409 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			409 lines
		
	
	
		
			13 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| require 'spec_helper'
 | |
| 
 | |
| RSpec.describe Gitlab::ReferenceExtractor do
 | |
|   let_it_be(:project) { create(:project) }
 | |
| 
 | |
|   before do
 | |
|     project.add_developer(project.creator)
 | |
|   end
 | |
| 
 | |
|   subject { described_class.new(project, project.creator) }
 | |
| 
 | |
|   it 'accesses valid user objects' do
 | |
|     @u_foo = create(:user, username: 'foo')
 | |
|     @u_bar = create(:user, username: 'bar')
 | |
|     @u_offteam = create(:user, username: 'offteam')
 | |
| 
 | |
|     project.add_guest(@u_foo)
 | |
|     project.add_guest(@u_bar)
 | |
| 
 | |
|     subject.analyze('@foo, @baduser, @bar, and @offteam')
 | |
|     expect(subject.users).to match_array([@u_foo, @u_bar, @u_offteam])
 | |
|   end
 | |
| 
 | |
|   it 'ignores user mentions inside specific elements' do
 | |
|     @u_foo = create(:user, username: 'foo')
 | |
|     @u_bar = create(:user, username: 'bar')
 | |
|     @u_offteam = create(:user, username: 'offteam')
 | |
| 
 | |
|     project.add_reporter(@u_foo)
 | |
|     project.add_reporter(@u_bar)
 | |
| 
 | |
|     subject.analyze(%{
 | |
|       Inline code: `@foo`
 | |
| 
 | |
|       Code block:
 | |
| 
 | |
|       ```
 | |
|       @bar
 | |
|       ```
 | |
| 
 | |
|       Quote:
 | |
| 
 | |
|       > @offteam
 | |
|     })
 | |
| 
 | |
|     expect(subject.users).to match_array([])
 | |
|   end
 | |
| 
 | |
|   describe 'directly addressed users' do
 | |
|     before do
 | |
|       @u_foo  = create(:user, username: 'foo')
 | |
|       @u_foo2 = create(:user, username: 'foo2')
 | |
|       @u_foo3 = create(:user, username: 'foo3')
 | |
|       @u_foo4 = create(:user, username: 'foo4')
 | |
|       @u_foo5 = create(:user, username: 'foo5')
 | |
| 
 | |
|       @u_bar  = create(:user, username: 'bar')
 | |
|       @u_bar2 = create(:user, username: 'bar2')
 | |
|       @u_bar3 = create(:user, username: 'bar3')
 | |
|       @u_bar4 = create(:user, username: 'bar4')
 | |
| 
 | |
|       @u_tom  = create(:user, username: 'tom')
 | |
|       @u_tom2 = create(:user, username: 'tom2')
 | |
|     end
 | |
| 
 | |
|     context 'when a user is directly addressed' do
 | |
|       it 'accesses the user object which is mentioned in the beginning of the line' do
 | |
|         subject.analyze('@foo What do you think? cc: @bar, @tom')
 | |
| 
 | |
|         expect(subject.directly_addressed_users).to match_array([@u_foo])
 | |
|       end
 | |
| 
 | |
|       it "doesn't access the user object if it's not mentioned in the beginning of the line" do
 | |
|         subject.analyze('What do you think? cc: @bar')
 | |
| 
 | |
|         expect(subject.directly_addressed_users).to be_empty
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when multiple users are addressed' do
 | |
|       it 'accesses the user objects which are mentioned in the beginning of the line' do
 | |
|         subject.analyze('@foo @bar What do you think? cc: @tom')
 | |
| 
 | |
|         expect(subject.directly_addressed_users).to match_array([@u_foo, @u_bar])
 | |
|       end
 | |
| 
 | |
|       it "doesn't access the user objects if they are not mentioned in the beginning of the line" do
 | |
|         subject.analyze('What do you think? cc: @foo @bar @tom')
 | |
| 
 | |
|         expect(subject.directly_addressed_users).to be_empty
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when multiple users are addressed in different paragraphs' do
 | |
|       it 'accesses user objects which are mentioned in the beginning of each paragraph' do
 | |
|         subject.analyze <<-NOTE.strip_heredoc
 | |
|           @foo What do you think? cc: @tom
 | |
| 
 | |
|           - @bar can you please have a look?
 | |
| 
 | |
|           >>>
 | |
|           @foo2 what do you think? cc: @bar2
 | |
|           >>>
 | |
| 
 | |
|           @foo3 @foo4 thank you!
 | |
| 
 | |
|           > @foo5 well done!
 | |
| 
 | |
|           1. @bar3 Can you please check? cc: @tom2
 | |
|           2. @bar4 What do you this of this MR?
 | |
|         NOTE
 | |
| 
 | |
|         expect(subject.directly_addressed_users).to match_array([@u_foo, @u_foo3, @u_foo4])
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   it 'does not include anchors from table of contents in issue references' do
 | |
|     issue1 = create(:issue, project: project)
 | |
|     issue2 = create(:issue, project: project)
 | |
| 
 | |
|     subject.analyze("not real issue <h4>#{issue1.iid}</h4>, real issue #{issue2.to_reference}")
 | |
| 
 | |
|     expect(subject.issues).to match_array([issue2])
 | |
|   end
 | |
| 
 | |
|   it 'accesses valid issue objects' do
 | |
|     @i0 = create(:issue, project: project)
 | |
|     @i1 = create(:issue, project: project)
 | |
| 
 | |
|     subject.analyze("#{@i0.to_reference}, #{@i1.to_reference}, and #{Issue.reference_prefix}#{non_existing_record_iid}.")
 | |
| 
 | |
|     expect(subject.issues).to match_array([@i0, @i1])
 | |
|   end
 | |
| 
 | |
|   it 'accesses valid merge requests' do
 | |
|     @m0 = create(:merge_request, source_project: project, target_project: project, source_branch: 'markdown')
 | |
|     @m1 = create(:merge_request, source_project: project, target_project: project, source_branch: 'feature_conflict')
 | |
| 
 | |
|     subject.analyze("!#{non_existing_record_iid}, !#{@m1.iid}, and !#{@m0.iid}.")
 | |
| 
 | |
|     expect(subject.merge_requests).to match_array([@m1, @m0])
 | |
|   end
 | |
| 
 | |
|   it 'accesses valid labels' do
 | |
|     @l0 = create(:label, title: 'one', project: project)
 | |
|     @l1 = create(:label, title: 'two', project: project)
 | |
|     @l2 = create(:label)
 | |
| 
 | |
|     subject.analyze("~#{@l0.id}, ~#{non_existing_record_id}, ~#{@l2.id}, ~#{@l1.id}")
 | |
| 
 | |
|     expect(subject.labels).to match_array([@l0, @l1])
 | |
|   end
 | |
| 
 | |
|   it 'accesses valid snippets' do
 | |
|     @s0 = create(:project_snippet, project: project)
 | |
|     @s1 = create(:project_snippet, project: project)
 | |
|     @s2 = create(:project_snippet)
 | |
| 
 | |
|     subject.analyze("$#{@s0.id}, $#{non_existing_record_id}, $#{@s2.id}, $#{@s1.id}")
 | |
| 
 | |
|     expect(subject.snippets).to match_array([@s0, @s1])
 | |
|   end
 | |
| 
 | |
|   it 'accesses valid commits' do
 | |
|     project = create(:project, :repository) { |p| p.add_developer(p.creator) }
 | |
|     commit = project.commit('master')
 | |
| 
 | |
|     extractor = described_class.new(project, project.creator)
 | |
|     extractor.analyze("this references commits #{commit.sha[0..6]} and 012345")
 | |
|     extracted = extractor.commits
 | |
| 
 | |
|     expect(extracted.size).to eq(1)
 | |
|     expect(extracted[0].sha).to eq(commit.sha)
 | |
|     expect(extracted[0].message).to eq(commit.message)
 | |
|   end
 | |
| 
 | |
|   it 'accesses valid commit ranges' do
 | |
|     project = create(:project, :repository) { |p| p.add_developer(p.creator) }
 | |
|     commit = project.commit('master')
 | |
|     earlier_commit = project.commit('master~2')
 | |
| 
 | |
|     extractor = described_class.new(project, project.creator)
 | |
|     extractor.analyze("this references commits #{earlier_commit.sha[0..6]}...#{commit.sha[0..6]}")
 | |
|     extracted = extractor.commit_ranges
 | |
| 
 | |
|     expect(extracted.size).to eq(1)
 | |
|     expect(extracted.first).to be_kind_of(CommitRange)
 | |
|     expect(extracted.first.commit_from).to eq earlier_commit
 | |
|     expect(extracted.first.commit_to).to eq commit
 | |
|   end
 | |
| 
 | |
|   context 'with an external issue tracker' do
 | |
|     let_it_be(:project) { create(:project, :with_jira_integration) }
 | |
|     let(:issue)   { create(:issue, project: project) }
 | |
| 
 | |
|     context 'when GitLab issues are enabled' do
 | |
|       it 'returns both Jira and internal issues' do
 | |
|         subject.analyze("JIRA-123 and FOOBAR-4567 and #{issue.to_reference}")
 | |
|         expect(subject.issues).to eq [ExternalIssue.new('JIRA-123', project),
 | |
|                                       ExternalIssue.new('FOOBAR-4567', project),
 | |
|                                       issue]
 | |
|       end
 | |
| 
 | |
|       it 'returns only Jira issues if the internal one does not exist' do
 | |
|         subject.analyze("JIRA-123 and FOOBAR-4567 and ##{non_existing_record_iid}")
 | |
|         expect(subject.issues).to eq [ExternalIssue.new('JIRA-123', project),
 | |
|                                       ExternalIssue.new('FOOBAR-4567', project)]
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when GitLab issues are disabled' do
 | |
|       before do
 | |
|         project.issues_enabled = false
 | |
|         project.save!
 | |
|       end
 | |
| 
 | |
|       it 'returns only Jira issues' do
 | |
|         subject.analyze("JIRA-123 and FOOBAR-4567 and #{issue.to_reference}")
 | |
|         expect(subject.issues).to eq [ExternalIssue.new('JIRA-123', project),
 | |
|                                       ExternalIssue.new('FOOBAR-4567', project)]
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context 'with an inactive external issue tracker' do
 | |
|     let(:project) { create(:project) }
 | |
|     let!(:jira_integration) { create(:jira_integration, project: project, active: false) }
 | |
|     let(:issue)   { create(:issue, project: project) }
 | |
| 
 | |
|     context 'when GitLab issues are enabled' do
 | |
|       it 'returns only internal issue' do
 | |
|         subject.analyze("JIRA-123 and FOOBAR-4567 and #{issue.to_reference}")
 | |
|         expect(subject.issues).to eq([issue])
 | |
|       end
 | |
| 
 | |
|       it 'does not return any issue if the internal one does not exist' do
 | |
|         subject.analyze("JIRA-123 and FOOBAR-4567 and #999")
 | |
|         expect(subject.issues).to be_empty
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context 'with a project with an underscore' do
 | |
|     let(:other_project) { create(:project, path: 'test_project') }
 | |
|     let(:issue) { create(:issue, project: other_project) }
 | |
| 
 | |
|     before do
 | |
|       other_project.add_developer(project.creator)
 | |
|     end
 | |
| 
 | |
|     it 'handles project issue references' do
 | |
|       subject.analyze("this refers issue #{issue.to_reference(project)}")
 | |
| 
 | |
|       extracted = subject.issues
 | |
|       expect(extracted.size).to eq(1)
 | |
|       expect(extracted).to match_array([issue])
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#all' do
 | |
|     let(:issue) { create(:issue, project: project) }
 | |
|     let(:issue2) { create(:issue, project: project) }
 | |
|     let(:issue2_url) { Rails.application.routes.url_helpers.project_issue_url(project, issue2) }
 | |
|     let(:label) { create(:label, project: project) }
 | |
|     let(:alert) { create(:alert_management_alert, project: project) }
 | |
|     let(:text) { "Ref. #{issue.to_reference} and #{label.to_reference} and #{alert.to_reference} and #{issue2_url}" }
 | |
| 
 | |
|     before do
 | |
|       project.add_developer(project.creator)
 | |
|       subject.analyze(text)
 | |
|     end
 | |
| 
 | |
|     it 'returns all referables' do
 | |
|       expect(subject.all).to match_array([issue, label, alert, issue2])
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#alerts' do
 | |
|     let(:alert1) { create(:alert_management_alert, project: project) }
 | |
|     let(:alert2) { create(:alert_management_alert, project: project) }
 | |
|     let(:text) { "Alert ref: #{alert1.to_reference} URL: #{alert2.details_url} Infalid ref: ^alert#0" }
 | |
| 
 | |
|     before do
 | |
|       project.add_developer(project.creator)
 | |
|       subject.analyze(text)
 | |
|     end
 | |
| 
 | |
|     it 'returns alert referables' do
 | |
|       expect(subject.alerts).to match_array([alert1, alert2])
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '.references_pattern' do
 | |
|     subject { described_class.references_pattern }
 | |
| 
 | |
|     it { is_expected.to be_kind_of Regexp }
 | |
|   end
 | |
| 
 | |
|   describe 'referables prefixes' do
 | |
|     def prefixes
 | |
|       described_class.referrables.each_with_object({}) do |referable, result|
 | |
|         class_name = referable.to_s.camelize
 | |
|         klass = class_name.constantize if Object.const_defined?(class_name)
 | |
| 
 | |
|         next unless klass.respond_to?(:reference_prefix)
 | |
| 
 | |
|         prefix = klass.reference_prefix
 | |
|         result[prefix] ||= []
 | |
|         result[prefix] << referable
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     it 'returns all supported prefixes' do
 | |
|       expect(prefixes.keys.uniq).to include(*%w(@ # ~ % ! $ & [vulnerability:))
 | |
|     end
 | |
| 
 | |
|     it 'does not allow one prefix for multiple referables if not allowed specificly' do
 | |
|       # make sure you are not overriding existing prefix before changing this hash
 | |
|       multiple_allowed = {
 | |
|         '@' => 3
 | |
|       }
 | |
| 
 | |
|       prefixes.each do |prefix, referables|
 | |
|         expected_count = multiple_allowed[prefix] || 1
 | |
|         expect(referables.count).to eq(expected_count)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#references' do
 | |
|     let_it_be(:user) { create(:user) }
 | |
|     let_it_be(:issue) { create(:issue, project: project) }
 | |
| 
 | |
|     let(:text) { "Ref. #{issue.to_reference}" }
 | |
| 
 | |
|     subject { described_class.new(project, user) }
 | |
| 
 | |
|     before do
 | |
|       subject.analyze(text)
 | |
|     end
 | |
| 
 | |
|     context 'when references are visible' do
 | |
|       before do
 | |
|         project.add_developer(user)
 | |
|       end
 | |
| 
 | |
|       it 'returns visible references of given type' do
 | |
|         expect(subject.references(:issue)).to eq([issue])
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     it 'does not return any references' do
 | |
|       expect(subject.references(:issue)).to be_empty
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe '#all_visible?' do
 | |
|     let_it_be(:user) { create(:user) }
 | |
|     let_it_be(:project2) { create(:project) }
 | |
|     let_it_be(:issue) { create(:issue, project: project) }
 | |
|     let_it_be(:issue2) { create(:issue, project: project2) }
 | |
| 
 | |
|     let(:text) { "Ref. #{issue.to_reference} and #{issue2.to_reference(project)}" }
 | |
| 
 | |
|     subject { described_class.new(project, user) }
 | |
| 
 | |
|     before do
 | |
|       subject.analyze(text)
 | |
|     end
 | |
| 
 | |
|     it 'returns true if no references were parsed yet' do
 | |
|       expect(subject.all_visible?).to be_truthy
 | |
|     end
 | |
| 
 | |
|     context 'when references was already called' do
 | |
|       let(:membership) { [] }
 | |
| 
 | |
|       before do
 | |
|         membership.each { |p| p.add_developer(user) }
 | |
| 
 | |
|         subject.references(:issue)
 | |
|       end
 | |
| 
 | |
|       it 'returns false' do
 | |
|         expect(subject.all_visible?).to be_falsey
 | |
|       end
 | |
| 
 | |
|       context 'when user can access only some references' do
 | |
|         let(:membership) { [project] }
 | |
| 
 | |
|         it 'returns false' do
 | |
|           expect(subject.all_visible?).to be_falsey
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when user can access all references' do
 | |
|         let(:membership) { [project, project2] }
 | |
| 
 | |
|         it 'returns true' do
 | |
|           expect(subject.all_visible?).to be_truthy
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| end
 |