05:30
|
|
|
RSpec::Matchers.define :has_up_to_merged_branch_names_count do |expected|
|
2019-02-15 15:39:39 +05:30
|
|
|
match do |actual|
|
2019-07-07 11:18:12 +05:30
|
|
|
expected >= actual[:merged_branch_names].count
|
2019-02-15 15:39:39 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
def check_merge_status(json_response)
|
|
|
|
merged, unmerged = json_response.partition { |branch| branch['merged'] }
|
|
|
|
merged_branches = merged.map { |branch| branch['name'] }
|
|
|
|
unmerged_branches = unmerged.map { |branch| branch['name'] }
|
|
|
|
expect(Set.new(merged_branches)).to eq(project.repository.merged_branch_names(merged_branches + unmerged_branches))
|
|
|
|
expect(project.repository.merged_branch_names(unmerged_branches)).to be_empty
|
|
|
|
end
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
context 'with branch_list_keyset_pagination feature off' do
|
2020-10-24 23:57:45 +05:30
|
|
|
let(:base_params) { {} }
|
|
|
|
|
|
|
|
context 'with offset pagination params' do
|
2020-07-28 23:09:34 +05:30
|
|
|
it 'returns the repository branches' do
|
2020-10-24 23:57:45 +05:30
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 100)
|
2020-07-28 23:09:34 +05:30
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branches')
|
|
|
|
expect(response).to include_pagination_headers
|
|
|
|
branch_names = json_response.map { |x| x['name'] }
|
|
|
|
expect(branch_names).to match_array(project.repository.branch_names)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'determines only a limited number of merged branch names' do
|
2021-06-08 01:23:25 +05:30
|
|
|
expect(API::Entities::Branch).to receive(:represent).with(anything, has_up_to_merged_branch_names_count(2)).at_least(:once).and_call_original
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 2)
|
2020-07-28 23:09:34 +05:30
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response.count).to eq 2
|
|
|
|
|
|
|
|
check_merge_status(json_response)
|
|
|
|
end
|
2019-02-15 15:39:39 +05:30
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
it 'merge status matches reality on paginated input' do
|
|
|
|
expected_first_branch_name = project.repository.branches_sorted_by('name')[20].name
|
2019-07-07 11:18:12 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 20, page: 2)
|
2019-07-07 11:18:12 +05:30
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response.count).to eq 20
|
|
|
|
expect(json_response.first['name']).to eq(expected_first_branch_name)
|
|
|
|
|
|
|
|
check_merge_status(json_response)
|
|
|
|
end
|
2021-09-30 23:02:18 +05:30
|
|
|
|
|
|
|
it 'recovers pagination headers from cache between consecutive requests' do
|
|
|
|
2.times do
|
|
|
|
get api(route, current_user), params: base_params
|
|
|
|
|
|
|
|
expect(response.headers).to include('X-Page')
|
|
|
|
end
|
|
|
|
end
|
2020-07-28 23:09:34 +05:30
|
|
|
end
|
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
context 'with gitaly pagination params' do
|
2020-07-28 23:09:34 +05:30
|
|
|
it 'merge status matches reality on paginated input' do
|
|
|
|
expected_first_branch_name = project.repository.branches_sorted_by('name').first.name
|
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 20, page_token: 'feature')
|
2020-07-28 23:09:34 +05:30
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response.count).to eq 20
|
|
|
|
expect(json_response.first['name']).to eq(expected_first_branch_name)
|
|
|
|
|
|
|
|
check_merge_status(json_response)
|
|
|
|
end
|
|
|
|
end
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
context 'with branch_list_keyset_pagination feature on' do
|
|
|
|
before do
|
2020-10-24 23:57:45 +05:30
|
|
|
stub_feature_flags(branch_list_keyset_pagination: project)
|
2020-07-28 23:09:34 +05:30
|
|
|
end
|
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
context 'with keyset pagination option' do
|
|
|
|
let(:base_params) { { pagination: 'keyset' } }
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
context 'with gitaly pagination params ' do
|
|
|
|
it 'returns the repository branches' do
|
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 100)
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branches')
|
2021-09-04 01:27:46 +05:30
|
|
|
expect(response.headers).not_to include('Link')
|
2020-10-24 23:57:45 +05:30
|
|
|
branch_names = json_response.map { |x| x['name'] }
|
|
|
|
expect(branch_names).to match_array(project.repository.branch_names)
|
|
|
|
end
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
it 'determines only a limited number of merged branch names' do
|
2021-06-08 01:23:25 +05:30
|
|
|
expect(API::Entities::Branch).to receive(:represent).with(anything, has_up_to_merged_branch_names_count(2)).at_least(:once).and_call_original
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 2)
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2021-09-04 01:27:46 +05:30
|
|
|
expect(response.headers).to include('Link')
|
2020-10-24 23:57:45 +05:30
|
|
|
expect(json_response.count).to eq 2
|
2019-07-07 11:18:12 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
check_merge_status(json_response)
|
|
|
|
end
|
2019-07-07 11:18:12 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
it 'merge status matches reality on paginated input' do
|
|
|
|
expected_first_branch_name = project.repository.branches_sorted_by('name').drop_while { |b| b.name <= 'feature' }.first.name
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 20, page_token: 'feature')
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response.count).to eq 20
|
|
|
|
expect(json_response.first['name']).to eq(expected_first_branch_name)
|
|
|
|
|
|
|
|
check_merge_status(json_response)
|
|
|
|
end
|
2020-07-28 23:09:34 +05:30
|
|
|
end
|
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
context 'with offset pagination params' do
|
|
|
|
it 'ignores legacy pagination params' do
|
|
|
|
expected_first_branch_name = project.repository.branches_sorted_by('name').first.name
|
|
|
|
get api(route, current_user), params: base_params.merge(per_page: 20, page: 2)
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response.first['name']).to eq(expected_first_branch_name)
|
2020-07-28 23:09:34 +05:30
|
|
|
|
2020-10-24 23:57:45 +05:30
|
|
|
check_merge_status(json_response)
|
|
|
|
end
|
2020-07-28 23:09:34 +05:30
|
|
|
end
|
|
|
|
end
|
2019-02-15 15:39:39 +05:30
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
it_behaves_like '404 response' do
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
context 'when search parameter is passed' do
|
|
|
|
context 'and branch exists' do
|
|
|
|
it 'returns correct branches' do
|
2019-02-15 15:39:39 +05:30
|
|
|
get api(route, user), params: { per_page: 100, search: branch_name }
|
2018-03-27 19:54:05 +05:30
|
|
|
|
|
|
|
searched_branch_names = json_response.map { |branch| branch['name'] }
|
|
|
|
project_branch_names = project.repository.branch_names.grep(/#{branch_name}/)
|
|
|
|
|
|
|
|
expect(searched_branch_names).to match_array(project_branch_names)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'and branch does not exist' do
|
|
|
|
it 'returns an empty array' do
|
2019-02-15 15:39:39 +05:30
|
|
|
get api(route, user), params: { per_page: 100, search: 'no_such_branch_name_entropy_of_jabadabadu' }
|
2018-03-27 19:54:05 +05:30
|
|
|
|
|
|
|
expect(json_response).to eq []
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-04-04 11:22:00 +05:30
|
|
|
context 'when sort parameter is passed' do
|
|
|
|
it 'sorts branches' do
|
|
|
|
get api(route, user), params: { sort: 'name_asc', per_page: 10 }
|
|
|
|
|
|
|
|
sorted_branch_names = json_response.map { |branch| branch['name'] }
|
|
|
|
|
|
|
|
project_branch_names = project.repository.branch_names.sort.take(10)
|
|
|
|
|
|
|
|
expect(sorted_branch_names).to eq(project_branch_names)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when sort value is not supported' do
|
|
|
|
it_behaves_like '400 response' do
|
2022-08-27 11:52:29 +05:30
|
|
|
let(:request) { get api(route, user), params: { sort: 'unknown' } }
|
2022-04-04 11:22:00 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'when unauthenticated', 'and project is public' do
|
2018-03-17 18:26:18 +05:30
|
|
|
before do
|
2020-11-24 15:15:51 +05:30
|
|
|
project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
|
|
|
|
it_behaves_like 'repository branches'
|
2022-10-11 01:57:18 +05:30
|
|
|
|
|
|
|
context 'caching' do
|
|
|
|
it 'caches the query' do
|
|
|
|
get api(route), params: { per_page: 1 }
|
|
|
|
|
|
|
|
expect(API::Entities::Branch).not_to receive(:represent)
|
|
|
|
|
|
|
|
get api(route), params: { per_page: 1 }
|
|
|
|
end
|
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
it 'uses the cache up to 60 minutes' do
|
|
|
|
time_of_request = Time.current
|
2022-10-11 01:57:18 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
get api(route), params: { per_page: 1 }
|
2022-10-11 01:57:18 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
travel_to time_of_request + 59.minutes do
|
|
|
|
expect(API::Entities::Branch).not_to receive(:represent)
|
2022-10-11 01:57:18 +05:30
|
|
|
|
|
|
|
get api(route), params: { per_page: 1 }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
it 'requests for new value after 60 minutes' do
|
|
|
|
get api(route), params: { per_page: 1 }
|
2022-10-11 01:57:18 +05:30
|
|
|
|
2022-11-25 23:54:43 +05:30
|
|
|
travel_to 61.minutes.from_now do
|
|
|
|
expect(API::Entities::Branch).to receive(:represent)
|
2022-10-11 01:57:18 +05:30
|
|
|
|
|
|
|
get api(route), params: { per_page: 1 }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
context 'when authenticated', 'as a maintainer' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:current_user) { user }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branches'
|
|
|
|
|
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branches'
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2019-12-26 22:10:19 +05:30
|
|
|
|
|
|
|
it 'does not submit N+1 DB queries', :request_store do
|
|
|
|
create(:protected_branch, name: 'master', project: project)
|
|
|
|
|
|
|
|
# Make sure no setup step query is recorded.
|
|
|
|
get api(route, current_user), params: { per_page: 100 }
|
|
|
|
|
|
|
|
control = ActiveRecord::QueryRecorder.new do
|
|
|
|
get api(route, current_user), params: { per_page: 100 }
|
|
|
|
end
|
|
|
|
|
|
|
|
new_branch_name = 'protected-branch'
|
2020-01-01 13:55:28 +05:30
|
|
|
::Branches::CreateService.new(project, current_user).execute(new_branch_name, 'master')
|
2019-12-26 22:10:19 +05:30
|
|
|
create(:protected_branch, name: new_branch_name, project: project)
|
|
|
|
|
|
|
|
expect do
|
|
|
|
get api(route, current_user), params: { per_page: 100 }
|
2023-04-23 21:23:45 +05:30
|
|
|
end.not_to exceed_query_limit(control).with_threshold(1)
|
2019-12-26 22:10:19 +05:30
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { get api(route, guest) }
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "GET /projects/:id/repository/branches/:branch" do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches/#{branch_name}" }
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
shared_examples_for 'repository branch' do
|
2018-03-17 18:26:18 +05:30
|
|
|
context 'HEAD request' do
|
|
|
|
it 'returns 204 No Content' do
|
|
|
|
head api(route, user)
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:no_content)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect(response.body).to be_empty
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns 404 Not Found' do
|
|
|
|
head api("/projects/#{project_id}/repository/branches/unknown", user)
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
2018-03-17 18:26:18 +05:30
|
|
|
expect(response.body).to be_empty
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'returns the repository branch' do
|
|
|
|
get api(route, current_user)
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when branch does not exist' do
|
|
|
|
let(:branch_name) { 'unknown' }
|
|
|
|
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
let(:message) { '404 Branch Not Found' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
it_behaves_like '404 response' do
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
2021-09-04 01:27:46 +05:30
|
|
|
|
2023-03-04 22:38:38 +05:30
|
|
|
context 'when branch is ambiguous' do
|
|
|
|
let(:branch_name) { 'prefix' }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.repository.create_branch('prefix/branch')
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-09-04 01:27:46 +05:30
|
|
|
context 'when repository does not exist' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:project) { create(:project, creator: user) }
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'when unauthenticated', 'and project is public' do
|
2018-03-17 18:26:18 +05:30
|
|
|
before do
|
2020-11-24 15:15:51 +05:30
|
|
|
project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
2018-11-08 19:23:39 +05:30
|
|
|
|
|
|
|
it 'returns that the current user cannot push' do
|
|
|
|
get api(route, current_user)
|
|
|
|
|
|
|
|
expect(json_response['can_push']).to eq(false)
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
context 'when authenticated', 'as a maintainer' do
|
2017-08-17 22:00:37 +05:30
|
|
|
let(:current_user) { user }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
it 'returns that the current user can push' do
|
|
|
|
get api(route, current_user)
|
|
|
|
|
|
|
|
expect(json_response['can_push']).to eq(true)
|
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'when branch contains a dot' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { branch_with_dot }
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
end
|
|
|
|
|
2020-05-24 23:13:21 +05:30
|
|
|
context 'when branch contains dot txt' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { 'ends-with.txt' }
|
2020-05-24 23:13:21 +05:30
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when branch contains a slash' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { branch_with_slash }
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when branch contains an escaped slash' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { CGI.escape(branch_with_slash) }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
|
|
|
|
context 'when branch contains a dot' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { branch_with_dot }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
context 'when authenticated', 'as a developer and branch is protected' do
|
|
|
|
let(:current_user) { create(:user) }
|
|
|
|
let!(:protected_branch) { create(:protected_branch, project: project, name: branch_name) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.add_developer(current_user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
|
|
|
|
it 'returns that the current user cannot push' do
|
|
|
|
get api(route, current_user)
|
|
|
|
|
|
|
|
expect(json_response['can_push']).to eq(false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { get api(route, guest) }
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-08-24 12:49:21 +05:30
|
|
|
describe 'PUT /projects/:id/repository/branches/:branch/protect' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches/#{branch_name}/protect" }
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
shared_examples_for 'repository new protected branch' do
|
|
|
|
it 'protects a single branch' do
|
|
|
|
put api(route, current_user)
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2017-08-17 22:00:37 +05:30
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
end
|
|
|
|
|
2016-11-03 12:29:30 +05:30
|
|
|
it 'protects a single branch and developers can push' do
|
2019-02-15 15:39:39 +05:30
|
|
|
put api(route, current_user), params: { developers_can_push: true }
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2016-11-03 12:29:30 +05:30
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(true)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(false)
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2016-11-03 12:29:30 +05:30
|
|
|
it 'protects a single branch and developers can merge' do
|
2019-02-15 15:39:39 +05:30
|
|
|
put api(route, current_user), params: { developers_can_merge: true }
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2016-11-03 12:29:30 +05:30
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(false)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(true)
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2016-11-03 12:29:30 +05:30
|
|
|
it 'protects a single branch and developers can push and merge' do
|
2019-02-15 15:39:39 +05:30
|
|
|
put api(route, current_user), params: { developers_can_push: true, developers_can_merge: true }
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2016-11-03 12:29:30 +05:30
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(true)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(true)
|
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
|
|
|
|
context 'when branch does not exist' do
|
|
|
|
let(:branch_name) { 'unknown' }
|
|
|
|
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
let(:message) { '404 Branch Not Found' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
it_behaves_like '404 response' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { put api(route, guest) }
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
context 'when authenticated', 'as a maintainer' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:current_user) { user }
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context "when a protected branch doesn't already exist" do
|
|
|
|
it_behaves_like 'repository new protected branch'
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when branch contains a dot' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { branch_with_dot }
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it_behaves_like 'repository new protected branch'
|
2016-11-03 12:29:30 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when branch contains a slash' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { branch_with_slash }
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
2016-11-03 12:29:30 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when branch contains an escaped slash' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { CGI.escape(branch_with_slash) }
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it_behaves_like 'repository new protected branch'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository new protected branch'
|
|
|
|
|
|
|
|
context 'when branch contains a dot' do
|
2021-09-04 01:27:46 +05:30
|
|
|
let(:branch_name) { branch_with_dot }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
|
|
|
it_behaves_like 'repository new protected branch'
|
|
|
|
end
|
2016-11-03 12:29:30 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when protected branch already exists' do
|
|
|
|
before do
|
|
|
|
project.repository.add_branch(user, protected_branch.name, 'master')
|
|
|
|
end
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when developers can push and merge' do
|
|
|
|
let(:protected_branch) { create(:protected_branch, :developers_can_push, :developers_can_merge, project: project, name: 'protected_branch') }
|
|
|
|
|
|
|
|
it 'updates that a developer cannot push or merge' do
|
|
|
|
put api("/projects/#{project.id}/repository/branches/#{protected_branch.name}/protect", user),
|
2019-02-15 15:39:39 +05:30
|
|
|
params: { developers_can_push: false, developers_can_merge: false }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(protected_branch.name)
|
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(false)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(false)
|
2018-11-18 11:00:15 +05:30
|
|
|
expect(protected_branch.reload.push_access_levels.first.access_level).to eq(Gitlab::Access::MAINTAINER)
|
|
|
|
expect(protected_branch.reload.merge_access_levels.first.access_level).to eq(Gitlab::Access::MAINTAINER)
|
2017-09-10 17:25:29 +05:30
|
|
|
end
|
|
|
|
end
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when developers cannot push or merge' do
|
|
|
|
let(:protected_branch) { create(:protected_branch, project: project, name: 'protected_branch') }
|
|
|
|
|
|
|
|
it 'updates that a developer can push and merge' do
|
|
|
|
put api("/projects/#{project.id}/repository/branches/#{protected_branch.name}/protect", user),
|
2019-02-15 15:39:39 +05:30
|
|
|
params: { developers_can_push: true, developers_can_merge: true }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(protected_branch.name)
|
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(true)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(true)
|
|
|
|
end
|
2016-11-03 12:29:30 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
end
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
describe 'PUT /projects/:id/repository/branches/:branch/unprotect' do
|
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches/#{branch_name}/unprotect" }
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
shared_examples_for 'repository unprotected branch' do
|
2022-10-11 01:57:18 +05:30
|
|
|
context 'when branch is protected' do
|
|
|
|
let!(:protected_branch) { create(:protected_branch, project: project, name: protected_branch_name) }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
it 'unprotects a single branch' do
|
|
|
|
expect_next_instance_of(::ProtectedBranches::DestroyService, project, current_user) do |instance|
|
|
|
|
expect(instance).to receive(:execute).with(protected_branch).and_call_original
|
|
|
|
end
|
|
|
|
|
|
|
|
put api(route, current_user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
|
|
|
expect(json_response['protected']).to eq(false)
|
|
|
|
|
|
|
|
expect { protected_branch.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when branch is not protected' do
|
|
|
|
it 'returns a single branch response' do
|
|
|
|
expect(::ProtectedBranches::DestroyService).not_to receive(:new)
|
|
|
|
|
|
|
|
put api(route, current_user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
|
|
|
expect(json_response['protected']).to eq(false)
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when branch does not exist' do
|
|
|
|
let(:branch_name) { 'unknown' }
|
2016-08-24 12:49:21 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
let(:message) { '404 Branch Not Found' }
|
|
|
|
end
|
2016-11-03 12:29:30 +05:30
|
|
|
end
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
2016-11-03 12:29:30 +05:30
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
it_behaves_like '404 response' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
2016-08-24 12:49:21 +05:30
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { put api(route, guest) }
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
context 'when authenticated', 'as a maintainer' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:current_user) { user }
|
2022-10-11 01:57:18 +05:30
|
|
|
let(:protected_branch_name) { branch_name }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'repository unprotected branch'
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'repository unprotected branch'
|
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
context 'when branch contains a slash' do
|
|
|
|
let(:branch_name) { branch_with_slash }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
2017-09-10 17:25:29 +05:30
|
|
|
end
|
2022-10-11 01:57:18 +05:30
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
context 'when branch contains an escaped slash' do
|
|
|
|
let(:branch_name) { CGI.escape(branch_with_slash) }
|
|
|
|
let(:protected_branch_name) { branch_with_slash }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'repository unprotected branch'
|
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'repository unprotected branch'
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot }
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2022-10-11 01:57:18 +05:30
|
|
|
it_behaves_like 'repository unprotected branch'
|
2017-09-10 17:25:29 +05:30
|
|
|
end
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
2017-09-10 17:25:29 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe 'POST /projects/:id/repository/branches' do
|
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches" }
|
|
|
|
|
|
|
|
shared_examples_for 'repository new branch' do
|
|
|
|
it 'creates a new branch' do
|
2019-02-15 15:39:39 +05:30
|
|
|
post api(route, current_user), params: { branch: 'feature1', ref: branch_sha }
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:created)
|
2017-09-10 17:25:29 +05:30
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq('feature1')
|
|
|
|
expect(json_response['commit']['id']).to eq(branch_sha)
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
it_behaves_like '404 response' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:request) { post api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { post api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { post api(route, guest) }
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
context 'when authenticated', 'as a maintainer' do
|
2017-09-10 17:25:29 +05:30
|
|
|
let(:current_user) { user }
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context "when a protected branch doesn't already exist" do
|
|
|
|
it_behaves_like 'repository new branch'
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it_behaves_like 'repository new branch'
|
|
|
|
end
|
|
|
|
end
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'returns 400 if branch name is invalid' do
|
2019-02-15 15:39:39 +05:30
|
|
|
post api(route, user), params: { branch: 'new design', ref: branch_sha }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:bad_request)
|
2016-01-14 18:37:52 +05:30
|
|
|
expect(json_response['message']).to eq('Branch name is invalid')
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
it 'returns 400 if branch already exists', :clean_gitlab_redis_cache do
|
2019-02-15 15:39:39 +05:30
|
|
|
post api(route, user), params: { branch: 'new_design1', ref: branch_sha }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:created)
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
post api(route, user), params: { branch: 'new_design1', ref: branch_sha }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:bad_request)
|
2015-04-26 12:48:37 +05:30
|
|
|
expect(json_response['message']).to eq('Branch already exists')
|
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'returns 400 if ref name is invalid' do
|
2021-09-30 23:02:18 +05:30
|
|
|
error_message = 'Failed to create branch \'new_design3\': invalid reference name \'foo\''
|
2019-02-15 15:39:39 +05:30
|
|
|
post api(route, user), params: { branch: 'new_design3', ref: 'foo' }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:bad_request)
|
2021-09-30 23:02:18 +05:30
|
|
|
expect(json_response['message']).to eq(error_message)
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
describe 'DELETE /projects/:id/repository/branches/:branch' do
|
2015-09-11 14:41:01 +05:30
|
|
|
before do
|
2020-01-01 13:55:28 +05:30
|
|
|
allow_next_instance_of(Repository) do |instance|
|
|
|
|
allow(instance).to receive(:rm_branch).and_return(true)
|
|
|
|
end
|
2015-09-11 14:41:01 +05:30
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it 'removes branch' do
|
2014-09-02 18:07:02 +05:30
|
|
|
delete api("/projects/#{project.id}/repository/branches/#{branch_name}", user)
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:no_content)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
it 'removes a branch with dots in the branch name' do
|
2021-09-04 01:27:46 +05:30
|
|
|
delete api("/projects/#{project.id}/repository/branches/#{branch_with_dot}", user)
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:no_content)
|
2015-04-26 12:48:37 +05:30
|
|
|
end
|
|
|
|
|
2016-09-13 17:45:13 +05:30
|
|
|
it 'returns 404 if branch not exists' do
|
2015-04-26 12:48:37 +05:30
|
|
|
delete api("/projects/#{project.id}/repository/branches/foobar", user)
|
2014-09-02 18:07:02 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { delete api("/projects/#{project.id}/repository/branches/#{branch_name}", user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like '412 response' do
|
|
|
|
let(:request) { api("/projects/#{project.id}/repository/branches/#{branch_name}", user) }
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2017-09-10 17:25:29 +05:30
|
|
|
describe 'DELETE /projects/:id/repository/merged_branches' do
|
2017-08-17 22:00:37 +05:30
|
|
|
before do
|
2020-01-01 13:55:28 +05:30
|
|
|
allow_next_instance_of(Repository) do |instance|
|
|
|
|
allow(instance).to receive(:rm_branch).and_return(true)
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns 202 with json body' do
|
|
|
|
delete api("/projects/#{project.id}/repository/merged_branches", user)
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:accepted)
|
2017-08-17 22:00:37 +05:30
|
|
|
expect(json_response['message']).to eql('202 Accepted')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a 403 error if guest' do
|
|
|
|
delete api("/projects/#{project.id}/repository/merged_branches", guest)
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(response).to have_gitlab_http_status(:forbidden)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
2014-09-02 18:07:02 +05:30
|
|
|
end
|