gitlab-ce/spec/requests/api/remote_mirrors_spec.rb

312 lines
9.6 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe API::RemoteMirrors, feature_category: :source_code_management do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project, :repository, :remote_mirror) }
let_it_be(:developer) { create(:user) { |u| project.add_developer(u) } }
describe 'GET /projects/:id/remote_mirrors' do
let(:route) { "/projects/#{project.id}/remote_mirrors" }
it 'requires `admin_remote_mirror` permission' do
get api(route, developer)
expect(response).to have_gitlab_http_status(:unauthorized)
end
it 'returns a list of remote mirrors' do
project.add_maintainer(user)
get api(route, user)
expect(response).to have_gitlab_http_status(:success)
expect(response).to match_response_schema('remote_mirrors')
end
end
describe 'GET /projects/:id/remote_mirrors/:mirror_id' do
let(:route) { "/projects/#{project.id}/remote_mirrors/#{mirror.id}" }
let(:mirror) { project.remote_mirrors.first }
it 'requires `admin_remote_mirror` permission' do
get api(route, developer)
expect(response).to have_gitlab_http_status(:unauthorized)
end
it 'returns at remote mirror' do
project.add_maintainer(user)
get api(route, user)
expect(response).to have_gitlab_http_status(:success)
expect(response).to match_response_schema('remote_mirror')
end
end
describe 'POST /projects/:id/remote_mirrors/:mirror_id/sync' do
let(:route) { "/projects/#{project.id}/remote_mirrors/#{mirror_id}/sync" }
let(:mirror) { project.remote_mirrors.first }
let(:mirror_id) { mirror.id }
context 'without enough permissions' do
it 'requires `admin_remote_mirror` permission' do
post api(route, developer)
expect(response).to have_gitlab_http_status(:unauthorized)
end
end
context 'with sufficient permissions' do
before do
project.add_maintainer(user)
end
it 'returns a successful response' do
post api(route, user)
expect(response).to have_gitlab_http_status(:no_content)
end
context 'when some error occurs' do
before do
mirror.update!(enabled: false)
end
it 'returns an error' do
post api(route, user)
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['message']).to match(/Cannot proceed with the push mirroring/)
end
end
context 'when mirror ID is missing' do
let(:mirror_id) { non_existing_record_id }
it 'returns a not found error' do
post api(route, user)
expect(response).to have_gitlab_http_status(:not_found)
end
end
end
end
describe 'POST /projects/:id/remote_mirrors' do
let(:route) { "/projects/#{project.id}/remote_mirrors" }
shared_examples 'creates a remote mirror' do
it 'creates a remote mirror and returns response' do
project.add_maintainer(user)
post api(route, user), params: params
enabled = params.fetch(:enabled, false)
auth_method = params.fetch(:auth_method, 'password')
expect(response).to have_gitlab_http_status(:success)
expect(response).to match_response_schema('remote_mirror')
expect(json_response['enabled']).to eq(enabled)
expect(json_response['auth_method']).to eq(auth_method)
end
end
it 'requires `admin_remote_mirror` permission' do
post api(route, developer)
expect(response).to have_gitlab_http_status(:unauthorized)
end
context 'creates a remote mirror' do
context 'disabled by default' do
let(:params) { { url: 'https://foo:bar@test.com' } }
it_behaves_like 'creates a remote mirror'
end
context 'enabled' do
let(:params) { { url: 'https://foo:bar@test.com', enabled: true } }
it_behaves_like 'creates a remote mirror'
end
context 'auth method' do
let(:params) { { url: 'https://foo:bar@test.com', enabled: true, auth_method: 'ssh_public_key' } }
it_behaves_like 'creates a remote mirror'
end
end
it 'returns error if url is invalid' do
project.add_maintainer(user)
post api(route, user), params: {
url: 'ftp://foo:bar@test.com'
}
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['message']['url']).to match_array(
["is blocked: Only allowed schemes are http, https, ssh, git"]
)
end
context 'when auth method is invalid' do
let(:params) { { url: 'https://foo:bar@test.com', enabled: true, auth_method: 'invalid' } }
it 'returns an error' do
project.add_maintainer(user)
post api(route, user), params: params
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['error']).to eq('auth_method does not have a valid value')
end
end
context 'when only_protected_branches is not set' do
let(:params) { { url: 'https://foo:bar@test.com', enabled: true, only_protected_branches: nil } }
it 'returns an error' do
project.add_maintainer(user)
post api(route, user), params: params
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['message']['only_protected_branches']).to match_array(["can't be blank"])
end
end
end
describe 'PUT /projects/:id/remote_mirrors/:mirror_id' do
let(:route) { "/projects/#{project.id}/remote_mirrors/#{mirror.id}" }
let(:mirror) { project.remote_mirrors.first }
it 'requires `admin_remote_mirror` permission' do
put api(route, developer)
expect(response).to have_gitlab_http_status(:unauthorized)
end
it 'updates a remote mirror' do
project.add_maintainer(user)
put api(route, user), params: {
enabled: '0',
only_protected_branches: 'true',
keep_divergent_refs: 'true'
}
expect(response).to have_gitlab_http_status(:success)
expect(json_response['enabled']).to eq(false)
expect(json_response['only_protected_branches']).to eq(true)
expect(json_response['keep_divergent_refs']).to eq(true)
end
context 'when auth method is invalid' do
let(:params) { { enabled: true, auth_method: 'invalid' } }
it 'returns an error' do
project.add_maintainer(user)
put api(route, user), params: params
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['message']['auth_method']).to match_array(['is not included in the list'])
end
end
context 'when only_protected_branches is not set' do
let(:params) { { enabled: true, only_protected_branches: nil } }
it 'returns an error' do
project.add_maintainer(user)
put api(route, user), params: params
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response['message']['only_protected_branches']).to match_array(["can't be blank"])
end
end
end
describe 'DELETE /projects/:id/remote_mirrors/:mirror_id' do
let(:route) { ->(id) { "/projects/#{project.id}/remote_mirrors/#{id}" } }
let(:mirror) { project.remote_mirrors.first }
it 'requires `admin_remote_mirror` permission' do
expect { delete api(route[mirror.id], developer) }.not_to change { project.remote_mirrors.count }
expect(response).to have_gitlab_http_status(:unauthorized)
end
context 'when the user is a maintainer' do
before do
project.add_maintainer(user)
end
it 'returns 404 for non existing id' do
delete api(route[non_existing_record_id], user)
expect(response).to have_gitlab_http_status(:not_found)
end
it 'returns bad request if the destroy service fails' do
expect_next_instance_of(RemoteMirrors::DestroyService) do |service|
expect(service).to receive(:execute).and_return(ServiceResponse.error(message: 'error'))
end
expect { delete api(route[mirror.id], user) }.not_to change { project.remote_mirrors.count }
expect(response).to have_gitlab_http_status(:bad_request)
expect(json_response).to eq({ 'message' => 'error' })
end
it 'deletes a remote mirror' do
expect { delete api(route[mirror.id], user) }.to change { project.remote_mirrors.count }.from(1).to(0)
expect(response).to have_gitlab_http_status(:no_content)
end
end
end
describe 'GET /projects/:id/remote_mirrors/:mirror_id/public_key' do
let(:route) { "/projects/#{project.id}/remote_mirrors/#{mirror.id}/public_key" }
let(:mirror) { project.remote_mirrors.first }
it 'requires `admin_remote_mirror` permission' do
get api(route, developer)
expect(response).to have_gitlab_http_status(:unauthorized)
end
context 'when auth_method is not ssh_public_key' do
it 'returns 404 Not Found' do
project.add_maintainer(user)
get api(route, user)
expect(mirror.auth_method).not_to eq('ssh_public_key')
expect(response).to have_gitlab_http_status(:not_found)
end
end
context 'when auth_method is ssh_public_key' do
let(:mirror) do
project.remote_mirrors.create!(url: 'ssh://foo.com', enabled: true, auth_method: 'ssh_public_key')
end
it 'returns the remote mirror public key' do
project.add_maintainer(user)
get api(route, user)
expect(mirror.auth_method).to eq('ssh_public_key')
expect(response).to have_gitlab_http_status(:success)
expect(json_response['public_key']).to eq(mirror.ssh_public_key)
end
end
end
end