1980 lines
		
	
	
		
			61 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			1980 lines
		
	
	
		
			61 KiB
		
	
	
	
		
			Ruby
		
	
	
	
# frozen_string_literal: true
 | 
						|
 | 
						|
require 'spec_helper'
 | 
						|
 | 
						|
RSpec.describe Projects::IssuesController do
 | 
						|
  include ProjectForksHelper
 | 
						|
  include_context 'includes Spam constants'
 | 
						|
 | 
						|
  let_it_be(:project, reload: true) { create(:project) }
 | 
						|
  let_it_be(:user, reload: true) { create(:user) }
 | 
						|
 | 
						|
  let(:issue) { create(:issue, project: project) }
 | 
						|
  let(:spam_action_response_fields) { { 'stub_spam_action_response_fields' => true } }
 | 
						|
 | 
						|
  describe "GET #index" do
 | 
						|
    context 'external issue tracker' do
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
        create(:jira_integration, project: project)
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when GitLab issues disabled' do
 | 
						|
        it 'returns 404 status' do
 | 
						|
          project.issues_enabled = false
 | 
						|
          project.save!
 | 
						|
 | 
						|
          get :index, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when GitLab issues enabled' do
 | 
						|
        it 'renders the "index" template' do
 | 
						|
          get :index, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:ok)
 | 
						|
          expect(response).to render_template(:index)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when project has moved' do
 | 
						|
        let_it_be(:new_project) { create(:project) }
 | 
						|
        let_it_be(:issue) { create(:issue, project: new_project) }
 | 
						|
 | 
						|
        before do
 | 
						|
          project.route.destroy!
 | 
						|
          new_project.redirect_routes.create!(path: project.full_path)
 | 
						|
          new_project.add_developer(user)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'redirects to the new issue tracker from the old one' do
 | 
						|
          get :index, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
          expect(response).to redirect_to(project_issues_path(new_project))
 | 
						|
          expect(response).to have_gitlab_http_status(:moved_permanently)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'redirects from an old issue correctly' do
 | 
						|
          get :show, params: { namespace_id: project.namespace, project_id: project, id: issue }
 | 
						|
 | 
						|
          expect(response).to redirect_to(project_issue_path(new_project, issue))
 | 
						|
          expect(response).to have_gitlab_http_status(:moved_permanently)
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'internal issue tracker' do
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it_behaves_like "issuables list meta-data", :issue
 | 
						|
 | 
						|
      it_behaves_like 'set sort order from user preference' do
 | 
						|
        let(:sorting_param) { 'updated_asc' }
 | 
						|
      end
 | 
						|
 | 
						|
      it "returns index" do
 | 
						|
        get :index, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:ok)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns only list type issues' do
 | 
						|
        issue = create(:issue, project: project)
 | 
						|
        incident = create(:issue, project: project, issue_type: 'incident')
 | 
						|
        create(:issue, project: project, issue_type: 'test_case')
 | 
						|
 | 
						|
        get :index, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
        expect(assigns(:issues)).to contain_exactly(issue, incident)
 | 
						|
      end
 | 
						|
 | 
						|
      it "returns 301 if request path doesn't match project path" do
 | 
						|
        get :index, params: { namespace_id: project.namespace, project_id: project.path.upcase }
 | 
						|
 | 
						|
        expect(response).to redirect_to(project_issues_path(project))
 | 
						|
      end
 | 
						|
 | 
						|
      it "returns 404 when issues are disabled" do
 | 
						|
        project.issues_enabled = false
 | 
						|
        project.save!
 | 
						|
 | 
						|
        get :index, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
        expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    it_behaves_like 'paginated collection' do
 | 
						|
      let!(:issue_list) { create_list(:issue, 2, project: project) }
 | 
						|
      let(:collection) { project.issues }
 | 
						|
      let(:params) do
 | 
						|
        {
 | 
						|
          namespace_id: project.namespace.to_param,
 | 
						|
          project_id: project,
 | 
						|
          state: 'opened'
 | 
						|
        }
 | 
						|
      end
 | 
						|
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
        allow(Kaminari.config).to receive(:default_per_page).and_return(1)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'does not use pagination if disabled' do
 | 
						|
        allow(controller).to receive(:pagination_disabled?).and_return(true)
 | 
						|
 | 
						|
        get :index, params: params.merge(page: last_page + 1)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:ok)
 | 
						|
        expect(assigns(:issues).size).to eq(2)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with relative_position sorting' do
 | 
						|
      let!(:issue_list) { create_list(:issue, 2, project: project) }
 | 
						|
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
        allow(Kaminari.config).to receive(:default_per_page).and_return(1)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'overrides the number allowed on the page' do
 | 
						|
        get :index,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id:   project,
 | 
						|
            sort:         'relative_position'
 | 
						|
          }
 | 
						|
 | 
						|
        expect(assigns(:issues).count).to eq 2
 | 
						|
      end
 | 
						|
 | 
						|
      it 'allows the default number on the page' do
 | 
						|
        get :index,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id:   project
 | 
						|
          }
 | 
						|
 | 
						|
        expect(assigns(:issues).count).to eq 1
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'external authorization' do
 | 
						|
      before do
 | 
						|
        sign_in user
 | 
						|
        project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it_behaves_like 'unauthorized when external service denies access' do
 | 
						|
        subject { get :index, params: { namespace_id: project.namespace, project_id: project } }
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe "GET #show" do
 | 
						|
    before do
 | 
						|
      sign_in(user)
 | 
						|
      project.add_developer(user)
 | 
						|
    end
 | 
						|
 | 
						|
    it "returns issue_email_participants" do
 | 
						|
      participants = create_list(:issue_email_participant, 2, issue: issue)
 | 
						|
 | 
						|
      get :show, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }, format: :json
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(:ok)
 | 
						|
      expect(json_response['issue_email_participants']).to contain_exactly({ "email" => participants[0].email }, { "email" => participants[1].email })
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with the invite_members_in_comment experiment', :experiment do
 | 
						|
      context 'when user can invite' do
 | 
						|
        before do
 | 
						|
          stub_experiments(invite_members_in_comment: :invite_member_link)
 | 
						|
          project.add_maintainer(user)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'assigns the candidate experience and tracks the event' do
 | 
						|
          expect(experiment(:invite_members_in_comment)).to track(:view, property: project.root_ancestor.id.to_s)
 | 
						|
            .for(:invite_member_link)
 | 
						|
            .with_context(namespace: project.root_ancestor)
 | 
						|
            .on_next_instance
 | 
						|
 | 
						|
          get :show, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when user can not invite' do
 | 
						|
        it 'does not track the event' do
 | 
						|
          expect(experiment(:invite_members_in_comment)).not_to track(:view)
 | 
						|
 | 
						|
          get :show, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'GET #new' do
 | 
						|
    it 'redirects to signin if not logged in' do
 | 
						|
      get :new, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
      expect(flash[:alert]).to eq I18n.t('devise.failure.unauthenticated')
 | 
						|
      expect(response).to redirect_to(new_user_session_path)
 | 
						|
    end
 | 
						|
 | 
						|
    context 'internal issue tracker' do
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'builds a new issue', :aggregate_failures do
 | 
						|
        get :new, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
        expect(assigns(:issue)).to be_a_new(Issue)
 | 
						|
        expect(assigns(:issue).issue_type).to eq('issue')
 | 
						|
      end
 | 
						|
 | 
						|
      where(:conf_value, :conf_result) do
 | 
						|
        [
 | 
						|
          [true, true],
 | 
						|
          ['true', true],
 | 
						|
          ['TRUE', true],
 | 
						|
          [false, false],
 | 
						|
          ['false', false],
 | 
						|
          ['FALSE', false]
 | 
						|
        ]
 | 
						|
      end
 | 
						|
 | 
						|
      with_them do
 | 
						|
        it 'sets the confidential flag to the expected value' do
 | 
						|
          get :new, params: {
 | 
						|
            namespace_id: project.namespace,
 | 
						|
            project_id: project,
 | 
						|
            issue: {
 | 
						|
              confidential: conf_value
 | 
						|
            }
 | 
						|
          }
 | 
						|
 | 
						|
          assigned_issue = assigns(:issue)
 | 
						|
          expect(assigned_issue).to be_a_new(Issue)
 | 
						|
          expect(assigned_issue.confidential).to eq conf_result
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'setting issue type' do
 | 
						|
        let(:issue_type) { 'issue' }
 | 
						|
 | 
						|
        before do
 | 
						|
          get :new, params: { namespace_id: project.namespace, project_id: project, issue: { issue_type: issue_type } }
 | 
						|
        end
 | 
						|
 | 
						|
        subject { assigns(:issue).issue_type }
 | 
						|
 | 
						|
        it { is_expected.to eq('issue') }
 | 
						|
 | 
						|
        context 'incident issue' do
 | 
						|
          let(:issue_type) { 'incident' }
 | 
						|
 | 
						|
          it { is_expected.to eq(issue_type) }
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      it 'fills in an issue for a merge request' do
 | 
						|
        project_with_repository = create(:project, :repository)
 | 
						|
        project_with_repository.add_developer(user)
 | 
						|
        mr = create(:merge_request_with_diff_notes, source_project: project_with_repository)
 | 
						|
 | 
						|
        get :new, params: { namespace_id: project_with_repository.namespace, project_id: project_with_repository, merge_request_to_resolve_discussions_of: mr.iid }
 | 
						|
 | 
						|
        expect(assigns(:issue).title).not_to be_empty
 | 
						|
        expect(assigns(:issue).description).not_to be_empty
 | 
						|
      end
 | 
						|
 | 
						|
      it 'fills in an issue for a discussion' do
 | 
						|
        note = create(:note_on_merge_request, project: project)
 | 
						|
 | 
						|
        get :new, params: { namespace_id: project.namespace.path, project_id: project, merge_request_to_resolve_discussions_of: note.noteable.iid, discussion_to_resolve: note.discussion_id }
 | 
						|
 | 
						|
        expect(assigns(:issue).title).not_to be_empty
 | 
						|
        expect(assigns(:issue).description).not_to be_empty
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'external issue tracker' do
 | 
						|
      let!(:service) do
 | 
						|
        create(:custom_issue_tracker_integration, project: project, new_issue_url: 'http://test.com')
 | 
						|
      end
 | 
						|
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
 | 
						|
        external = double
 | 
						|
        allow(project).to receive(:external_issue_tracker).and_return(external)
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when GitLab issues disabled' do
 | 
						|
        it 'returns 404 status' do
 | 
						|
          project.issues_enabled = false
 | 
						|
          project.save!
 | 
						|
 | 
						|
          get :new, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when GitLab issues enabled' do
 | 
						|
        it 'renders the "new" template' do
 | 
						|
          get :new, params: { namespace_id: project.namespace, project_id: project }
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:ok)
 | 
						|
          expect(response).to render_template(:new)
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe '#related_branches' do
 | 
						|
    subject { get :related_branches, params: params, format: :json }
 | 
						|
 | 
						|
    before do
 | 
						|
      sign_in(user)
 | 
						|
      project.add_developer(developer)
 | 
						|
    end
 | 
						|
 | 
						|
    let_it_be(:issue) { create(:issue, project: project) }
 | 
						|
 | 
						|
    let(:developer) { user }
 | 
						|
    let(:params) do
 | 
						|
      {
 | 
						|
        namespace_id: project.namespace,
 | 
						|
        project_id: project,
 | 
						|
        id: issue.iid
 | 
						|
      }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'the current user cannot download code' do
 | 
						|
      it 'prevents access' do
 | 
						|
        allow(controller).to receive(:can?).with(any_args).and_return(true)
 | 
						|
        allow(controller).to receive(:can?).with(user, :download_code, project).and_return(false)
 | 
						|
 | 
						|
        subject
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'there are no related branches' do
 | 
						|
      it 'assigns empty arrays', :aggregate_failures do
 | 
						|
        subject
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:ok)
 | 
						|
        expect(assigns(:related_branches)).to be_empty
 | 
						|
        expect(response).to render_template('projects/issues/_related_branches')
 | 
						|
        expect(json_response).to eq('html' => '')
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'there are related branches' do
 | 
						|
      let(:missing_branch) { "#{issue.to_branch_name}-missing" }
 | 
						|
      let(:unreadable_branch) { "#{issue.to_branch_name}-unreadable" }
 | 
						|
      let(:pipeline) { build(:ci_pipeline, :success, project: project) }
 | 
						|
      let(:master_branch) { 'master' }
 | 
						|
 | 
						|
      let(:related_branches) do
 | 
						|
        [
 | 
						|
          branch_info(issue.to_branch_name, pipeline.detailed_status(user)),
 | 
						|
          branch_info(missing_branch, nil),
 | 
						|
          branch_info(unreadable_branch, nil)
 | 
						|
        ]
 | 
						|
      end
 | 
						|
 | 
						|
      def branch_info(name, status)
 | 
						|
        {
 | 
						|
          name: name,
 | 
						|
          link: controller.project_compare_path(project, from: master_branch, to: name),
 | 
						|
          pipeline_status: status
 | 
						|
        }
 | 
						|
      end
 | 
						|
 | 
						|
      before do
 | 
						|
        allow(controller).to receive(:find_routable!).and_return(project)
 | 
						|
        allow(project).to receive(:default_branch).and_return(master_branch)
 | 
						|
        allow_next_instance_of(Issues::RelatedBranchesService) do |service|
 | 
						|
          allow(service).to receive(:execute).and_return(related_branches)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      it 'finds and assigns the appropriate branch information', :aggregate_failures do
 | 
						|
        subject
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:ok)
 | 
						|
        expect(assigns(:related_branches)).to contain_exactly(
 | 
						|
          branch_info(issue.to_branch_name, an_instance_of(Gitlab::Ci::Status::Success)),
 | 
						|
          branch_info(missing_branch, be_nil),
 | 
						|
          branch_info(unreadable_branch, be_nil)
 | 
						|
        )
 | 
						|
        expect(response).to render_template('projects/issues/_related_branches')
 | 
						|
        expect(json_response).to match('html' => String)
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  # This spec runs as a request-style spec in order to invoke the
 | 
						|
  # Rails router. A controller-style spec matches the wrong route, and
 | 
						|
  # session['user_return_to'] becomes incorrect.
 | 
						|
  describe 'Redirect after sign in', type: :request do
 | 
						|
    before_all do
 | 
						|
      project.add_developer(user)
 | 
						|
    end
 | 
						|
 | 
						|
    before do
 | 
						|
      login_as(user)
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with a JSON request' do
 | 
						|
      it 'does not store the visited URL' do
 | 
						|
        get project_issue_path(project, issue, format: :json)
 | 
						|
 | 
						|
        expect(session['user_return_to']).to be_blank
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with an HTML request' do
 | 
						|
      it 'stores the visited URL' do
 | 
						|
        get project_issue_path(project, issue)
 | 
						|
 | 
						|
        expect(session['user_return_to']).to eq(project_issue_path(project, issue))
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'POST #move' do
 | 
						|
    before do
 | 
						|
      sign_in(user)
 | 
						|
      project.add_developer(user)
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when moving issue to another private project' do
 | 
						|
      let_it_be(:another_project) { create(:project, :private) }
 | 
						|
 | 
						|
      context 'when user has access to move issue' do
 | 
						|
        before do
 | 
						|
          another_project.add_reporter(user)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'moves issue to another project' do
 | 
						|
          move_issue
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status :ok
 | 
						|
          expect(another_project.issues).not_to be_empty
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when user does not have access to move issue' do
 | 
						|
        it 'responds with 404' do
 | 
						|
          move_issue
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status :not_found
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      def move_issue
 | 
						|
        post :move,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project,
 | 
						|
            id: issue.iid,
 | 
						|
            move_to_project_id: another_project.id
 | 
						|
          },
 | 
						|
          format: :json
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'PUT #reorder' do
 | 
						|
    let_it_be(:group)  { create(:group, projects: [project]) }
 | 
						|
    let_it_be(:issue1) { create(:issue, project: project, relative_position: 10) }
 | 
						|
    let_it_be(:issue2) { create(:issue, project: project, relative_position: 20) }
 | 
						|
    let_it_be(:issue3) { create(:issue, project: project, relative_position: 30) }
 | 
						|
 | 
						|
    before do
 | 
						|
      sign_in(user)
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when user has access' do
 | 
						|
      before do
 | 
						|
        project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      context 'with valid params' do
 | 
						|
        it 'reorders issues and returns a successful 200 response' do
 | 
						|
          reorder_issue(issue1,
 | 
						|
            move_after_id: issue2.id,
 | 
						|
            move_before_id: issue3.id,
 | 
						|
            group_full_path: group.full_path)
 | 
						|
 | 
						|
          [issue1, issue2, issue3].map(&:reload)
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:ok)
 | 
						|
          expect(issue1.relative_position)
 | 
						|
            .to be_between(issue2.relative_position, issue3.relative_position)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'with invalid params' do
 | 
						|
        it 'returns a unprocessable entity 422 response for invalid move ids' do
 | 
						|
          reorder_issue(issue1, move_after_id: 99, move_before_id: non_existing_record_id)
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:unprocessable_entity)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'returns a not found 404 response for invalid issue id' do
 | 
						|
          reorder_issue(object_double(issue1, iid: non_existing_record_iid),
 | 
						|
            move_after_id: issue2.id,
 | 
						|
            move_before_id: issue3.id)
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'returns a unprocessable entity 422 response for issues not in group' do
 | 
						|
          another_group = create(:group)
 | 
						|
 | 
						|
          reorder_issue(issue1,
 | 
						|
            move_after_id: issue2.id,
 | 
						|
            move_before_id: issue3.id,
 | 
						|
            group_full_path: another_group.full_path)
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:unprocessable_entity)
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'with unauthorized user' do
 | 
						|
      before do
 | 
						|
        project.add_guest(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'responds with 404' do
 | 
						|
        reorder_issue(issue1, move_after_id: issue2.id, move_before_id: issue3.id)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    def reorder_issue(issue, move_after_id: nil, move_before_id: nil, group_full_path: nil)
 | 
						|
      put :reorder,
 | 
						|
           params: {
 | 
						|
               namespace_id: project.namespace.to_param,
 | 
						|
               project_id: project,
 | 
						|
               id: issue.iid,
 | 
						|
               move_after_id: move_after_id,
 | 
						|
               move_before_id: move_before_id,
 | 
						|
               group_full_path: group_full_path
 | 
						|
           },
 | 
						|
           format: :json
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'PUT #update' do
 | 
						|
    let(:issue_params) { { title: 'New title' } }
 | 
						|
 | 
						|
    subject do
 | 
						|
      put :update,
 | 
						|
        params: {
 | 
						|
          namespace_id: project.namespace,
 | 
						|
          project_id: project,
 | 
						|
          id: issue.to_param,
 | 
						|
          issue: issue_params
 | 
						|
        },
 | 
						|
        format: :json
 | 
						|
    end
 | 
						|
 | 
						|
    before do
 | 
						|
      sign_in(user)
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when user has access to update issue' do
 | 
						|
      before do
 | 
						|
        project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
 | 
						|
        project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'updates the issue' do
 | 
						|
        subject
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:ok)
 | 
						|
        expect(issue.reload.title).to eq('New title')
 | 
						|
      end
 | 
						|
 | 
						|
      context 'with issue_type param' do
 | 
						|
        let(:issue_params) { { issue_type: 'incident' } }
 | 
						|
 | 
						|
        it 'permits the parameter' do
 | 
						|
          subject
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status(:ok)
 | 
						|
          expect(issue.reload.issue_type).to eql('incident')
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when the SpamVerdictService disallows' do
 | 
						|
        before do
 | 
						|
          stub_application_setting(recaptcha_enabled: true)
 | 
						|
          expect_next_instance_of(Spam::SpamVerdictService) do |verdict_service|
 | 
						|
            expect(verdict_service).to receive(:execute).and_return(CONDITIONAL_ALLOW)
 | 
						|
          end
 | 
						|
        end
 | 
						|
 | 
						|
        context 'when allow_possible_spam feature flag is false' do
 | 
						|
          before do
 | 
						|
            stub_feature_flags(allow_possible_spam: false)
 | 
						|
            expect(controller).to(receive(:spam_action_response_fields).with(issue)) do
 | 
						|
              spam_action_response_fields
 | 
						|
            end
 | 
						|
          end
 | 
						|
 | 
						|
          it 'renders json with spam_action_response_fields' do
 | 
						|
            subject
 | 
						|
 | 
						|
            expect(json_response).to eq(spam_action_response_fields)
 | 
						|
          end
 | 
						|
        end
 | 
						|
 | 
						|
        context 'when allow_possible_spam feature flag is true' do
 | 
						|
          it 'updates the issue' do
 | 
						|
            subject
 | 
						|
 | 
						|
            expect(response).to have_gitlab_http_status(:ok)
 | 
						|
            expect(issue.reload.title).to eq('New title')
 | 
						|
          end
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when user does not have access to update issue' do
 | 
						|
      before do
 | 
						|
        project.add_guest(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'responds with 404' do
 | 
						|
        subject
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'GET #realtime_changes' do
 | 
						|
    def go(id:)
 | 
						|
      get :realtime_changes,
 | 
						|
        params: {
 | 
						|
          namespace_id: project.namespace.to_param,
 | 
						|
          project_id: project,
 | 
						|
          id: id
 | 
						|
        }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when an issue was edited' do
 | 
						|
      before do
 | 
						|
        project.add_developer(user)
 | 
						|
 | 
						|
        issue.update!(last_edited_by: user, last_edited_at: issue.created_at + 1.minute)
 | 
						|
 | 
						|
        sign_in(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns last edited time' do
 | 
						|
        go(id: issue.iid)
 | 
						|
 | 
						|
        expect(json_response).to include('updated_at')
 | 
						|
        expect(json_response['updated_at']).to eq(issue.last_edited_at.to_time.iso8601)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when an issue was edited by a deleted user' do
 | 
						|
      let(:deleted_user) { create(:user) }
 | 
						|
 | 
						|
      before do
 | 
						|
        project.add_developer(user)
 | 
						|
 | 
						|
        issue.update!(last_edited_by: deleted_user, last_edited_at: Time.current)
 | 
						|
 | 
						|
        deleted_user.destroy!
 | 
						|
        sign_in(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns 200' do
 | 
						|
        go(id: issue.iid)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:ok)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when getting the changes' do
 | 
						|
      before do
 | 
						|
        project.add_developer(user)
 | 
						|
 | 
						|
        sign_in(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns the necessary data' do
 | 
						|
        go(id: issue.iid)
 | 
						|
 | 
						|
        expect(json_response).to include('title_text', 'description', 'description_text')
 | 
						|
        expect(json_response).to include('task_status', 'lock_version')
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'Confidential Issues' do
 | 
						|
    let_it_be(:project) { create(:project_empty_repo, :public) }
 | 
						|
    let_it_be(:assignee) { create(:assignee) }
 | 
						|
    let_it_be(:author) { create(:user) }
 | 
						|
    let_it_be(:non_member) { create(:user) }
 | 
						|
    let_it_be(:member) { create(:user) }
 | 
						|
    let_it_be(:admin) { create(:admin) }
 | 
						|
    let_it_be(:issue) { create(:issue, project: project) }
 | 
						|
    let_it_be(:unescaped_parameter_value) { create(:issue, :confidential, project: project, author: author) }
 | 
						|
    let_it_be(:request_forgery_timing_attack) { create(:issue, :confidential, project: project, assignees: [assignee]) }
 | 
						|
 | 
						|
    describe 'GET #index' do
 | 
						|
      it 'does not list confidential issues for guests' do
 | 
						|
        sign_out(:user)
 | 
						|
        get_issues
 | 
						|
 | 
						|
        expect(assigns(:issues)).to eq [issue]
 | 
						|
      end
 | 
						|
 | 
						|
      it 'does not list confidential issues for non project members' do
 | 
						|
        sign_in(non_member)
 | 
						|
        get_issues
 | 
						|
 | 
						|
        expect(assigns(:issues)).to eq [issue]
 | 
						|
      end
 | 
						|
 | 
						|
      it 'does not list confidential issues for project members with guest role' do
 | 
						|
        sign_in(member)
 | 
						|
        project.add_guest(member)
 | 
						|
 | 
						|
        get_issues
 | 
						|
 | 
						|
        expect(assigns(:issues)).to eq [issue]
 | 
						|
      end
 | 
						|
 | 
						|
      it 'lists confidential issues for author' do
 | 
						|
        sign_in(author)
 | 
						|
        get_issues
 | 
						|
 | 
						|
        expect(assigns(:issues)).to include unescaped_parameter_value
 | 
						|
        expect(assigns(:issues)).not_to include request_forgery_timing_attack
 | 
						|
      end
 | 
						|
 | 
						|
      it 'lists confidential issues for assignee' do
 | 
						|
        sign_in(assignee)
 | 
						|
        get_issues
 | 
						|
 | 
						|
        expect(assigns(:issues)).not_to include unescaped_parameter_value
 | 
						|
        expect(assigns(:issues)).to include request_forgery_timing_attack
 | 
						|
      end
 | 
						|
 | 
						|
      it 'lists confidential issues for project members' do
 | 
						|
        sign_in(member)
 | 
						|
        project.add_developer(member)
 | 
						|
 | 
						|
        get_issues
 | 
						|
 | 
						|
        expect(assigns(:issues)).to include unescaped_parameter_value
 | 
						|
        expect(assigns(:issues)).to include request_forgery_timing_attack
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when admin mode is enabled', :enable_admin_mode do
 | 
						|
        it 'lists confidential issues for admin' do
 | 
						|
          sign_in(admin)
 | 
						|
          get_issues
 | 
						|
 | 
						|
          expect(assigns(:issues)).to include unescaped_parameter_value
 | 
						|
          expect(assigns(:issues)).to include request_forgery_timing_attack
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when admin mode is disabled' do
 | 
						|
        it 'does not list confidential issues for admin' do
 | 
						|
          sign_in(admin)
 | 
						|
          get_issues
 | 
						|
 | 
						|
          expect(assigns(:issues)).to eq [issue]
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      def get_issues
 | 
						|
        get :index,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project
 | 
						|
          }
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    shared_examples_for 'restricted action' do |http_status|
 | 
						|
      it 'returns 404 for guests' do
 | 
						|
        sign_out(:user)
 | 
						|
        go(id: unescaped_parameter_value.to_param)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status :not_found
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns 404 for non project members' do
 | 
						|
        sign_in(non_member)
 | 
						|
        go(id: unescaped_parameter_value.to_param)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status :not_found
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns 404 for project members with guest role' do
 | 
						|
        sign_in(member)
 | 
						|
        project.add_guest(member)
 | 
						|
        go(id: unescaped_parameter_value.to_param)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status :not_found
 | 
						|
      end
 | 
						|
 | 
						|
      it "returns #{http_status[:success]} for author" do
 | 
						|
        sign_in(author)
 | 
						|
        go(id: unescaped_parameter_value.to_param)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status http_status[:success]
 | 
						|
      end
 | 
						|
 | 
						|
      it "returns #{http_status[:success]} for assignee" do
 | 
						|
        sign_in(assignee)
 | 
						|
        go(id: request_forgery_timing_attack.to_param)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status http_status[:success]
 | 
						|
      end
 | 
						|
 | 
						|
      it "returns #{http_status[:success]} for project members" do
 | 
						|
        sign_in(member)
 | 
						|
        project.add_developer(member)
 | 
						|
        go(id: unescaped_parameter_value.to_param)
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status http_status[:success]
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when admin mode is enabled', :enable_admin_mode do
 | 
						|
        it "returns #{http_status[:success]} for admin" do
 | 
						|
          sign_in(admin)
 | 
						|
          go(id: unescaped_parameter_value.to_param)
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status http_status[:success]
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when admin mode is disabled' do
 | 
						|
        xit 'returns 404 for admin' do
 | 
						|
          sign_in(admin)
 | 
						|
          go(id: unescaped_parameter_value.to_param)
 | 
						|
 | 
						|
          expect(response).to have_gitlab_http_status :not_found
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'PUT #update' do
 | 
						|
      def update_issue(issue_params: {}, additional_params: {}, id: nil)
 | 
						|
        id ||= issue.iid
 | 
						|
        params = {
 | 
						|
          namespace_id: project.namespace.to_param,
 | 
						|
          project_id: project,
 | 
						|
          id: id,
 | 
						|
          issue: { title: 'New title' }.merge(issue_params),
 | 
						|
          format: :json
 | 
						|
        }.merge(additional_params)
 | 
						|
 | 
						|
        put :update, params: params
 | 
						|
      end
 | 
						|
 | 
						|
      def go(id:)
 | 
						|
        update_issue(id: id)
 | 
						|
      end
 | 
						|
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it_behaves_like 'restricted action', success: 200
 | 
						|
      it_behaves_like 'update invalid issuable', Issue
 | 
						|
 | 
						|
      context 'changing the assignee' do
 | 
						|
        it 'limits the attributes exposed on the assignee' do
 | 
						|
          assignee = create(:user)
 | 
						|
          project.add_developer(assignee)
 | 
						|
 | 
						|
          update_issue(issue_params: { assignee_ids: [assignee.id] })
 | 
						|
 | 
						|
          expect(json_response['assignees'].first.keys)
 | 
						|
            .to include(*%w(id name username avatar_url state web_url))
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'Recaptcha is enabled' do
 | 
						|
        before do
 | 
						|
          project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
 | 
						|
          stub_application_setting(recaptcha_enabled: true)
 | 
						|
        end
 | 
						|
 | 
						|
        context 'when SpamVerdictService allows the issue' do
 | 
						|
          before do
 | 
						|
            expect_next_instance_of(Spam::SpamVerdictService) do |verdict_service|
 | 
						|
              expect(verdict_service).to receive(:execute).and_return(ALLOW)
 | 
						|
            end
 | 
						|
          end
 | 
						|
 | 
						|
          it 'normally updates the issue' do
 | 
						|
            expect { update_issue(issue_params: { title: 'Foo' }) }.to change { issue.reload.title }.to('Foo')
 | 
						|
          end
 | 
						|
        end
 | 
						|
 | 
						|
        context 'when an issue is identified as spam' do
 | 
						|
          context 'when recaptcha is not verified' do
 | 
						|
            before do
 | 
						|
              expect_next_instance_of(Spam::SpamVerdictService) do |verdict_service|
 | 
						|
                expect(verdict_service).to receive(:execute).and_return(CONDITIONAL_ALLOW)
 | 
						|
              end
 | 
						|
            end
 | 
						|
 | 
						|
            context 'when allow_possible_spam feature flag is false' do
 | 
						|
              before do
 | 
						|
                stub_feature_flags(allow_possible_spam: false)
 | 
						|
              end
 | 
						|
 | 
						|
              it 'rejects an issue recognized as spam' do
 | 
						|
                expect { update_issue }.not_to change { issue.reload.title }
 | 
						|
              end
 | 
						|
 | 
						|
              it 'rejects an issue recognized as a spam when reCAPTCHA disabled' do
 | 
						|
                stub_application_setting(recaptcha_enabled: false)
 | 
						|
 | 
						|
                expect { update_issue }.not_to change { issue.reload.title }
 | 
						|
              end
 | 
						|
 | 
						|
              it 'creates a spam log' do
 | 
						|
                expect { update_issue(issue_params: { title: 'Spam title' }) }
 | 
						|
                  .to log_spam(title: 'Spam title', noteable_type: 'Issue')
 | 
						|
              end
 | 
						|
 | 
						|
              context 'renders properly' do
 | 
						|
                render_views
 | 
						|
 | 
						|
                before do
 | 
						|
                  expect(controller).to(receive(:spam_action_response_fields).with(issue)) do
 | 
						|
                    spam_action_response_fields
 | 
						|
                  end
 | 
						|
                end
 | 
						|
 | 
						|
                it 'renders spam_action_response_fields json response' do
 | 
						|
                  update_issue
 | 
						|
 | 
						|
                  expect(response).to have_gitlab_http_status(:conflict)
 | 
						|
                  expect(json_response).to eq(spam_action_response_fields)
 | 
						|
                end
 | 
						|
              end
 | 
						|
            end
 | 
						|
 | 
						|
            context 'when allow_possible_spam feature flag is true' do
 | 
						|
              it 'updates the issue recognized as spam' do
 | 
						|
                expect { update_issue }.to change { issue.reload.title }
 | 
						|
              end
 | 
						|
 | 
						|
              it 'creates a spam log' do
 | 
						|
                expect { update_issue(issue_params: { title: 'Spam title' }) }
 | 
						|
                  .to log_spam(
 | 
						|
                    title: 'Spam title', description: issue.description,
 | 
						|
                    noteable_type: 'Issue', recaptcha_verified: false
 | 
						|
                  )
 | 
						|
              end
 | 
						|
 | 
						|
              it 'returns 200 status' do
 | 
						|
                update_issue
 | 
						|
 | 
						|
                expect(response).to have_gitlab_http_status(:ok)
 | 
						|
              end
 | 
						|
            end
 | 
						|
          end
 | 
						|
 | 
						|
          context 'when recaptcha is verified' do
 | 
						|
            let(:spammy_title) { 'Whatever' }
 | 
						|
            let!(:spam_logs) { create_list(:spam_log, 2, user: user, title: spammy_title) }
 | 
						|
 | 
						|
            before do
 | 
						|
              request.headers['X-GitLab-Captcha-Response'] = 'a-valid-captcha-response'
 | 
						|
              request.headers['X-GitLab-Spam-Log-Id'] = spam_logs.last.id
 | 
						|
            end
 | 
						|
 | 
						|
            def update_verified_issue
 | 
						|
              update_issue(issue_params: { title: spammy_title })
 | 
						|
            end
 | 
						|
 | 
						|
            it 'returns 200 status' do
 | 
						|
              expect(response).to have_gitlab_http_status(:ok)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'accepts an issue after reCAPTCHA is verified' do
 | 
						|
              expect { update_verified_issue }.to change { issue.reload.title }.to(spammy_title)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'marks spam log as recaptcha_verified' do
 | 
						|
              expect { update_verified_issue }.to change { SpamLog.last.recaptcha_verified }.from(false).to(true)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'does not mark spam log as recaptcha_verified when it does not belong to current_user' do
 | 
						|
              spam_log = create(:spam_log)
 | 
						|
              request.headers['X-GitLab-Spam-Log-Id'] = spam_log.id
 | 
						|
 | 
						|
              expect { update_issue }
 | 
						|
                .not_to change { SpamLog.last.recaptcha_verified }
 | 
						|
            end
 | 
						|
          end
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'GET #show' do
 | 
						|
      it_behaves_like 'restricted action', success: 200
 | 
						|
 | 
						|
      def go(id:)
 | 
						|
        get :show,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project,
 | 
						|
            id: id
 | 
						|
          }
 | 
						|
      end
 | 
						|
 | 
						|
      it 'avoids (most) N+1s loading labels', :request_store do
 | 
						|
        label = create(:label, project: project).to_reference
 | 
						|
        labels = create_list(:label, 10, project: project).map(&:to_reference)
 | 
						|
        issue = create(:issue, project: project, description: 'Test issue')
 | 
						|
 | 
						|
        control_count = ActiveRecord::QueryRecorder.new { issue.update!(description: [issue.description, label].join(' ')) }.count
 | 
						|
 | 
						|
        # Follow-up to get rid of this `2 * label.count` requirement: https://gitlab.com/gitlab-org/gitlab-foss/issues/52230
 | 
						|
        expect { issue.update!(description: [issue.description, labels].join(' ')) }
 | 
						|
          .not_to exceed_query_limit(control_count + 2 * labels.count)
 | 
						|
      end
 | 
						|
 | 
						|
      context 'real-time sidebar feature flag' do
 | 
						|
        using RSpec::Parameterized::TableSyntax
 | 
						|
 | 
						|
        let_it_be(:project) { create(:project, :public) }
 | 
						|
        let_it_be(:issue) { create(:issue, project: project) }
 | 
						|
 | 
						|
        where(:action_cable_in_app_enabled, :feature_flag_enabled, :gon_feature_flag) do
 | 
						|
          true  | true  | true
 | 
						|
          true  | false | true
 | 
						|
          false | true  | true
 | 
						|
          false | false | false
 | 
						|
        end
 | 
						|
 | 
						|
        with_them do
 | 
						|
          before do
 | 
						|
            expect(Gitlab::ActionCable::Config).to receive(:in_app?).and_return(action_cable_in_app_enabled)
 | 
						|
            stub_feature_flags(real_time_issue_sidebar: feature_flag_enabled)
 | 
						|
          end
 | 
						|
 | 
						|
          it 'broadcasts to the issues channel based on ActionCable and feature flag values' do
 | 
						|
            go(id: issue.to_param)
 | 
						|
 | 
						|
            expect(Gon.features).to include('realTimeIssueSidebar' => gon_feature_flag)
 | 
						|
          end
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      it 'logs the view with Gitlab::Search::RecentIssues' do
 | 
						|
        sign_in(user)
 | 
						|
        recent_issues_double = instance_double(::Gitlab::Search::RecentIssues, log_view: nil)
 | 
						|
        expect(::Gitlab::Search::RecentIssues).to receive(:new).with(user: user).and_return(recent_issues_double)
 | 
						|
 | 
						|
        go(id: issue.to_param)
 | 
						|
 | 
						|
        expect(response).to be_successful
 | 
						|
        expect(recent_issues_double).to have_received(:log_view).with(issue)
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when not logged in' do
 | 
						|
        it 'does not log the view with Gitlab::Search::RecentIssues' do
 | 
						|
          expect(::Gitlab::Search::RecentIssues).not_to receive(:new)
 | 
						|
 | 
						|
          go(id: issue.to_param)
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'GET #realtime_changes' do
 | 
						|
      it_behaves_like 'restricted action', success: 200
 | 
						|
 | 
						|
      def go(id:)
 | 
						|
        get :realtime_changes,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project,
 | 
						|
            id: id
 | 
						|
          }
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'GET #edit' do
 | 
						|
      it_behaves_like 'restricted action', success: 200
 | 
						|
 | 
						|
      def go(id:)
 | 
						|
        get :edit,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project,
 | 
						|
            id: id
 | 
						|
          }
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    describe 'PUT #update' do
 | 
						|
      it_behaves_like 'restricted action', success: 302
 | 
						|
 | 
						|
      def go(id:)
 | 
						|
        put :update,
 | 
						|
          params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project,
 | 
						|
            id: id,
 | 
						|
            issue: { title: 'New title' }
 | 
						|
          }
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'POST #create' do
 | 
						|
    def post_new_issue(issue_attrs = {}, additional_params = {})
 | 
						|
      sign_in(user)
 | 
						|
      project = create(:project, :public)
 | 
						|
      project.add_developer(user)
 | 
						|
 | 
						|
      post :create, params: {
 | 
						|
        namespace_id: project.namespace.to_param,
 | 
						|
        project_id: project,
 | 
						|
        issue: { title: 'Title', description: 'Description' }.merge(issue_attrs)
 | 
						|
      }.merge(additional_params)
 | 
						|
 | 
						|
      project.issues.first
 | 
						|
    end
 | 
						|
 | 
						|
    it 'creates the issue successfully', :aggregate_failures do
 | 
						|
      issue = post_new_issue
 | 
						|
 | 
						|
      expect(issue).to be_a(Issue)
 | 
						|
      expect(issue.persisted?).to eq(true)
 | 
						|
      expect(issue.issue_type).to eq('issue')
 | 
						|
    end
 | 
						|
 | 
						|
    context 'resolving discussions in MergeRequest' do
 | 
						|
      let_it_be(:discussion) { create(:diff_note_on_merge_request).to_discussion }
 | 
						|
 | 
						|
      let(:merge_request) { discussion.noteable }
 | 
						|
      let(:project) { merge_request.source_project }
 | 
						|
 | 
						|
      before do
 | 
						|
        project.add_maintainer(user)
 | 
						|
        sign_in user
 | 
						|
      end
 | 
						|
 | 
						|
      let(:merge_request_params) do
 | 
						|
        { merge_request_to_resolve_discussions_of: merge_request.iid }
 | 
						|
      end
 | 
						|
 | 
						|
      def post_issue(other_params: {}, **issue_params)
 | 
						|
        post :create, params: { namespace_id: project.namespace.to_param, project_id: project, issue: issue_params, merge_request_to_resolve_discussions_of: merge_request.iid }.merge(other_params)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'creates an issue for the project' do
 | 
						|
        expect { post_issue(title: 'Hello') }.to change { project.issues.reload.size }.by(1)
 | 
						|
      end
 | 
						|
 | 
						|
      it "doesn't overwrite given params" do
 | 
						|
        post_issue(description: 'Manually entered description')
 | 
						|
 | 
						|
        expect(assigns(:issue).description).to eq('Manually entered description')
 | 
						|
      end
 | 
						|
 | 
						|
      it 'resolves the discussion in the merge_request' do
 | 
						|
        post_issue(title: 'Hello')
 | 
						|
        discussion.first_note.reload
 | 
						|
 | 
						|
        expect(discussion.resolved?).to eq(true)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'sets a flash message' do
 | 
						|
        post_issue(title: 'Hello')
 | 
						|
 | 
						|
        expect(flash[:notice]).to eq(_('Resolved all discussions.'))
 | 
						|
      end
 | 
						|
 | 
						|
      describe "resolving a single discussion" do
 | 
						|
        before do
 | 
						|
          post_issue(title: 'Hello', other_params: { discussion_to_resolve: discussion.id })
 | 
						|
        end
 | 
						|
        it 'resolves a single discussion' do
 | 
						|
          discussion.first_note.reload
 | 
						|
 | 
						|
          expect(discussion.resolved?).to eq(true)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'sets a flash message that one discussion was resolved' do
 | 
						|
          expect(flash[:notice]).to eq(_('Resolved 1 discussion.'))
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'Recaptcha is enabled' do
 | 
						|
      before do
 | 
						|
        stub_application_setting(recaptcha_enabled: true)
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when SpamVerdictService allows the issue' do
 | 
						|
        before do
 | 
						|
          stub_feature_flags(allow_possible_spam: false)
 | 
						|
 | 
						|
          expect_next_instance_of(Spam::SpamVerdictService) do |verdict_service|
 | 
						|
            expect(verdict_service).to receive(:execute).and_return(ALLOW)
 | 
						|
          end
 | 
						|
        end
 | 
						|
 | 
						|
        it 'creates an issue' do
 | 
						|
          expect { post_new_issue(title: 'Some title') }.to change(Issue, :count)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when SpamVerdictService requires recaptcha' do
 | 
						|
        context 'when captcha is not verified' do
 | 
						|
          before do
 | 
						|
            expect_next_instance_of(Spam::SpamVerdictService) do |verdict_service|
 | 
						|
              expect(verdict_service).to receive(:execute).and_return(CONDITIONAL_ALLOW)
 | 
						|
            end
 | 
						|
          end
 | 
						|
 | 
						|
          def post_spam_issue
 | 
						|
            post_new_issue(title: 'Spam Title', description: 'Spam lives here')
 | 
						|
          end
 | 
						|
 | 
						|
          context 'when allow_possible_spam feature flag is false' do
 | 
						|
            before do
 | 
						|
              stub_feature_flags(allow_possible_spam: false)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'rejects an issue recognized as spam' do
 | 
						|
              expect { post_spam_issue }.not_to change(Issue, :count)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'creates a spam log' do
 | 
						|
              expect { post_spam_issue }
 | 
						|
                .to log_spam(title: 'Spam Title', noteable_type: 'Issue', recaptcha_verified: false)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'does not create an issue when it is not valid' do
 | 
						|
              expect { post_new_issue(title: '') }.not_to change(Issue, :count)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'does not create an issue when reCAPTCHA is not enabled' do
 | 
						|
              stub_application_setting(recaptcha_enabled: false)
 | 
						|
 | 
						|
              expect { post_spam_issue }.not_to change(Issue, :count)
 | 
						|
            end
 | 
						|
          end
 | 
						|
 | 
						|
          context 'when allow_possible_spam feature flag is true' do
 | 
						|
            it 'creates an issue recognized as spam' do
 | 
						|
              expect { post_spam_issue }.to change(Issue, :count)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'creates a spam log' do
 | 
						|
              expect { post_spam_issue }
 | 
						|
                .to log_spam(title: 'Spam Title', noteable_type: 'Issue', recaptcha_verified: false)
 | 
						|
            end
 | 
						|
 | 
						|
            it 'does not create an issue when it is not valid' do
 | 
						|
              expect { post_new_issue(title: '') }.not_to change(Issue, :count)
 | 
						|
            end
 | 
						|
          end
 | 
						|
        end
 | 
						|
 | 
						|
        context 'when Recaptcha is verified' do
 | 
						|
          let!(:spam_logs) { create_list(:spam_log, 2, user: user, title: 'Title') }
 | 
						|
          let!(:last_spam_log) { spam_logs.last }
 | 
						|
 | 
						|
          def post_verified_issue
 | 
						|
            post_new_issue({}, { spam_log_id: last_spam_log.id, 'g-recaptcha-response': 'abc123' } )
 | 
						|
          end
 | 
						|
 | 
						|
          before do
 | 
						|
            expect_next_instance_of(Captcha::CaptchaVerificationService) do |instance|
 | 
						|
              expect(instance).to receive(:execute) { true }
 | 
						|
            end
 | 
						|
          end
 | 
						|
 | 
						|
          it 'accepts an issue after reCAPTCHA is verified' do
 | 
						|
            expect { post_verified_issue }.to change(Issue, :count)
 | 
						|
          end
 | 
						|
 | 
						|
          it 'marks spam log as recaptcha_verified' do
 | 
						|
            expect { post_verified_issue }.to change { last_spam_log.reload.recaptcha_verified }.from(false).to(true)
 | 
						|
          end
 | 
						|
 | 
						|
          it 'does not mark spam log as recaptcha_verified when it does not belong to current_user' do
 | 
						|
            spam_log = create(:spam_log)
 | 
						|
 | 
						|
            expect { post_new_issue({}, { spam_log_id: spam_log.id, 'g-recaptcha-response': true } ) }
 | 
						|
              .not_to change { last_spam_log.recaptcha_verified }
 | 
						|
          end
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'user agent details are saved' do
 | 
						|
      before do
 | 
						|
        request.env['action_dispatch.remote_ip'] = '127.0.0.1'
 | 
						|
      end
 | 
						|
 | 
						|
      it 'creates a user agent detail' do
 | 
						|
        expect { post_new_issue }.to change(UserAgentDetail, :count).by(1)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when description has quick actions' do
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'can add spent time' do
 | 
						|
        issue = post_new_issue(description: '/spend 1h')
 | 
						|
 | 
						|
        expect(issue.total_time_spent).to eq(3600)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'can set the time estimate' do
 | 
						|
        issue = post_new_issue(description: '/estimate 2h')
 | 
						|
 | 
						|
        expect(issue.time_estimate).to eq(7200)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when created from sentry error' do
 | 
						|
      subject { post_new_issue(sentry_issue_attributes: { sentry_issue_identifier: 1234567 }) }
 | 
						|
 | 
						|
      it 'creates an issue' do
 | 
						|
        expect { subject }.to change(Issue, :count)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'creates a sentry issue' do
 | 
						|
        expect { subject }.to change(SentryIssue, :count)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when the endpoint receives requests above the limit' do
 | 
						|
      before do
 | 
						|
        stub_application_setting(issues_create_limit: 5)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'prevents from creating more issues', :request_store do
 | 
						|
        5.times { post_new_issue }
 | 
						|
 | 
						|
        expect { post_new_issue }
 | 
						|
          .to change { Gitlab::GitalyClient.get_request_count }.by(1) # creates 1 projects and 0 issues
 | 
						|
 | 
						|
        post_new_issue
 | 
						|
        expect(response.body).to eq(_('This endpoint has been requested too many times. Try again later.'))
 | 
						|
        expect(response).to have_gitlab_http_status(:too_many_requests)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'logs the event on auth.log' do
 | 
						|
        attributes = {
 | 
						|
          message: 'Application_Rate_Limiter_Request',
 | 
						|
          env: :issues_create_request_limit,
 | 
						|
          remote_ip: '0.0.0.0',
 | 
						|
          request_method: 'POST',
 | 
						|
          path: "/#{project.full_path}/-/issues",
 | 
						|
          user_id: user.id,
 | 
						|
          username: user.username
 | 
						|
        }
 | 
						|
 | 
						|
        expect(Gitlab::AuthLogger).to receive(:error).with(attributes).once
 | 
						|
 | 
						|
        project.add_developer(user)
 | 
						|
        sign_in(user)
 | 
						|
 | 
						|
        6.times do
 | 
						|
          post :create, params: {
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project,
 | 
						|
            issue: { title: 'Title', description: 'Description' }
 | 
						|
          }
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'setting issue type' do
 | 
						|
      let(:issue_type) { 'issue' }
 | 
						|
 | 
						|
      subject { post_new_issue(issue_type: issue_type)&.issue_type }
 | 
						|
 | 
						|
      it { is_expected.to eq('issue') }
 | 
						|
 | 
						|
      context 'incident issue' do
 | 
						|
        let(:issue_type) { 'incident' }
 | 
						|
 | 
						|
        it { is_expected.to eq(issue_type) }
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'POST #mark_as_spam' do
 | 
						|
    context 'properly submits to Akismet' do
 | 
						|
      before do
 | 
						|
        expect_next_instance_of(Spam::AkismetService) do |akismet_service|
 | 
						|
          expect(akismet_service).to receive_messages(submit_spam: true)
 | 
						|
        end
 | 
						|
        stub_application_setting(akismet_enabled: true)
 | 
						|
      end
 | 
						|
 | 
						|
      def post_spam
 | 
						|
        admin = create(:admin)
 | 
						|
        create(:user_agent_detail, subject: issue)
 | 
						|
        project.add_maintainer(admin)
 | 
						|
        sign_in(admin)
 | 
						|
        post :mark_as_spam, params: {
 | 
						|
          namespace_id: project.namespace,
 | 
						|
          project_id: project,
 | 
						|
          id: issue.iid
 | 
						|
        }
 | 
						|
      end
 | 
						|
 | 
						|
      it 'updates issue' do
 | 
						|
        post_spam
 | 
						|
        expect(issue.submittable_as_spam?).to be_falsey
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe "DELETE #destroy" do
 | 
						|
    context "when the user is a developer" do
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it "does not delete the issue, returning :not_found" do
 | 
						|
        delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context "when the user is owner" do
 | 
						|
      let_it_be(:owner)     { create(:user) }
 | 
						|
      let_it_be(:namespace) { create(:namespace, owner: owner) }
 | 
						|
      let_it_be(:project)   { create(:project, namespace: namespace) }
 | 
						|
 | 
						|
      before do
 | 
						|
        sign_in(owner)
 | 
						|
      end
 | 
						|
 | 
						|
      it "deletes the issue" do
 | 
						|
        delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid, destroy_confirm: true }
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:found)
 | 
						|
        expect(controller).to set_flash[:notice].to(/The issue was successfully deleted\./)
 | 
						|
      end
 | 
						|
 | 
						|
      it "prevents deletion if destroy_confirm is not set" do
 | 
						|
        expect(Gitlab::ErrorTracking).to receive(:track_exception).and_call_original
 | 
						|
 | 
						|
        delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:found)
 | 
						|
        expect(controller).to set_flash[:notice].to('Destroy confirmation not provided for issue')
 | 
						|
      end
 | 
						|
 | 
						|
      it "prevents deletion in JSON format if destroy_confirm is not set" do
 | 
						|
        expect(Gitlab::ErrorTracking).to receive(:track_exception).and_call_original
 | 
						|
 | 
						|
        delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid, format: 'json' }
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(:unprocessable_entity)
 | 
						|
        expect(json_response).to eq({ 'errors' => 'Destroy confirmation not provided for issue' })
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'POST #toggle_award_emoji' do
 | 
						|
    before do
 | 
						|
      sign_in(user)
 | 
						|
      project.add_developer(user)
 | 
						|
    end
 | 
						|
 | 
						|
    subject do
 | 
						|
      post(:toggle_award_emoji, params: {
 | 
						|
        namespace_id: project.namespace,
 | 
						|
        project_id: project,
 | 
						|
        id: issue.iid,
 | 
						|
        name: emoji_name
 | 
						|
      })
 | 
						|
    end
 | 
						|
 | 
						|
    let(:emoji_name) { 'thumbsup' }
 | 
						|
 | 
						|
    it "toggles the award emoji" do
 | 
						|
      expect do
 | 
						|
        subject
 | 
						|
      end.to change { issue.award_emoji.count }.by(1)
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(:ok)
 | 
						|
    end
 | 
						|
 | 
						|
    it "removes the already awarded emoji" do
 | 
						|
      create(:award_emoji, awardable: issue, name: emoji_name, user: user)
 | 
						|
 | 
						|
      expect { subject }.to change { AwardEmoji.count }.by(-1)
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(:ok)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'marks Todos on the Issue as done' do
 | 
						|
      todo = create(:todo, target: issue, project: project, user: user)
 | 
						|
 | 
						|
      subject
 | 
						|
 | 
						|
      expect(todo.reload).to be_done
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'POST create_merge_request' do
 | 
						|
    let(:target_project_id) { nil }
 | 
						|
 | 
						|
    let_it_be(:project) { create(:project, :repository, :public) }
 | 
						|
 | 
						|
    before do
 | 
						|
      project.add_developer(user)
 | 
						|
      sign_in(user)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'creates a new merge request' do
 | 
						|
      expect { create_merge_request }.to change(project.merge_requests, :count).by(1)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'render merge request as json' do
 | 
						|
      create_merge_request
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(:ok)
 | 
						|
      expect(response).to match_response_schema('merge_request')
 | 
						|
    end
 | 
						|
 | 
						|
    it 'is not available when the project is archived' do
 | 
						|
      project.update!(archived: true)
 | 
						|
 | 
						|
      create_merge_request
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'is not available for users who cannot create merge requests' do
 | 
						|
      sign_in(create(:user))
 | 
						|
 | 
						|
      create_merge_request
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(:not_found)
 | 
						|
    end
 | 
						|
 | 
						|
    context 'invalid branch name' do
 | 
						|
      it 'is unprocessable' do
 | 
						|
        post(
 | 
						|
          :create_merge_request,
 | 
						|
          params: {
 | 
						|
            target_project_id: nil,
 | 
						|
            branch_name: 'master',
 | 
						|
            ref: 'master',
 | 
						|
            namespace_id: project.namespace.to_param,
 | 
						|
            project_id: project.to_param,
 | 
						|
            id: issue.to_param
 | 
						|
          },
 | 
						|
          format: :json
 | 
						|
        )
 | 
						|
 | 
						|
        expect(response.body).to eq('Branch already exists')
 | 
						|
        expect(response).to have_gitlab_http_status(:unprocessable_entity)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'target_project_id is set' do
 | 
						|
      let(:target_project) { fork_project(project, user, repository: true) }
 | 
						|
      let(:target_project_id) { target_project.id }
 | 
						|
 | 
						|
      it 'creates a new merge request', :sidekiq_might_not_need_inline do
 | 
						|
        expect { create_merge_request }.to change(target_project.merge_requests, :count).by(1)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    def create_merge_request
 | 
						|
      post(
 | 
						|
        :create_merge_request,
 | 
						|
        params: {
 | 
						|
          namespace_id: project.namespace.to_param,
 | 
						|
          project_id: project.to_param,
 | 
						|
          id: issue.to_param,
 | 
						|
          target_project_id: target_project_id
 | 
						|
        },
 | 
						|
        format: :json
 | 
						|
      )
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'POST #import_csv' do
 | 
						|
    let_it_be(:project) { create(:project, :public) }
 | 
						|
 | 
						|
    let(:file) { fixture_file_upload('spec/fixtures/csv_comma.csv') }
 | 
						|
 | 
						|
    context 'unauthorized' do
 | 
						|
      it 'returns 404 for guests' do
 | 
						|
        sign_out(:user)
 | 
						|
 | 
						|
        import_csv
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status :not_found
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns 404 for project members with reporter role' do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_reporter(user)
 | 
						|
 | 
						|
        import_csv
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status :not_found
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'authorized' do
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
        project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it "returns 302 for project members with developer role" do
 | 
						|
        import_csv
 | 
						|
 | 
						|
        expect(flash[:notice]).to eq(_("Your issues are being imported. Once finished, you'll get a confirmation email."))
 | 
						|
        expect(response).to redirect_to(project_issues_path(project))
 | 
						|
      end
 | 
						|
 | 
						|
      it "shows error when upload fails" do
 | 
						|
        expect_next_instance_of(UploadService) do |upload_service|
 | 
						|
          expect(upload_service).to receive(:execute).and_return(nil)
 | 
						|
        end
 | 
						|
 | 
						|
        import_csv
 | 
						|
 | 
						|
        expect(flash[:alert]).to include(_('File upload error.'))
 | 
						|
        expect(response).to redirect_to(project_issues_path(project))
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    def import_csv
 | 
						|
      post :import_csv, params: { namespace_id: project.namespace.to_param,
 | 
						|
                                  project_id: project.to_param,
 | 
						|
                                  file: file }
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'POST export_csv' do
 | 
						|
    let(:viewer) { user }
 | 
						|
    let(:issue) { create(:issue, project: project) }
 | 
						|
 | 
						|
    before do
 | 
						|
      project.add_developer(user)
 | 
						|
    end
 | 
						|
 | 
						|
    def request_csv
 | 
						|
      post :export_csv, params: { namespace_id: project.namespace.to_param, project_id: project.to_param }
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when logged in' do
 | 
						|
      before do
 | 
						|
        sign_in(viewer)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'allows CSV export' do
 | 
						|
        expect(IssuableExportCsvWorker).to receive(:perform_async).with(:issue, viewer.id, project.id, anything)
 | 
						|
 | 
						|
        request_csv
 | 
						|
 | 
						|
        expect(response).to redirect_to(project_issues_path(project))
 | 
						|
        expect(controller).to set_flash[:notice].to match(/\AYour CSV export has started/i)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    context 'when not logged in' do
 | 
						|
      let(:empty_project) { create(:project_empty_repo, :public) }
 | 
						|
 | 
						|
      it 'redirects to the sign in page' do
 | 
						|
        request_csv
 | 
						|
 | 
						|
        expect(IssuableExportCsvWorker).not_to receive(:perform_async)
 | 
						|
        expect(response).to redirect_to(new_user_session_path)
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'GET service_desk' do
 | 
						|
    let_it_be(:project) { create(:project_empty_repo, :public) }
 | 
						|
    let_it_be(:support_bot) { User.support_bot }
 | 
						|
    let_it_be(:other_user) { create(:user) }
 | 
						|
    let_it_be(:service_desk_issue_1) { create(:issue, project: project, author: support_bot) }
 | 
						|
    let_it_be(:service_desk_issue_2) { create(:issue, project: project, author: support_bot, assignees: [other_user]) }
 | 
						|
    let_it_be(:other_user_issue) { create(:issue, project: project, author: other_user) }
 | 
						|
 | 
						|
    def get_service_desk(extra_params = {})
 | 
						|
      get :service_desk, params: extra_params.merge(namespace_id: project.namespace, project_id: project)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'adds an author filter for the support bot user' do
 | 
						|
      get_service_desk
 | 
						|
 | 
						|
      expect(assigns(:issues)).to contain_exactly(service_desk_issue_1, service_desk_issue_2)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'does not allow any other author to be set' do
 | 
						|
      get_service_desk(author_username: other_user.username)
 | 
						|
 | 
						|
      expect(assigns(:issues)).to contain_exactly(service_desk_issue_1, service_desk_issue_2)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'supports other filters' do
 | 
						|
      get_service_desk(assignee_username: other_user.username)
 | 
						|
 | 
						|
      expect(assigns(:issues)).to contain_exactly(service_desk_issue_2)
 | 
						|
    end
 | 
						|
 | 
						|
    it 'allows an assignee to be specified by id' do
 | 
						|
      get_service_desk(assignee_id: other_user.id)
 | 
						|
 | 
						|
      expect(assigns(:users)).to contain_exactly(other_user, support_bot)
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'GET #discussions' do
 | 
						|
    let!(:discussion) { create(:discussion_note_on_issue, noteable: issue, project: issue.project) }
 | 
						|
 | 
						|
    context 'when authenticated' do
 | 
						|
      before do
 | 
						|
        project.add_developer(user)
 | 
						|
        sign_in(user)
 | 
						|
      end
 | 
						|
 | 
						|
      context do
 | 
						|
        it_behaves_like 'discussions provider' do
 | 
						|
          let!(:author) { create(:user) }
 | 
						|
          let!(:project) { create(:project) }
 | 
						|
 | 
						|
          let!(:issue) { create(:issue, project: project, author: user) }
 | 
						|
 | 
						|
          let!(:note_on_issue1) { create(:discussion_note_on_issue, noteable: issue, project: issue.project, author: create(:user)) }
 | 
						|
          let!(:note_on_issue2) { create(:discussion_note_on_issue, noteable: issue, project: issue.project, author: create(:user)) }
 | 
						|
 | 
						|
          let(:requested_iid) { issue.iid }
 | 
						|
          let(:expected_discussion_count) { 3 }
 | 
						|
          let(:expected_discussion_ids) do
 | 
						|
            [
 | 
						|
              issue.notes.first.discussion_id,
 | 
						|
              note_on_issue1.discussion_id,
 | 
						|
              note_on_issue2.discussion_id
 | 
						|
            ]
 | 
						|
          end
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      it 'returns discussion json' do
 | 
						|
        get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
        expect(json_response.first.keys).to match_array(%w[id reply_id expanded notes diff_discussion discussion_path individual_note resolvable resolved resolved_at resolved_by resolved_by_push commit_id for_commit project_id confidential])
 | 
						|
      end
 | 
						|
 | 
						|
      it 'renders the author status html if there is a status' do
 | 
						|
        create(:user_status, user: discussion.author)
 | 
						|
 | 
						|
        get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
        note_json = json_response.first['notes'].first
 | 
						|
 | 
						|
        expect(note_json['author']['status_tooltip_html']).to be_present
 | 
						|
      end
 | 
						|
 | 
						|
      it 'does not cause an extra query for the status' do
 | 
						|
        control = ActiveRecord::QueryRecorder.new do
 | 
						|
          get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
        end
 | 
						|
 | 
						|
        create(:user_status, user: discussion.author)
 | 
						|
        second_discussion = create(:discussion_note_on_issue, noteable: issue, project: issue.project, author: create(:user))
 | 
						|
        create(:user_status, user: second_discussion.author)
 | 
						|
 | 
						|
        expect { get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } }
 | 
						|
          .not_to exceed_query_limit(control)
 | 
						|
      end
 | 
						|
 | 
						|
      context 'when user is setting notes filters' do
 | 
						|
        let(:issuable) { issue }
 | 
						|
        let(:issuable_parent) { project }
 | 
						|
        let!(:discussion_note) { create(:discussion_note_on_issue, :system, noteable: issuable, project: project) }
 | 
						|
 | 
						|
        it_behaves_like 'issuable notes filter'
 | 
						|
      end
 | 
						|
 | 
						|
      context 'with cross-reference system note', :request_store do
 | 
						|
        let_it_be(:new_issue) { create(:issue) }
 | 
						|
 | 
						|
        let(:cross_reference) { "mentioned in #{new_issue.to_reference(issue.project)}" }
 | 
						|
 | 
						|
        before do
 | 
						|
          create(:discussion_note_on_issue, :system, noteable: issue, project: issue.project, note: cross_reference)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'filters notes that the user should not see' do
 | 
						|
          get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
          expect(json_response.count).to eq(1)
 | 
						|
        end
 | 
						|
 | 
						|
        it 'does not result in N+1 queries' do
 | 
						|
          # Instantiate the controller variables to ensure QueryRecorder has an accurate base count
 | 
						|
          get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
          RequestStore.clear!
 | 
						|
 | 
						|
          control_count = ActiveRecord::QueryRecorder.new do
 | 
						|
            get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
          end.count
 | 
						|
 | 
						|
          RequestStore.clear!
 | 
						|
 | 
						|
          create_list(:discussion_note_on_issue, 2, :system, noteable: issue, project: issue.project, note: cross_reference)
 | 
						|
 | 
						|
          expect { get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } }.not_to exceed_query_limit(control_count)
 | 
						|
        end
 | 
						|
      end
 | 
						|
 | 
						|
      context 'private project' do
 | 
						|
        let!(:branch_note) { create(:discussion_note_on_issue, :system, noteable: issue, project: project) }
 | 
						|
        let!(:commit_note) { create(:discussion_note_on_issue, :system, noteable: issue, project: project) }
 | 
						|
        let!(:branch_note_meta) { create(:system_note_metadata, note: branch_note, action: "branch") }
 | 
						|
        let!(:commit_note_meta) { create(:system_note_metadata, note: commit_note, action: "commit") }
 | 
						|
 | 
						|
        context 'user is allowed access' do
 | 
						|
          before do
 | 
						|
            project.add_user(user, :maintainer)
 | 
						|
          end
 | 
						|
 | 
						|
          it 'displays all available notes' do
 | 
						|
            get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
            expect(json_response.length).to eq(3)
 | 
						|
          end
 | 
						|
        end
 | 
						|
 | 
						|
        context 'user is a guest' do
 | 
						|
          let(:json_response_note_ids) do
 | 
						|
            json_response.collect { |discussion| discussion["notes"] }.flatten
 | 
						|
              .collect { |note| note["id"].to_i }
 | 
						|
          end
 | 
						|
 | 
						|
          before do
 | 
						|
            project.add_guest(user)
 | 
						|
          end
 | 
						|
 | 
						|
          it 'does not display notes w/type listed in TYPES_RESTRICTED_BY_ACCESS_LEVEL' do
 | 
						|
            get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }
 | 
						|
 | 
						|
            expect(json_response.length).to eq(2)
 | 
						|
            expect(json_response_note_ids).not_to include(branch_note.id)
 | 
						|
          end
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe 'GET #designs' do
 | 
						|
    context 'when project has moved' do
 | 
						|
      let(:new_project) { create(:project) }
 | 
						|
      let(:issue) { create(:issue, project: new_project) }
 | 
						|
 | 
						|
      before do
 | 
						|
        sign_in(user)
 | 
						|
 | 
						|
        project.route.destroy!
 | 
						|
        new_project.redirect_routes.create!(path: project.full_path)
 | 
						|
        new_project.add_developer(user)
 | 
						|
      end
 | 
						|
 | 
						|
      it 'redirects from an old issue/designs correctly' do
 | 
						|
        get :designs,
 | 
						|
            params: {
 | 
						|
              namespace_id: project.namespace,
 | 
						|
              project_id: project,
 | 
						|
              id: issue
 | 
						|
            }
 | 
						|
 | 
						|
        expect(response).to redirect_to(designs_project_issue_path(new_project, issue))
 | 
						|
        expect(response).to have_gitlab_http_status(:moved_permanently)
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  context 'private project with token authentication' do
 | 
						|
    let_it_be(:private_project) { create(:project, :private) }
 | 
						|
 | 
						|
    it_behaves_like 'authenticates sessionless user', :index, :atom, ignore_incrementing: true do
 | 
						|
      before do
 | 
						|
        default_params.merge!(project_id: private_project, namespace_id: private_project.namespace)
 | 
						|
 | 
						|
        private_project.add_maintainer(user)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    it_behaves_like 'authenticates sessionless user', :calendar, :ics, ignore_incrementing: true do
 | 
						|
      before do
 | 
						|
        default_params.merge!(project_id: private_project, namespace_id: private_project.namespace)
 | 
						|
 | 
						|
        private_project.add_maintainer(user)
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  context 'public project with token authentication' do
 | 
						|
    let_it_be(:public_project) { create(:project, :public) }
 | 
						|
 | 
						|
    it_behaves_like 'authenticates sessionless user', :index, :atom, public: true do
 | 
						|
      before do
 | 
						|
        default_params.merge!(project_id: public_project, namespace_id: public_project.namespace)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    it_behaves_like 'authenticates sessionless user', :calendar, :ics, public: true do
 | 
						|
      before do
 | 
						|
        default_params.merge!(project_id: public_project, namespace_id: public_project.namespace)
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 |