2265 lines
		
	
	
		
			69 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			2265 lines
		
	
	
		
			69 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| require 'spec_helper'
 | |
| 
 | |
| RSpec.describe Projects::MergeRequestsController do
 | |
|   include ProjectForksHelper
 | |
|   include Gitlab::Routing
 | |
| 
 | |
|   let_it_be_with_refind(:project) { create(:project, :repository) }
 | |
|   let_it_be_with_reload(:project_public_with_private_builds) { create(:project, :repository, :public, :builds_private) }
 | |
| 
 | |
|   let(:user) { project.owner }
 | |
|   let(:merge_request) { create(:merge_request_with_diffs, target_project: project, source_project: merge_request_source_project, allow_collaboration: false) }
 | |
|   let(:merge_request_source_project) { project }
 | |
| 
 | |
|   before do
 | |
|     sign_in(user)
 | |
|   end
 | |
| 
 | |
|   describe 'GET commit_change_content' do
 | |
|     it 'renders commit_change_content template' do
 | |
|       get :commit_change_content,
 | |
|         params: {
 | |
|           namespace_id: project.namespace.to_param,
 | |
|           project_id: project,
 | |
|           id: merge_request.iid
 | |
|         },
 | |
|         format: 'html'
 | |
| 
 | |
|       expect(response).to render_template('_commit_change_content')
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "GET show" do
 | |
|     def go(extra_params = {})
 | |
|       params = {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       }
 | |
| 
 | |
|       get :show, params: params.merge(extra_params)
 | |
|     end
 | |
| 
 | |
|     context 'with the invite_members_in_comment experiment', :experiment do
 | |
|       context 'when user can invite' do
 | |
|         before do
 | |
|           stub_experiments(invite_members_in_comment: :invite_member_link)
 | |
|           project.add_maintainer(user)
 | |
|         end
 | |
| 
 | |
|         it 'assigns the candidate experience and tracks the event' do
 | |
|           expect(experiment(:invite_members_in_comment)).to track(:view, property: project.root_ancestor.id.to_s)
 | |
|             .for(:invite_member_link)
 | |
|             .with_context(namespace: project.root_ancestor)
 | |
|             .on_next_instance
 | |
| 
 | |
|           go
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when user can not invite' do
 | |
|         it 'does not track the event' do
 | |
|           expect(experiment(:invite_members_in_comment)).not_to track(:view)
 | |
| 
 | |
|           go
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'with view param' do
 | |
|       before do
 | |
|         go(view: 'parallel')
 | |
|       end
 | |
| 
 | |
|       it 'saves the preferred diff view in a cookie' do
 | |
|         expect(response.cookies['diff_view']).to eq('parallel')
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when merge request is unchecked' do
 | |
|       before do
 | |
|         merge_request.mark_as_unchecked!
 | |
|       end
 | |
| 
 | |
|       context 'check_mergeability_async_in_widget feature flag is disabled' do
 | |
|         before do
 | |
|           stub_feature_flags(check_mergeability_async_in_widget: false)
 | |
|         end
 | |
| 
 | |
|         it 'checks mergeability asynchronously' do
 | |
|           expect_next_instance_of(MergeRequests::MergeabilityCheckService) do |service|
 | |
|             expect(service).not_to receive(:execute)
 | |
|             expect(service).to receive(:async_execute)
 | |
|           end
 | |
| 
 | |
|           go
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     describe 'as html' do
 | |
|       context 'when diff files were cleaned' do
 | |
|         render_views
 | |
| 
 | |
|         it 'renders page when diff size is not persisted and diff_refs does not exist' do
 | |
|           diff = merge_request.merge_request_diff
 | |
| 
 | |
|           diff.clean!
 | |
|           diff.update!(real_size: nil,
 | |
|                        start_commit_sha: nil,
 | |
|                        base_commit_sha: nil)
 | |
| 
 | |
|           go(format: :html)
 | |
| 
 | |
|           expect(response).to be_successful
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'with `default_merge_ref_for_diffs` feature flag enabled' do
 | |
|         before do
 | |
|           stub_feature_flags(default_merge_ref_for_diffs: true)
 | |
|           go
 | |
|         end
 | |
| 
 | |
|         it 'adds the diff_head parameter' do
 | |
|           expect(assigns["endpoint_metadata_url"]).to eq(
 | |
|             diffs_metadata_project_json_merge_request_path(
 | |
|               project,
 | |
|               merge_request,
 | |
|               'json',
 | |
|               diff_head: true,
 | |
|               view: 'inline'))
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when diff is missing' do
 | |
|         render_views
 | |
| 
 | |
|         it 'renders merge request page' do
 | |
|           merge_request.merge_request_diff.destroy!
 | |
| 
 | |
|           go(format: :html)
 | |
| 
 | |
|           expect(response).to be_successful
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       it "renders merge request page" do
 | |
|         expect(::Gitlab::GitalyClient).to receive(:allow_ref_name_caching).and_call_original
 | |
| 
 | |
|         go(format: :html)
 | |
| 
 | |
|         expect(response).to be_successful
 | |
|       end
 | |
| 
 | |
|       it 'logs the view with Gitlab::Search::RecentMergeRequests' do
 | |
|         recent_merge_requests_double = instance_double(::Gitlab::Search::RecentMergeRequests, log_view: nil)
 | |
|         expect(::Gitlab::Search::RecentMergeRequests).to receive(:new).with(user: user).and_return(recent_merge_requests_double)
 | |
| 
 | |
|         go(format: :html)
 | |
| 
 | |
|         expect(response).to be_successful
 | |
|         expect(recent_merge_requests_double).to have_received(:log_view).with(merge_request)
 | |
|       end
 | |
| 
 | |
|       context "that is invalid" do
 | |
|         let(:merge_request) { create(:invalid_merge_request, target_project: project, source_project: project) }
 | |
| 
 | |
|         it "renders merge request page" do
 | |
|           go(format: :html)
 | |
| 
 | |
|           expect(response).to be_successful
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when project has moved' do
 | |
|         let(:new_project) { create(:project) }
 | |
| 
 | |
|         before do
 | |
|           project.route.destroy!
 | |
|           new_project.redirect_routes.create!(path: project.full_path)
 | |
|           new_project.add_developer(user)
 | |
|         end
 | |
| 
 | |
|         it 'redirects from an old merge request correctly' do
 | |
|           get :show,
 | |
|               params: {
 | |
|                 namespace_id: project.namespace,
 | |
|                 project_id: project,
 | |
|                 id: merge_request
 | |
|               }
 | |
| 
 | |
|           expect(response).to redirect_to(project_merge_request_path(new_project, merge_request))
 | |
|           expect(response).to have_gitlab_http_status(:moved_permanently)
 | |
|         end
 | |
| 
 | |
|         it 'redirects from an old merge request commits correctly' do
 | |
|           get :commits,
 | |
|               params: {
 | |
|                 namespace_id: project.namespace,
 | |
|                 project_id: project,
 | |
|                 id: merge_request
 | |
|               }
 | |
| 
 | |
|           expect(response).to redirect_to(commits_project_merge_request_path(new_project, merge_request))
 | |
|           expect(response).to have_gitlab_http_status(:moved_permanently)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when user is setting notes filters' do
 | |
|       let(:issuable) { merge_request }
 | |
|       let(:issuable_parent) { project }
 | |
|       let!(:discussion_note) { create(:discussion_note_on_merge_request, :system, noteable: issuable, project: project) }
 | |
|       let!(:discussion_comment) { create(:discussion_note_on_merge_request, noteable: issuable, project: project) }
 | |
| 
 | |
|       it_behaves_like 'issuable notes filter'
 | |
|     end
 | |
| 
 | |
|     describe 'as json' do
 | |
|       before do
 | |
|         expect(::Gitlab::GitalyClient).to receive(:allow_ref_name_caching).and_call_original
 | |
|       end
 | |
| 
 | |
|       context 'with basic serializer param' do
 | |
|         it 'renders basic MR entity as json' do
 | |
|           go(serializer: 'basic', format: :json)
 | |
| 
 | |
|           expect(response).to match_response_schema('entities/merge_request_basic')
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'with widget serializer param' do
 | |
|         it 'renders widget MR entity as json' do
 | |
|           go(serializer: 'widget', format: :json)
 | |
| 
 | |
|           expect(response).to match_response_schema('entities/merge_request_widget')
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when no serialiser was passed' do
 | |
|         it 'renders widget MR entity as json' do
 | |
|           go(serializer: nil, format: :json)
 | |
| 
 | |
|           expect(response).to match_response_schema('entities/merge_request_widget')
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context "that is invalid" do
 | |
|         let(:merge_request) { create(:invalid_merge_request, target_project: project, source_project: project) }
 | |
| 
 | |
|         it "renders merge request page" do
 | |
|           go(format: :json)
 | |
| 
 | |
|           expect(response).to be_successful
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     describe "as diff" do
 | |
|       it "triggers workhorse to serve the request" do
 | |
|         go(format: :diff)
 | |
| 
 | |
|         expect(response.headers[Gitlab::Workhorse::SEND_DATA_HEADER]).to start_with("git-diff:")
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     describe "as patch" do
 | |
|       it 'triggers workhorse to serve the request' do
 | |
|         go(format: :patch)
 | |
| 
 | |
|         expect(response.headers[Gitlab::Workhorse::SEND_DATA_HEADER]).to start_with("git-format-patch:")
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET index' do
 | |
|     let(:merge_request) { create(:merge_request_with_diffs, target_project: project, source_project: project) }
 | |
| 
 | |
|     def get_merge_requests(page = nil)
 | |
|       get :index,
 | |
|           params: {
 | |
|             namespace_id: project.namespace.to_param,
 | |
|             project_id: project,
 | |
|             state: 'opened',
 | |
|             page: page.to_param
 | |
|           }
 | |
|     end
 | |
| 
 | |
|     it_behaves_like "issuables list meta-data", :merge_request
 | |
| 
 | |
|     it_behaves_like 'set sort order from user preference' do
 | |
|       let(:sorting_param) { 'updated_asc' }
 | |
|     end
 | |
| 
 | |
|     context 'when page param' do
 | |
|       let(:last_page) { project.merge_requests.page.total_pages }
 | |
|       let!(:merge_request) { create(:merge_request_with_diffs, target_project: project, source_project: project) }
 | |
| 
 | |
|       it 'redirects to last_page if page number is larger than number of pages' do
 | |
|         get_merge_requests(last_page + 1)
 | |
| 
 | |
|         expect(response).to redirect_to(project_merge_requests_path(project, page: last_page, state: controller.params[:state], scope: controller.params[:scope]))
 | |
|       end
 | |
| 
 | |
|       it 'redirects to specified page' do
 | |
|         get_merge_requests(last_page)
 | |
| 
 | |
|         expect(assigns(:merge_requests).current_page).to eq(last_page)
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
| 
 | |
|       it 'does not redirect to external sites when provided a host field' do
 | |
|         external_host = "www.example.com"
 | |
|         get :index,
 | |
|           params: {
 | |
|             namespace_id: project.namespace.to_param,
 | |
|             project_id: project,
 | |
|             state: 'opened',
 | |
|             page: (last_page + 1).to_param,
 | |
|             host: external_host
 | |
|           }
 | |
| 
 | |
|         expect(response).to redirect_to(project_merge_requests_path(project, page: last_page, state: controller.params[:state], scope: controller.params[:scope]))
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when filtering by opened state' do
 | |
|       context 'with opened merge requests' do
 | |
|         it 'lists those merge requests' do
 | |
|           expect(merge_request).to be_persisted
 | |
| 
 | |
|           get_merge_requests
 | |
| 
 | |
|           expect(assigns(:merge_requests)).to include(merge_request)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'with reopened merge requests' do
 | |
|         before do
 | |
|           merge_request.close!
 | |
|           merge_request.reopen!
 | |
|         end
 | |
| 
 | |
|         it 'lists those merge requests' do
 | |
|           get_merge_requests
 | |
| 
 | |
|           expect(assigns(:merge_requests)).to include(merge_request)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     it_behaves_like 'issuable list with anonymous search disabled' do
 | |
|       let(:params) { { namespace_id: project.namespace, project_id: project } }
 | |
| 
 | |
|       before do
 | |
|         sign_out(user)
 | |
|         project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'PUT update' do
 | |
|     def update_merge_request(mr_params, additional_params = {})
 | |
|       params = {
 | |
|         namespace_id: project.namespace,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid,
 | |
|         merge_request: mr_params,
 | |
|         serializer: 'basic'
 | |
|       }.merge(additional_params)
 | |
| 
 | |
|       put :update, params: params
 | |
|     end
 | |
| 
 | |
|     context 'changing the assignee' do
 | |
|       it 'limits the attributes exposed on the assignee' do
 | |
|         assignee = create(:user)
 | |
|         project.add_developer(assignee)
 | |
| 
 | |
|         update_merge_request({ assignee_ids: [assignee.id] }, format: :json)
 | |
| 
 | |
|         expect(json_response['assignees']).to all(include(*%w(name username avatar_url id state web_url)))
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when user does not have access to update issue' do
 | |
|       before do
 | |
|         reporter = create(:user)
 | |
|         project.add_reporter(reporter)
 | |
|         sign_in(reporter)
 | |
|       end
 | |
| 
 | |
|       it 'responds with 404' do
 | |
|         update_merge_request(title: 'New title')
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:not_found)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'there is no source project' do
 | |
|       let(:forked_project) { fork_project_with_submodules(project) }
 | |
|       let!(:merge_request) { create(:merge_request, source_project: forked_project, source_branch: 'add-submodule-version-bump', target_branch: 'master', target_project: project) }
 | |
| 
 | |
|       before do
 | |
|         forked_project.destroy!
 | |
|       end
 | |
| 
 | |
|       it 'closes MR without errors' do
 | |
|         update_merge_request(state_event: 'close')
 | |
| 
 | |
|         expect(response).to redirect_to([merge_request.target_project, merge_request])
 | |
|         expect(merge_request.reload.closed?).to be_truthy
 | |
|       end
 | |
| 
 | |
|       it 'allows editing of a closed merge request' do
 | |
|         merge_request.close!
 | |
| 
 | |
|         update_merge_request(title: 'New title')
 | |
| 
 | |
|         expect(response).to redirect_to([merge_request.target_project, merge_request])
 | |
|         expect(merge_request.reload.title).to eq 'New title'
 | |
|       end
 | |
| 
 | |
|       it 'does not allow to update target branch closed merge request' do
 | |
|         merge_request.close!
 | |
| 
 | |
|         update_merge_request(target_branch: 'new_branch')
 | |
| 
 | |
|         expect { merge_request.reload.target_branch }.not_to change { merge_request.target_branch }
 | |
|       end
 | |
| 
 | |
|       it_behaves_like 'update invalid issuable', MergeRequest
 | |
|     end
 | |
| 
 | |
|     context 'two merge requests with the same source branch' do
 | |
|       it 'does not allow a closed merge request to be reopened if another one is open' do
 | |
|         merge_request.close!
 | |
|         create(:merge_request, source_project: merge_request.source_project, source_branch: merge_request.source_branch)
 | |
| 
 | |
|         update_merge_request(state_event: 'reopen')
 | |
| 
 | |
|         errors = assigns[:merge_request].errors
 | |
| 
 | |
|         expect(errors[:validate_branches]).to include(/Another open merge request already exists for this source branch/)
 | |
|         expect(merge_request.reload).to be_closed
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST merge' do
 | |
|     let(:base_params) do
 | |
|       {
 | |
|         namespace_id: project.namespace,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid,
 | |
|         squash: false,
 | |
|         format: 'json'
 | |
|       }
 | |
|     end
 | |
| 
 | |
|     context 'when user cannot access' do
 | |
|       let(:user) { create(:user) }
 | |
| 
 | |
|       before do
 | |
|         project.add_reporter(user)
 | |
|         post :merge, params: base_params, xhr: true
 | |
|       end
 | |
| 
 | |
|       it 'returns 404' do
 | |
|         expect(response).to have_gitlab_http_status(:not_found)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the merge request is not mergeable' do
 | |
|       before do
 | |
|         merge_request.update!(title: "WIP: #{merge_request.title}")
 | |
| 
 | |
|         post :merge, params: base_params
 | |
|       end
 | |
| 
 | |
|       it 'returns :failed' do
 | |
|         expect(json_response).to eq('status' => 'failed')
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the sha parameter does not match the source SHA' do
 | |
|       before do
 | |
|         post :merge, params: base_params.merge(sha: 'foo')
 | |
|       end
 | |
| 
 | |
|       it 'returns :sha_mismatch' do
 | |
|         expect(json_response).to eq('status' => 'sha_mismatch')
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the sha parameter matches the source SHA' do
 | |
|       def merge_with_sha(params = {})
 | |
|         post_params = base_params.merge(sha: merge_request.diff_head_sha).merge(params)
 | |
|         post :merge, params: post_params, as: :json
 | |
|       end
 | |
| 
 | |
|       it 'returns :success' do
 | |
|         merge_with_sha
 | |
| 
 | |
|         expect(json_response).to eq('status' => 'success')
 | |
|       end
 | |
| 
 | |
|       it 'starts the merge immediately with permitted params' do
 | |
|         allow(MergeWorker).to receive(:with_status).and_return(MergeWorker)
 | |
|         expect(MergeWorker).to receive(:perform_async).with(merge_request.id, anything, { 'sha' => merge_request.diff_head_sha })
 | |
| 
 | |
|         merge_with_sha
 | |
|       end
 | |
| 
 | |
|       context 'when squash is passed as 1' do
 | |
|         it 'updates the squash attribute on the MR to true' do
 | |
|           merge_request.update!(squash: false)
 | |
|           merge_with_sha(squash: '1')
 | |
| 
 | |
|           expect(merge_request.reload.squash_on_merge?).to be_truthy
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when squash is passed as 0' do
 | |
|         it 'updates the squash attribute on the MR to false' do
 | |
|           merge_request.update!(squash: true)
 | |
|           merge_with_sha(squash: '0')
 | |
| 
 | |
|           expect(merge_request.reload.squash_on_merge?).to be_falsey
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when a squash commit message is passed' do
 | |
|         let(:message) { 'My custom squash commit message' }
 | |
| 
 | |
|         it 'passes the same message to SquashService', :sidekiq_might_not_need_inline do
 | |
|           params = { squash: '1',
 | |
|                      squash_commit_message: message,
 | |
|                      sha: merge_request.diff_head_sha }
 | |
|           expected_squash_params = { squash_commit_message: message,
 | |
|                                      sha: merge_request.diff_head_sha,
 | |
|                                      merge_request: merge_request }
 | |
| 
 | |
|           expect_next_instance_of(MergeRequests::SquashService, project: project, current_user: user, params: expected_squash_params) do |squash_service|
 | |
|             expect(squash_service).to receive(:execute).and_return({
 | |
|               status: :success,
 | |
|               squash_sha: SecureRandom.hex(20)
 | |
|             })
 | |
|           end
 | |
| 
 | |
|           merge_with_sha(params)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when merge when pipeline succeeds option is passed' do
 | |
|         let!(:head_pipeline) do
 | |
|           create(:ci_empty_pipeline, project: project, sha: merge_request.diff_head_sha, ref: merge_request.source_branch, head_pipeline_of: merge_request)
 | |
|         end
 | |
| 
 | |
|         def merge_when_pipeline_succeeds
 | |
|           post :merge, params: base_params.merge(sha: merge_request.diff_head_sha, merge_when_pipeline_succeeds: '1')
 | |
|         end
 | |
| 
 | |
|         it 'returns :merge_when_pipeline_succeeds' do
 | |
|           merge_when_pipeline_succeeds
 | |
| 
 | |
|           expect(json_response).to eq('status' => 'merge_when_pipeline_succeeds')
 | |
|         end
 | |
| 
 | |
|         it 'sets the MR to merge when the pipeline succeeds' do
 | |
|           service = double(:merge_when_pipeline_succeeds_service)
 | |
|           allow(service).to receive(:available_for?) { true }
 | |
| 
 | |
|           expect(AutoMerge::MergeWhenPipelineSucceedsService)
 | |
|             .to receive(:new).with(project, anything, anything)
 | |
|             .and_return(service)
 | |
|           expect(service).to receive(:execute).with(merge_request)
 | |
| 
 | |
|           merge_when_pipeline_succeeds
 | |
|         end
 | |
| 
 | |
|         context 'when project.only_allow_merge_if_pipeline_succeeds? is true' do
 | |
|           before do
 | |
|             project.update_column(:only_allow_merge_if_pipeline_succeeds, true)
 | |
|           end
 | |
| 
 | |
|           context 'and head pipeline is not the current one' do
 | |
|             before do
 | |
|               head_pipeline.update!(sha: 'not_current_sha')
 | |
|             end
 | |
| 
 | |
|             it 'returns :failed' do
 | |
|               merge_when_pipeline_succeeds
 | |
| 
 | |
|               expect(json_response).to eq('status' => 'failed')
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           it 'returns :merge_when_pipeline_succeeds' do
 | |
|             merge_when_pipeline_succeeds
 | |
| 
 | |
|             expect(json_response).to eq('status' => 'merge_when_pipeline_succeeds')
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when auto merge has not been enabled yet' do
 | |
|           it 'calls AutoMergeService#execute' do
 | |
|             expect_next_instance_of(AutoMergeService) do |service|
 | |
|               expect(service).to receive(:execute).with(merge_request, 'merge_when_pipeline_succeeds')
 | |
|             end
 | |
| 
 | |
|             merge_when_pipeline_succeeds
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when auto merge has already been enabled' do
 | |
|           before do
 | |
|             merge_request.update!(auto_merge_enabled: true, merge_user: user)
 | |
|           end
 | |
| 
 | |
|           it 'calls AutoMergeService#update' do
 | |
|             expect_next_instance_of(AutoMergeService) do |service|
 | |
|               expect(service).to receive(:update).with(merge_request)
 | |
|             end
 | |
| 
 | |
|             merge_when_pipeline_succeeds
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       describe 'only_allow_merge_if_all_discussions_are_resolved? setting' do
 | |
|         let(:merge_request) { create(:merge_request_with_diff_notes, source_project: project, author: user) }
 | |
| 
 | |
|         context 'when enabled' do
 | |
|           before do
 | |
|             project.update_column(:only_allow_merge_if_all_discussions_are_resolved, true)
 | |
|           end
 | |
| 
 | |
|           context 'with unresolved discussion' do
 | |
|             before do
 | |
|               expect(merge_request).not_to be_discussions_resolved
 | |
|             end
 | |
| 
 | |
|             it 'returns :failed' do
 | |
|               merge_with_sha
 | |
| 
 | |
|               expect(json_response).to eq('status' => 'failed')
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           context 'with all discussions resolved' do
 | |
|             before do
 | |
|               merge_request.discussions.each { |d| d.resolve!(user) }
 | |
|               expect(merge_request).to be_discussions_resolved
 | |
|             end
 | |
| 
 | |
|             it 'returns :success' do
 | |
|               merge_with_sha
 | |
| 
 | |
|               expect(json_response).to eq('status' => 'success')
 | |
|             end
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when disabled' do
 | |
|           before do
 | |
|             project.update_column(:only_allow_merge_if_all_discussions_are_resolved, false)
 | |
|           end
 | |
| 
 | |
|           context 'with unresolved discussion' do
 | |
|             before do
 | |
|               expect(merge_request).not_to be_discussions_resolved
 | |
|             end
 | |
| 
 | |
|             it 'returns :success' do
 | |
|               merge_with_sha
 | |
| 
 | |
|               expect(json_response).to eq('status' => 'success')
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           context 'with all discussions resolved' do
 | |
|             before do
 | |
|               merge_request.discussions.each { |d| d.resolve!(user) }
 | |
|               expect(merge_request).to be_discussions_resolved
 | |
|             end
 | |
| 
 | |
|             it 'returns :success' do
 | |
|               merge_with_sha
 | |
| 
 | |
|               expect(json_response).to eq('status' => 'success')
 | |
|             end
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "DELETE destroy" do
 | |
|     let(:user) { create(:user) }
 | |
| 
 | |
|     it "denies access to users unless they're admin or project owner" do
 | |
|       delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid }
 | |
| 
 | |
|       expect(response).to have_gitlab_http_status(:not_found)
 | |
|     end
 | |
| 
 | |
|     context "when the user is owner" do
 | |
|       let_it_be(:owner)     { create(:user) }
 | |
|       let_it_be(:namespace) { create(:namespace, owner: owner) }
 | |
|       let_it_be(:project)   { create(:project, :repository, namespace: namespace) }
 | |
| 
 | |
|       before do
 | |
|         sign_in owner
 | |
|       end
 | |
| 
 | |
|       it "deletes the merge request" do
 | |
|         delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid, destroy_confirm: true }
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:found)
 | |
|         expect(controller).to set_flash[:notice].to(/The merge request was successfully deleted\./)
 | |
|       end
 | |
| 
 | |
|       it "prevents deletion if destroy_confirm is not set" do
 | |
|         expect(Gitlab::ErrorTracking).to receive(:track_exception).and_call_original
 | |
| 
 | |
|         delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid }
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:found)
 | |
|         expect(controller).to set_flash[:notice].to('Destroy confirmation not provided for merge request')
 | |
|       end
 | |
| 
 | |
|       it "prevents deletion in JSON format if destroy_confirm is not set" do
 | |
|         expect(Gitlab::ErrorTracking).to receive(:track_exception).and_call_original
 | |
| 
 | |
|         delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid, format: 'json' }
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:unprocessable_entity)
 | |
|         expect(json_response).to eq({ 'errors' => 'Destroy confirmation not provided for merge request' })
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET commits' do
 | |
|     def go(format: 'html')
 | |
|       get :commits,
 | |
|           params: {
 | |
|             namespace_id: project.namespace.to_param,
 | |
|             project_id: project,
 | |
|             id: merge_request.iid
 | |
|           },
 | |
|           format: format
 | |
|     end
 | |
| 
 | |
|     it 'renders the commits template to a string' do
 | |
|       go format: 'json'
 | |
| 
 | |
|       expect(response).to render_template('projects/merge_requests/_commits')
 | |
|       expect(json_response).to have_key('html')
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET pipelines' do
 | |
|     before do
 | |
|       create(:ci_pipeline, project: merge_request.source_project,
 | |
|                            ref: merge_request.source_branch,
 | |
|                            sha: merge_request.diff_head_sha)
 | |
| 
 | |
|       get :pipelines,
 | |
|           params: {
 | |
|             namespace_id: project.namespace.to_param,
 | |
|             project_id: project,
 | |
|             id: merge_request.iid
 | |
|           },
 | |
|           format: :json
 | |
|     end
 | |
| 
 | |
|     context 'with "enabled" builds on a public project' do
 | |
|       let(:project) { create(:project, :repository, :public) }
 | |
| 
 | |
|       context 'for a project owner' do
 | |
|         it 'responds with serialized pipelines' do
 | |
|           expect(json_response['pipelines']).to be_present
 | |
|           expect(json_response['count']['all']).to eq(1)
 | |
|           expect(response).to include_pagination_headers
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'for an unassociated user' do
 | |
|         let(:user) { create :user }
 | |
| 
 | |
|         it 'responds with no pipelines' do
 | |
|           expect(json_response['pipelines']).to be_present
 | |
|           expect(json_response['count']['all']).to eq(1)
 | |
|           expect(response).to include_pagination_headers
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'with private builds on a public project' do
 | |
|       let(:project) { project_public_with_private_builds }
 | |
| 
 | |
|       context 'for a project owner' do
 | |
|         it 'responds with serialized pipelines' do
 | |
|           expect(json_response['pipelines']).to be_present
 | |
|           expect(json_response['count']['all']).to eq(1)
 | |
|           expect(response).to include_pagination_headers
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'for an unassociated user' do
 | |
|         let(:user) { create :user }
 | |
| 
 | |
|         it 'responds with no pipelines' do
 | |
|           expect(json_response['pipelines']).to be_empty
 | |
|           expect(json_response['count']['all']).to eq(0)
 | |
|           expect(response).to include_pagination_headers
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'from a project fork' do
 | |
|         let(:fork_user)      { create :user }
 | |
|         let(:forked_project) { fork_project(project, fork_user, repository: true) } # Forked project carries over :builds_private
 | |
|         let(:merge_request)  { create(:merge_request_with_diffs, target_project: project, source_project: forked_project) }
 | |
| 
 | |
|         context 'with private builds' do
 | |
|           context 'for the target project member' do
 | |
|             it 'does not respond with serialized pipelines', :sidekiq_might_not_need_inline do
 | |
|               expect(json_response['pipelines']).to be_empty
 | |
|               expect(json_response['count']['all']).to eq(0)
 | |
|               expect(response).to include_pagination_headers
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           context 'for the source project member' do
 | |
|             let(:user) { fork_user }
 | |
| 
 | |
|             it 'responds with serialized pipelines', :sidekiq_might_not_need_inline do
 | |
|               expect(json_response['pipelines']).to be_present
 | |
|               expect(json_response['count']['all']).to eq(1)
 | |
|               expect(response).to include_pagination_headers
 | |
|             end
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'with public builds' do
 | |
|           let(:forked_project) do
 | |
|             fork_project(project, fork_user, repository: true).tap do |new_project|
 | |
|               new_project.project_feature.update!(builds_access_level: ProjectFeature::ENABLED)
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           context 'for the target project member' do
 | |
|             it 'does not respond with serialized pipelines', :sidekiq_might_not_need_inline do
 | |
|               expect(json_response['pipelines']).to be_present
 | |
|               expect(json_response['count']['all']).to eq(1)
 | |
|               expect(response).to include_pagination_headers
 | |
|             end
 | |
|           end
 | |
| 
 | |
|           context 'for the source project member' do
 | |
|             let(:user) { fork_user }
 | |
| 
 | |
|             it 'responds with serialized pipelines', :sidekiq_might_not_need_inline do
 | |
|               expect(json_response['pipelines']).to be_present
 | |
|               expect(json_response['count']['all']).to eq(1)
 | |
|               expect(response).to include_pagination_headers
 | |
|             end
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'with pagination' do
 | |
|       before do
 | |
|         create(:ci_pipeline, project: merge_request.source_project, ref: merge_request.source_branch, sha: merge_request.diff_head_sha)
 | |
|       end
 | |
| 
 | |
|       it 'paginates the result' do
 | |
|         allow(Ci::Pipeline).to receive(:default_per_page).and_return(1)
 | |
| 
 | |
|         get :pipelines, params: { namespace_id: project.namespace.to_param, project_id: project, id: merge_request.iid }, format: :json
 | |
| 
 | |
|         expect(json_response['pipelines'].count).to eq(1)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET context commits' do
 | |
|     it 'returns the commits for context commits' do
 | |
|       get :context_commits,
 | |
|         params: {
 | |
|           namespace_id: project.namespace.to_param,
 | |
|           project_id: project,
 | |
|           id: merge_request.iid
 | |
|         },
 | |
|         format: 'json'
 | |
| 
 | |
|       expect(response).to have_gitlab_http_status(:success)
 | |
|       expect(json_response).to be_an Array
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET exposed_artifacts' do
 | |
|     let_it_be(:merge_request) do
 | |
|       create(:merge_request,
 | |
|         :with_merge_request_pipeline,
 | |
|         target_project: project,
 | |
|         source_project: project)
 | |
|     end
 | |
| 
 | |
|     let(:pipeline) do
 | |
|       create(:ci_pipeline,
 | |
|         :success,
 | |
|         project: merge_request.source_project,
 | |
|         ref: merge_request.source_branch,
 | |
|         sha: merge_request.diff_head_sha)
 | |
|     end
 | |
| 
 | |
|     let!(:job) { create(:ci_build, pipeline: pipeline, options: job_options) }
 | |
|     let!(:job_metadata) { create(:ci_job_artifact, :metadata, job: job) }
 | |
| 
 | |
|     before do
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:find_exposed_artifacts)
 | |
|         .and_return(report)
 | |
| 
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:actual_head_pipeline)
 | |
|         .and_return(pipeline)
 | |
|     end
 | |
| 
 | |
|     subject do
 | |
|       get :exposed_artifacts, params: {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       },
 | |
|       format: :json
 | |
|     end
 | |
| 
 | |
|     describe 'permissions on a public project with private CI/CD' do
 | |
|       let(:project) { create :project, :repository, :public, :builds_private }
 | |
|       let(:report) { { status: :parsed, data: [] } }
 | |
|       let(:job_options) { {} }
 | |
| 
 | |
|       context 'while signed out' do
 | |
|         before do
 | |
|           sign_out(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'while signed in as an unrelated user' do
 | |
|         before do
 | |
|           sign_in(create(:user))
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline has jobs with exposed artifacts' do
 | |
|       let(:job_options) do
 | |
|         {
 | |
|           artifacts: {
 | |
|             paths: ['ci_artifacts.txt'],
 | |
|             expose_as: 'Exposed artifact'
 | |
|           }
 | |
|         }
 | |
|       end
 | |
| 
 | |
|       context 'when fetching exposed artifacts is in progress' do
 | |
|         let(:report) { { status: :parsing } }
 | |
| 
 | |
|         it 'sends polling interval' do
 | |
|           expect(Gitlab::PollingInterval).to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 204 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:no_content)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when fetching exposed artifacts is completed' do
 | |
|         let(:data) do
 | |
|           Ci::GenerateExposedArtifactsReportService.new(project, user)
 | |
|             .execute(nil, pipeline)
 | |
|         end
 | |
| 
 | |
|         let(:report) { { status: :parsed, data: data } }
 | |
| 
 | |
|         it 'returns exposed artifacts' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response['status']).to eq('parsed')
 | |
|           expect(json_response['data']).to eq([{
 | |
|             'job_name' => 'test',
 | |
|             'job_path' => project_job_path(project, job),
 | |
|             'url' => file_project_job_artifacts_path(project, job, 'ci_artifacts.txt'),
 | |
|             'text' => 'Exposed artifact'
 | |
|           }])
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline does not have jobs with exposed artifacts' do
 | |
|       let(:report) { double }
 | |
|       let(:job_options) do
 | |
|         {
 | |
|           artifacts: {
 | |
|             paths: ['ci_artifacts.txt']
 | |
|           }
 | |
|         }
 | |
|       end
 | |
| 
 | |
|       it 'returns no content' do
 | |
|         subject
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:no_content)
 | |
|         expect(response.body).to be_empty
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET coverage_reports' do
 | |
|     let_it_be(:merge_request) do
 | |
|       create(:merge_request,
 | |
|         :with_merge_request_pipeline,
 | |
|         target_project: project,
 | |
|         source_project: project)
 | |
|     end
 | |
| 
 | |
|     let(:pipeline) do
 | |
|       create(:ci_pipeline,
 | |
|         :success,
 | |
|         project: merge_request.source_project,
 | |
|         ref: merge_request.source_branch,
 | |
|         sha: merge_request.diff_head_sha)
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:find_coverage_reports)
 | |
|         .and_return(report)
 | |
| 
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:actual_head_pipeline)
 | |
|         .and_return(pipeline)
 | |
|     end
 | |
| 
 | |
|     subject do
 | |
|       get :coverage_reports, params: {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       },
 | |
|       format: :json
 | |
|     end
 | |
| 
 | |
|     describe 'permissions on a public project with private CI/CD' do
 | |
|       let(:project) { create :project, :repository, :public, :builds_private }
 | |
|       let(:report) { { status: :parsed, data: [] } }
 | |
| 
 | |
|       context 'while signed out' do
 | |
|         before do
 | |
|           sign_out(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'while signed in as an unrelated user' do
 | |
|         before do
 | |
|           sign_in(create(:user))
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline has jobs with coverage reports' do
 | |
|       before do
 | |
|         allow_any_instance_of(MergeRequest)
 | |
|           .to receive(:has_coverage_reports?)
 | |
|           .and_return(true)
 | |
|       end
 | |
| 
 | |
|       context 'when processing coverage reports is in progress' do
 | |
|         let(:report) { { status: :parsing } }
 | |
| 
 | |
|         it 'sends polling interval' do
 | |
|           expect(Gitlab::PollingInterval).to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 204 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:no_content)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when processing coverage reports is completed' do
 | |
|         let(:report) { { status: :parsed, data: pipeline.coverage_reports } }
 | |
| 
 | |
|         it 'returns coverage reports' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response).to eq({ 'files' => {} })
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when user created corrupted coverage reports' do
 | |
|         let(:report) { { status: :error, status_reason: 'Failed to parse coverage reports' } }
 | |
| 
 | |
|         it 'does not send polling interval' do
 | |
|           expect(Gitlab::PollingInterval).not_to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 400 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:bad_request)
 | |
|           expect(json_response).to eq({ 'status_reason' => 'Failed to parse coverage reports' })
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline does not have jobs with coverage reports' do
 | |
|       let(:report) { double }
 | |
| 
 | |
|       it 'returns no content' do
 | |
|         subject
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:no_content)
 | |
|         expect(response.body).to be_empty
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET codequality_mr_diff_reports' do
 | |
|     let_it_be(:merge_request) do
 | |
|       create(:merge_request,
 | |
|         :with_merge_request_pipeline,
 | |
|         target_project: project,
 | |
|         source_project: project)
 | |
|     end
 | |
| 
 | |
|     let(:pipeline) do
 | |
|       create(:ci_pipeline,
 | |
|         :success,
 | |
|         project: merge_request.source_project,
 | |
|         ref: merge_request.source_branch,
 | |
|         sha: merge_request.diff_head_sha)
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:find_codequality_mr_diff_reports)
 | |
|         .and_return(report)
 | |
| 
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:actual_head_pipeline)
 | |
|         .and_return(pipeline)
 | |
|     end
 | |
| 
 | |
|     subject(:get_codequality_mr_diff_reports) do
 | |
|       get :codequality_mr_diff_reports, params: {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       },
 | |
|       format: :json
 | |
|     end
 | |
| 
 | |
|     context 'permissions on a public project with private CI/CD' do
 | |
|       let(:project) { create :project, :repository, :public, :builds_private }
 | |
|       let(:report) { { status: :parsed, data: { 'files' => {} } } }
 | |
| 
 | |
|       context 'while signed out' do
 | |
|         before do
 | |
|           sign_out(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           get_codequality_mr_diff_reports
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'while signed in as an unrelated user' do
 | |
|         before do
 | |
|           sign_in(create(:user))
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           get_codequality_mr_diff_reports
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline has jobs with codequality mr diff report' do
 | |
|       before do
 | |
|         allow_any_instance_of(MergeRequest)
 | |
|           .to receive(:has_codequality_mr_diff_report?)
 | |
|           .and_return(true)
 | |
|       end
 | |
| 
 | |
|       context 'when processing codequality mr diff report is in progress' do
 | |
|         let(:report) { { status: :parsing } }
 | |
| 
 | |
|         it 'sends polling interval' do
 | |
|           expect(Gitlab::PollingInterval).to receive(:set_header)
 | |
| 
 | |
|           get_codequality_mr_diff_reports
 | |
|         end
 | |
| 
 | |
|         it 'returns 204 HTTP status' do
 | |
|           get_codequality_mr_diff_reports
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:no_content)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when processing codequality mr diff report is completed' do
 | |
|         let(:report) { { status: :parsed, data: { 'files' => {} } } }
 | |
| 
 | |
|         it 'returns codequality mr diff report' do
 | |
|           get_codequality_mr_diff_reports
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response).to eq({ 'files' => {} })
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET terraform_reports' do
 | |
|     let_it_be(:merge_request) do
 | |
|       create(:merge_request,
 | |
|         :with_merge_request_pipeline,
 | |
|         target_project: project,
 | |
|         source_project: project)
 | |
|     end
 | |
| 
 | |
|     let(:pipeline) do
 | |
|       create(:ci_pipeline,
 | |
|         :success,
 | |
|         :with_terraform_reports,
 | |
|         project: merge_request.source_project,
 | |
|         ref: merge_request.source_branch,
 | |
|         sha: merge_request.diff_head_sha)
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:find_terraform_reports)
 | |
|         .and_return(report)
 | |
| 
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:actual_head_pipeline)
 | |
|         .and_return(pipeline)
 | |
|     end
 | |
| 
 | |
|     subject do
 | |
|       get :terraform_reports, params: {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       },
 | |
|       format: :json
 | |
|     end
 | |
| 
 | |
|     describe 'permissions on a public project with private CI/CD' do
 | |
|       let(:project) { create :project, :repository, :public, :builds_private }
 | |
|       let(:report) { { status: :parsed, data: [] } }
 | |
| 
 | |
|       context 'while signed out' do
 | |
|         before do
 | |
|           sign_out(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'while signed in as an unrelated user' do
 | |
|         before do
 | |
|           sign_in(create(:user))
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline has jobs with terraform reports' do
 | |
|       before do
 | |
|         allow_next_instance_of(MergeRequest) do |merge_request|
 | |
|           allow(merge_request).to receive(:has_terraform_reports?).and_return(true)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when processing terraform reports is in progress' do
 | |
|         let(:report) { { status: :parsing } }
 | |
| 
 | |
|         it 'sends polling interval' do
 | |
|           expect(Gitlab::PollingInterval).to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 204 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:no_content)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when processing terraform reports is completed' do
 | |
|         let(:report) { { status: :parsed, data: pipeline.terraform_reports.plans } }
 | |
| 
 | |
|         it 'returns terraform reports' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
| 
 | |
|           pipeline.builds.each do |build|
 | |
|             expect(json_response).to match(
 | |
|               a_hash_including(
 | |
|                 build.id.to_s => hash_including(
 | |
|                   'create' => 0,
 | |
|                   'delete' => 0,
 | |
|                   'update' => 1,
 | |
|                   'job_name' => build.name
 | |
|                 )
 | |
|               )
 | |
|             )
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when user created corrupted terraform reports' do
 | |
|         let(:report) { { status: :error, status_reason: 'Failed to parse terraform reports' } }
 | |
| 
 | |
|         it 'does not send polling interval' do
 | |
|           expect(Gitlab::PollingInterval).not_to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 400 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:bad_request)
 | |
|           expect(json_response).to eq({ 'status_reason' => 'Failed to parse terraform reports' })
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline does not have jobs with terraform reports' do
 | |
|       before do
 | |
|         allow_next_instance_of(MergeRequest) do |merge_request|
 | |
|           allow(merge_request).to receive(:has_terraform_reports?).and_return(false)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       let(:report) { { status: :error } }
 | |
| 
 | |
|       it 'returns error' do
 | |
|         subject
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:bad_request)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET test_reports' do
 | |
|     let_it_be(:merge_request) do
 | |
|       create(:merge_request,
 | |
|         :with_merge_request_pipeline,
 | |
|         target_project: project,
 | |
|         source_project: project
 | |
|       )
 | |
|     end
 | |
| 
 | |
|     subject do
 | |
|       get :test_reports, params: {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       },
 | |
|       format: :json
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:compare_test_reports)
 | |
|         .and_return(comparison_status)
 | |
| 
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:actual_head_pipeline)
 | |
|         .and_return(merge_request.all_pipelines.take)
 | |
|     end
 | |
| 
 | |
|     describe 'permissions on a public project with private CI/CD' do
 | |
|       let(:project) { create :project, :repository, :public, :builds_private }
 | |
|       let(:comparison_status) { { status: :parsed, data: { summary: 1 } } }
 | |
| 
 | |
|       context 'while signed out' do
 | |
|         before do
 | |
|           sign_out(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'while signed in as an unrelated user' do
 | |
|         before do
 | |
|           sign_in(create(:user))
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when comparison is being processed' do
 | |
|       let(:comparison_status) { { status: :parsing } }
 | |
| 
 | |
|       it 'sends polling interval' do
 | |
|         expect(Gitlab::PollingInterval).to receive(:set_header)
 | |
| 
 | |
|         subject
 | |
|       end
 | |
| 
 | |
|       it 'returns 204 HTTP status' do
 | |
|         subject
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:no_content)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when comparison is done' do
 | |
|       let(:comparison_status) { { status: :parsed, data: { summary: 1 } } }
 | |
| 
 | |
|       it 'does not send polling interval' do
 | |
|         expect(Gitlab::PollingInterval).not_to receive(:set_header)
 | |
| 
 | |
|         subject
 | |
|       end
 | |
| 
 | |
|       it 'returns 200 HTTP status' do
 | |
|         subject
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|         expect(json_response).to eq({ 'summary' => 1 })
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when user created corrupted test reports' do
 | |
|       let(:comparison_status) { { status: :error, status_reason: 'Failed to parse test reports' } }
 | |
| 
 | |
|       it 'does not send polling interval' do
 | |
|         expect(Gitlab::PollingInterval).not_to receive(:set_header)
 | |
| 
 | |
|         subject
 | |
|       end
 | |
| 
 | |
|       it 'returns 400 HTTP status' do
 | |
|         subject
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:bad_request)
 | |
|         expect(json_response).to eq({ 'status_reason' => 'Failed to parse test reports' })
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET accessibility_reports' do
 | |
|     let_it_be(:merge_request) do
 | |
|       create(:merge_request,
 | |
|         :with_merge_request_pipeline,
 | |
|         target_project: project,
 | |
|         source_project: project
 | |
|       )
 | |
|     end
 | |
| 
 | |
|     let(:pipeline) do
 | |
|       create(:ci_pipeline,
 | |
|         :success,
 | |
|         project: merge_request.source_project,
 | |
|         ref: merge_request.source_branch,
 | |
|         sha: merge_request.diff_head_sha)
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:compare_accessibility_reports)
 | |
|         .and_return(accessibility_comparison)
 | |
| 
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:actual_head_pipeline)
 | |
|         .and_return(pipeline)
 | |
|     end
 | |
| 
 | |
|     subject do
 | |
|       get :accessibility_reports, params: {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       },
 | |
|       format: :json
 | |
|     end
 | |
| 
 | |
|     context 'permissions on a public project with private CI/CD' do
 | |
|       let(:project) { project_public_with_private_builds }
 | |
|       let(:accessibility_comparison) { { status: :parsed, data: { summary: 1 } } }
 | |
| 
 | |
|       context 'while signed out' do
 | |
|         before do
 | |
|           sign_out(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'while signed in as an unrelated user' do
 | |
|         before do
 | |
|           sign_in(create(:user))
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline has jobs with accessibility reports' do
 | |
|       before do
 | |
|         allow_any_instance_of(MergeRequest)
 | |
|           .to receive(:has_accessibility_reports?)
 | |
|           .and_return(true)
 | |
|       end
 | |
| 
 | |
|       context 'when processing accessibility reports is in progress' do
 | |
|         let(:accessibility_comparison) { { status: :parsing } }
 | |
| 
 | |
|         it 'sends polling interval' do
 | |
|           expect(Gitlab::PollingInterval).to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 204 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:no_content)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when processing accessibility reports is completed' do
 | |
|         let(:accessibility_comparison) { { status: :parsed, data: { summary: 1 } } }
 | |
| 
 | |
|         it 'returns accessibility reports' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response).to eq({ 'summary' => 1 })
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when user created corrupted accessibility reports' do
 | |
|         let(:accessibility_comparison) { { status: :error, status_reason: 'This merge request does not have accessibility reports' } }
 | |
| 
 | |
|         it 'does not send polling interval' do
 | |
|           expect(Gitlab::PollingInterval).not_to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 400 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:bad_request)
 | |
|           expect(json_response).to eq({ 'status_reason' => 'This merge request does not have accessibility reports' })
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET codequality_reports' do
 | |
|     let_it_be(:merge_request) do
 | |
|       create(:merge_request,
 | |
|         :with_merge_request_pipeline,
 | |
|         target_project: project,
 | |
|         source_project: project
 | |
|       )
 | |
|     end
 | |
| 
 | |
|     let(:pipeline) do
 | |
|       create(:ci_pipeline,
 | |
|         :success,
 | |
|         project: merge_request.source_project,
 | |
|         ref: merge_request.source_branch,
 | |
|         sha: merge_request.diff_head_sha)
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:compare_codequality_reports)
 | |
|         .and_return(codequality_comparison)
 | |
| 
 | |
|       allow_any_instance_of(MergeRequest)
 | |
|         .to receive(:actual_head_pipeline)
 | |
|         .and_return(pipeline)
 | |
|     end
 | |
| 
 | |
|     subject do
 | |
|       get :codequality_reports, params: {
 | |
|         namespace_id: project.namespace.to_param,
 | |
|         project_id: project,
 | |
|         id: merge_request.iid
 | |
|       },
 | |
|       format: :json
 | |
|     end
 | |
| 
 | |
|     context 'permissions on a public project with private CI/CD' do
 | |
|       let(:project) { project_public_with_private_builds }
 | |
|       let(:codequality_comparison) { { status: :parsed, data: { summary: 1 } } }
 | |
| 
 | |
|       context 'while signed out' do
 | |
|         before do
 | |
|           sign_out(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'while signed in as an unrelated user' do
 | |
|         before do
 | |
|           sign_in(create(:user))
 | |
|         end
 | |
| 
 | |
|         it 'responds with a 404' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|           expect(response.body).to be_blank
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline has jobs with codequality reports' do
 | |
|       before do
 | |
|         allow_any_instance_of(MergeRequest)
 | |
|           .to receive(:has_codequality_reports?)
 | |
|           .and_return(true)
 | |
|       end
 | |
| 
 | |
|       context 'when processing codequality reports is in progress' do
 | |
|         let(:codequality_comparison) { { status: :parsing } }
 | |
| 
 | |
|         it 'sends polling interval' do
 | |
|           expect(Gitlab::PollingInterval).to receive(:set_header)
 | |
| 
 | |
|           subject
 | |
|         end
 | |
| 
 | |
|         it 'returns 204 HTTP status' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:no_content)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when processing codequality reports is completed' do
 | |
|         let(:codequality_comparison) { { status: :parsed, data: { summary: 1 } } }
 | |
| 
 | |
|         it 'returns codequality reports' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response).to eq({ 'summary' => 1 })
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when pipeline has job without a codequality report' do
 | |
|       let(:codequality_comparison) { { status: :error, status_reason: 'no codequality report' } }
 | |
| 
 | |
|       it 'returns a 400' do
 | |
|         subject
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:bad_request)
 | |
|         expect(json_response).to eq({ 'status_reason' => 'no codequality report' })
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST remove_wip' do
 | |
|     before do
 | |
|       merge_request.title = merge_request.wip_title
 | |
|       merge_request.save!
 | |
| 
 | |
|       post :remove_wip,
 | |
|         params: {
 | |
|           format: :json,
 | |
|           namespace_id: merge_request.project.namespace.to_param,
 | |
|           project_id: merge_request.project,
 | |
|           id: merge_request.iid
 | |
|         },
 | |
|         xhr: true
 | |
|     end
 | |
| 
 | |
|     it 'removes the wip status' do
 | |
|       expect(merge_request.reload.title).to eq(merge_request.wipless_title)
 | |
|     end
 | |
| 
 | |
|     it 'renders MergeRequest as JSON' do
 | |
|       expect(json_response.keys).to include('id', 'iid', 'title', 'has_ci', 'merge_status', 'can_be_merged', 'current_user')
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST cancel_auto_merge' do
 | |
|     subject do
 | |
|       post :cancel_auto_merge,
 | |
|         params: {
 | |
|           format: :json,
 | |
|           namespace_id: merge_request.project.namespace.to_param,
 | |
|           project_id: merge_request.project,
 | |
|           id: merge_request.iid
 | |
|         },
 | |
|         xhr: true
 | |
|     end
 | |
| 
 | |
|     it 'calls AutoMergeService' do
 | |
|       auto_merge_service = double
 | |
| 
 | |
|       allow(AutoMergeService)
 | |
|         .to receive(:new)
 | |
|         .and_return(auto_merge_service)
 | |
| 
 | |
|       allow(auto_merge_service).to receive(:available_strategies).with(merge_request)
 | |
|       expect(auto_merge_service).to receive(:cancel).with(merge_request)
 | |
| 
 | |
|       subject
 | |
|     end
 | |
| 
 | |
|     it { is_expected.to have_gitlab_http_status(:success) }
 | |
| 
 | |
|     it 'renders MergeRequest as JSON' do
 | |
|       subject
 | |
| 
 | |
|       expect(json_response.keys).to include('id', 'iid', 'title', 'has_ci', 'merge_status', 'can_be_merged', 'current_user')
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST assign_related_issues' do
 | |
|     let(:issue1) { create(:issue, project: project) }
 | |
|     let(:issue2) { create(:issue, project: project) }
 | |
| 
 | |
|     def post_assign_issues
 | |
|       merge_request.update!(description: "Closes #{issue1.to_reference} and #{issue2.to_reference}",
 | |
|                             author: user,
 | |
|                             source_branch: 'feature',
 | |
|                             target_branch: 'master')
 | |
| 
 | |
|       post :assign_related_issues,
 | |
|            params: {
 | |
|              namespace_id: project.namespace.to_param,
 | |
|              project_id: project,
 | |
|              id: merge_request.iid
 | |
|            }
 | |
|     end
 | |
| 
 | |
|     it 'shows a flash message on success' do
 | |
|       post_assign_issues
 | |
| 
 | |
|       expect(flash[:notice]).to eq '2 issues have been assigned to you'
 | |
|     end
 | |
| 
 | |
|     it 'correctly pluralizes flash message on success' do
 | |
|       issue2.assignees = [user]
 | |
| 
 | |
|       post_assign_issues
 | |
| 
 | |
|       expect(flash[:notice]).to eq '1 issue has been assigned to you'
 | |
|     end
 | |
| 
 | |
|     it 'calls MergeRequests::AssignIssuesService' do
 | |
|       expect(MergeRequests::AssignIssuesService).to receive(:new)
 | |
|         .with(project: project, current_user: user, params: { merge_request: merge_request })
 | |
|         .and_return(double(execute: { count: 1 }))
 | |
| 
 | |
|       post_assign_issues
 | |
|     end
 | |
| 
 | |
|     it 'is skipped when not signed in' do
 | |
|       project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
 | |
|       sign_out(:user)
 | |
| 
 | |
|       expect(MergeRequests::AssignIssuesService).not_to receive(:new)
 | |
| 
 | |
|       post_assign_issues
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET ci_environments_status' do
 | |
|     context 'the environment is from a forked project' do
 | |
|       let(:forked)      { fork_project(project, user, repository: true) }
 | |
|       let(:sha)         { forked.commit.sha }
 | |
|       let(:environment) { create(:environment, project: forked) }
 | |
|       let(:pipeline)    { create(:ci_pipeline, sha: sha, project: forked) }
 | |
|       let!(:build) { create(:ci_build, :with_deployment, environment: environment.name, pipeline: pipeline) }
 | |
| 
 | |
|       let(:merge_request) do
 | |
|         create(:merge_request, source_project: forked, target_project: project, target_branch: 'master', head_pipeline: pipeline)
 | |
|       end
 | |
| 
 | |
|       it 'links to the environment on that project', :sidekiq_might_not_need_inline do
 | |
|         get_ci_environments_status
 | |
| 
 | |
|         expect(json_response.first['url']).to match(/#{forked.full_path}/)
 | |
|       end
 | |
| 
 | |
|       context "when environment_target is 'merge_commit'", :sidekiq_might_not_need_inline do
 | |
|         it 'returns nothing' do
 | |
|           get_ci_environments_status(environment_target: 'merge_commit')
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response).to be_empty
 | |
|         end
 | |
| 
 | |
|         context 'when is merged' do
 | |
|           let(:source_environment)  { create(:environment, project: project) }
 | |
|           let(:merge_commit_sha)    { project.repository.merge(user, forked.commit.id, merge_request, "merged in test") }
 | |
|           let(:post_merge_pipeline) { create(:ci_pipeline, sha: merge_commit_sha, project: project) }
 | |
|           let!(:post_merge_build)   { create(:ci_build, :with_deployment, environment: source_environment.name, pipeline: post_merge_pipeline) }
 | |
| 
 | |
|           before do
 | |
|             merge_request.update!(merge_commit_sha: merge_commit_sha)
 | |
|             merge_request.mark_as_merged!
 | |
|           end
 | |
| 
 | |
|           it 'returns the environment on the source project' do
 | |
|             get_ci_environments_status(environment_target: 'merge_commit')
 | |
| 
 | |
|             expect(response).to have_gitlab_http_status(:ok)
 | |
|             expect(json_response.first['url']).to match(/#{project.full_path}/)
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       # we're trying to reduce the overall number of queries for this method.
 | |
|       # set a hard limit for now. https://gitlab.com/gitlab-org/gitlab-foss/issues/52287
 | |
|       it 'keeps queries in check', :sidekiq_might_not_need_inline do
 | |
|         control_count = ActiveRecord::QueryRecorder.new { get_ci_environments_status }.count
 | |
| 
 | |
|         expect(control_count).to be <= 137
 | |
|       end
 | |
| 
 | |
|       it 'has no N+1 SQL issues for environments', :request_store, :sidekiq_might_not_need_inline, retry: 0 do
 | |
|         # First run to insert test data from lets, which does take up some 30 queries
 | |
|         get_ci_environments_status
 | |
| 
 | |
|         control_count = ActiveRecord::QueryRecorder.new(skip_cached: false) { get_ci_environments_status }.count
 | |
| 
 | |
|         environment2 = create(:environment, project: forked)
 | |
|         create(:deployment, :succeed, environment: environment2, sha: sha, ref: 'master', deployable: build)
 | |
| 
 | |
|         # TODO address the last 3 queries
 | |
|         # See https://gitlab.com/gitlab-org/gitlab-foss/issues/63952 (3 queries)
 | |
|         leeway = 3
 | |
|         expect { get_ci_environments_status }.not_to exceed_all_query_limit(control_count + leeway)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when a merge request has multiple environments with deployments' do
 | |
|       let(:sha) { merge_request.diff_head_sha }
 | |
|       let!(:pipeline) { create(:ci_pipeline, sha: sha, project: project) }
 | |
|       let!(:environment) { create(:environment, name: 'env_a', project: project) }
 | |
|       let!(:another_environment) { create(:environment, name: 'env_b', project: project) }
 | |
| 
 | |
|       before do
 | |
|         merge_request.update_head_pipeline
 | |
| 
 | |
|         create(:ci_build, :with_deployment, environment: environment.name, pipeline: pipeline)
 | |
|         create(:ci_build, :with_deployment, environment: another_environment.name, pipeline: pipeline)
 | |
|       end
 | |
| 
 | |
|       it 'exposes multiple environment statuses' do
 | |
|         get_ci_environments_status
 | |
| 
 | |
|         expect(json_response.count).to eq 2
 | |
|       end
 | |
| 
 | |
|       context 'when route map is not present in the project' do
 | |
|         it 'does not have N+1 Gitaly requests for environments', :request_store do
 | |
|           expect(merge_request).to be_present
 | |
| 
 | |
|           expect { get_ci_environments_status }
 | |
|             .to change { Gitlab::GitalyClient.get_request_count }.by_at_most(1)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when there is route map present in a project' do
 | |
|         before do
 | |
|           allow_any_instance_of(EnvironmentStatus)
 | |
|             .to receive(:has_route_map?)
 | |
|             .and_return(true)
 | |
|         end
 | |
| 
 | |
|         it 'does not have N+1 Gitaly requests for diff files', :request_store do
 | |
|           expect(merge_request.merge_request_diff.merge_request_diff_files).to be_many
 | |
| 
 | |
|           expect { get_ci_environments_status }
 | |
|             .to change { Gitlab::GitalyClient.get_request_count }.by_at_most(1)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     it 'uses the explicitly linked deployments' do
 | |
|       expect(EnvironmentStatus)
 | |
|         .to receive(:for_deployed_merge_request)
 | |
|         .with(merge_request, user)
 | |
|         .and_call_original
 | |
| 
 | |
|       get_ci_environments_status(environment_target: 'merge_commit')
 | |
|     end
 | |
| 
 | |
|     def get_ci_environments_status(extra_params = {})
 | |
|       params = {
 | |
|         namespace_id: merge_request.project.namespace.to_param,
 | |
|         project_id: merge_request.project,
 | |
|         id: merge_request.iid,
 | |
|         format: 'json'
 | |
|       }
 | |
| 
 | |
|       get :ci_environments_status, params: params.merge(extra_params)
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET pipeline_status.json' do
 | |
|     context 'when head_pipeline exists' do
 | |
|       let!(:pipeline) do
 | |
|         create(:ci_pipeline, project: merge_request.source_project,
 | |
|                              ref: merge_request.source_branch,
 | |
|                              sha: merge_request.diff_head_sha,
 | |
|                              head_pipeline_of: merge_request)
 | |
|       end
 | |
| 
 | |
|       let(:status) { pipeline.detailed_status(double('user')) }
 | |
| 
 | |
|       it 'returns a detailed head_pipeline status in json' do
 | |
|         get_pipeline_status
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|         expect(json_response['text']).to eq status.text
 | |
|         expect(json_response['label']).to eq status.label
 | |
|         expect(json_response['icon']).to eq status.icon
 | |
|         expect(json_response['favicon']).to match_asset_path "/assets/ci_favicons/#{status.favicon}.png"
 | |
|       end
 | |
| 
 | |
|       context 'with project member visibility on a public project' do
 | |
|         let(:user)    { create(:user) }
 | |
|         let(:project) { project_public_with_private_builds }
 | |
| 
 | |
|         it 'returns pipeline data to project members' do
 | |
|           project.add_developer(user)
 | |
| 
 | |
|           get_pipeline_status
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response['text']).to eq status.text
 | |
|           expect(json_response['label']).to eq status.label
 | |
|           expect(json_response['icon']).to eq status.icon
 | |
|           expect(json_response['favicon']).to match_asset_path "/assets/ci_favicons/#{status.favicon}.png"
 | |
|         end
 | |
| 
 | |
|         it 'returns blank OK response to non-project-members' do
 | |
|           get_pipeline_status
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|           expect(json_response).to be_empty
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when head_pipeline does not exist' do
 | |
|       before do
 | |
|         get_pipeline_status
 | |
|       end
 | |
| 
 | |
|       it 'returns blank OK response' do
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|         expect(json_response).to be_empty
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     def get_pipeline_status
 | |
|       get :pipeline_status, params: {
 | |
|                               namespace_id: project.namespace,
 | |
|                               project_id: project,
 | |
|                               id: merge_request.iid
 | |
|                             },
 | |
|                             format: :json
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST #rebase' do
 | |
|     def post_rebase
 | |
|       post :rebase, params: { namespace_id: project.namespace, project_id: project, id: merge_request }
 | |
|     end
 | |
| 
 | |
|     before do
 | |
|       allow(RebaseWorker).to receive(:with_status).and_return(RebaseWorker)
 | |
|     end
 | |
| 
 | |
|     def expect_rebase_worker_for(user)
 | |
|       expect(RebaseWorker).to receive(:perform_async).with(merge_request.id, user.id, false)
 | |
|     end
 | |
| 
 | |
|     context 'successfully' do
 | |
|       it 'enqeues a RebaseWorker' do
 | |
|         expect_rebase_worker_for(user)
 | |
| 
 | |
|         post_rebase
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'with NOWAIT lock' do
 | |
|       it 'returns a 409' do
 | |
|         allow_any_instance_of(MergeRequest).to receive(:with_lock).with('FOR UPDATE NOWAIT').and_raise(ActiveRecord::LockWaitTimeout)
 | |
|         expect(RebaseWorker).not_to receive(:perform_async)
 | |
| 
 | |
|         post_rebase
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:conflict)
 | |
|         expect(json_response['merge_error']).to eq('Failed to enqueue the rebase operation, possibly due to a long-lived transaction. Try again later.')
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'with a forked project' do
 | |
|       let(:forked_project) { fork_project(project, fork_owner, repository: true) }
 | |
|       let(:fork_owner) { create(:user) }
 | |
|       let(:merge_request_source_project) { forked_project }
 | |
| 
 | |
|       context 'user cannot push to source branch' do
 | |
|         before do
 | |
|           project.add_developer(fork_owner)
 | |
| 
 | |
|           forked_project.add_reporter(user)
 | |
|         end
 | |
| 
 | |
|         it 'returns 404' do
 | |
|           expect_rebase_worker_for(user).never
 | |
| 
 | |
|           post_rebase
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'user can push to source branch' do
 | |
|         before do
 | |
|           project.add_reporter(fork_owner)
 | |
| 
 | |
|           sign_in(fork_owner)
 | |
|         end
 | |
| 
 | |
|         it 'returns 200', :sidekiq_might_not_need_inline do
 | |
|           expect_rebase_worker_for(fork_owner)
 | |
| 
 | |
|           post_rebase
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET discussions' do
 | |
|     context 'when authenticated' do
 | |
|       before do
 | |
|         project.add_developer(user)
 | |
|         sign_in(user)
 | |
| 
 | |
|         expect(::Gitlab::GitalyClient).to receive(:allow_ref_name_caching).and_call_original
 | |
|       end
 | |
| 
 | |
|       it 'returns 200' do
 | |
|         get :discussions, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid }
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
| 
 | |
|       context 'highlight preloading' do
 | |
|         context 'with commit diff notes' do
 | |
|           let!(:commit_diff_note) do
 | |
|             create(:diff_note_on_commit, project: merge_request.project)
 | |
|           end
 | |
| 
 | |
|           it 'preloads notes diffs highlights' do
 | |
|             expect_next_instance_of(Gitlab::DiscussionsDiff::FileCollection) do |collection|
 | |
|               note_diff_file = commit_diff_note.note_diff_file
 | |
| 
 | |
|               expect(collection).to receive(:load_highlight).and_call_original
 | |
|               expect(collection).to receive(:find_by_id).with(note_diff_file.id).and_call_original
 | |
|             end
 | |
| 
 | |
|             get :discussions, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid }
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'with diff notes' do
 | |
|           let!(:diff_note) do
 | |
|             create(:diff_note_on_merge_request, noteable: merge_request, project: merge_request.project)
 | |
|           end
 | |
| 
 | |
|           it 'preloads notes diffs highlights' do
 | |
|             expect_next_instance_of(Gitlab::DiscussionsDiff::FileCollection) do |collection|
 | |
|               note_diff_file = diff_note.note_diff_file
 | |
| 
 | |
|               expect(collection).to receive(:load_highlight).and_call_original
 | |
|               expect(collection).to receive(:find_by_id).with(note_diff_file.id).and_call_original
 | |
|             end
 | |
| 
 | |
|             get :discussions, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid }
 | |
|           end
 | |
| 
 | |
|           it 'does not preload highlights when diff note is resolved' do
 | |
|             Notes::ResolveService.new(diff_note.project, user).execute(diff_note)
 | |
| 
 | |
|             expect_next_instance_of(Gitlab::DiscussionsDiff::FileCollection) do |collection|
 | |
|               note_diff_file = diff_note.note_diff_file
 | |
| 
 | |
|               expect(collection).to receive(:load_highlight).and_call_original
 | |
|               expect(collection).to receive(:find_by_id).with(note_diff_file.id).and_call_original
 | |
|             end
 | |
| 
 | |
|             get :discussions, params: { namespace_id: project.namespace, project_id: project, id: merge_request.iid }
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context do
 | |
|       it_behaves_like 'discussions provider' do
 | |
|         let!(:author) { create(:user) }
 | |
|         let!(:project) { create(:project) }
 | |
| 
 | |
|         let!(:merge_request) { create(:merge_request, source_project: project) }
 | |
| 
 | |
|         let!(:mr_note1) { create(:discussion_note_on_merge_request, noteable: merge_request, project: project) }
 | |
|         let!(:mr_note2) { create(:discussion_note_on_merge_request, noteable: merge_request, project: project) }
 | |
| 
 | |
|         let(:requested_iid) { merge_request.iid }
 | |
|         let(:expected_discussion_count) { 2 }
 | |
|         let(:expected_discussion_ids) { [mr_note1.discussion_id, mr_note2.discussion_id] }
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET edit' do
 | |
|     it 'responds successfully' do
 | |
|       get :edit, params: { namespace_id: project.namespace, project_id: project, id: merge_request }
 | |
| 
 | |
|       expect(response).to have_gitlab_http_status(:success)
 | |
|     end
 | |
| 
 | |
|     it 'assigns the noteable to make sure autocompletes work' do
 | |
|       get :edit, params: { namespace_id: project.namespace, project_id: project, id: merge_request }
 | |
| 
 | |
|       expect(assigns(:noteable)).not_to be_nil
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST export_csv' do
 | |
|     subject { post :export_csv, params: { namespace_id: project.namespace, project_id: project } }
 | |
| 
 | |
|     it 'redirects to the merge request index' do
 | |
|       subject
 | |
| 
 | |
|       expect(response).to redirect_to(project_merge_requests_path(project))
 | |
|       expect(controller).to set_flash[:notice].to match(/\AYour CSV export has started/i)
 | |
|     end
 | |
| 
 | |
|     it 'enqueues an IssuableExportCsvWorker worker' do
 | |
|       expect(IssuableExportCsvWorker).to receive(:perform_async).with(:merge_request, user.id, project.id, anything)
 | |
| 
 | |
|       subject
 | |
|     end
 | |
|   end
 | |
| end
 |