752 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			752 lines
		
	
	
		
			22 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # frozen_string_literal: true
 | |
| 
 | |
| require 'spec_helper'
 | |
| 
 | |
| describe SnippetsController do
 | |
|   let_it_be(:user) { create(:user) }
 | |
| 
 | |
|   describe 'GET #index' do
 | |
|     context 'when username parameter is present' do
 | |
|       it_behaves_like 'paginated collection' do
 | |
|         let(:collection) { Snippet.all }
 | |
|         let(:params) { { username: user.username } }
 | |
| 
 | |
|         before do
 | |
|           create(:personal_snippet, :public, author: user)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       it 'renders snippets of a user when username is present' do
 | |
|         get :index, params: { username: user.username }
 | |
| 
 | |
|         expect(response).to render_template(:index)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when username parameter is not present' do
 | |
|       it 'redirects to explore snippets page when user is not logged in' do
 | |
|         get :index
 | |
| 
 | |
|         expect(response).to redirect_to(explore_snippets_path)
 | |
|       end
 | |
| 
 | |
|       it 'redirects to snippets dashboard page when user is logged in' do
 | |
|         sign_in(user)
 | |
| 
 | |
|         get :index
 | |
| 
 | |
|         expect(response).to redirect_to(dashboard_snippets_path)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET #new' do
 | |
|     context 'when signed in' do
 | |
|       before do
 | |
|         sign_in(user)
 | |
|       end
 | |
| 
 | |
|       it 'responds with status 200' do
 | |
|         get :new
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
| 
 | |
|       context 'when user is not allowed to create a personal snippet' do
 | |
|         let(:user) { create(:user, :external) }
 | |
| 
 | |
|         it 'responds with status 404' do
 | |
|           get :new
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when not signed in' do
 | |
|       it 'redirects to the sign in page' do
 | |
|         get :new
 | |
| 
 | |
|         expect(response).to redirect_to(new_user_session_path)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET #show' do
 | |
|     shared_examples 'successful response' do
 | |
|       it 'renders the snippet' do
 | |
|         subject
 | |
| 
 | |
|         expect(assigns(:snippet)).to eq(personal_snippet)
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
| 
 | |
|       it 'renders the blob from the repository' do
 | |
|         subject
 | |
| 
 | |
|         expect(assigns(:blob)).to eq(personal_snippet.blobs.first)
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet is private' do
 | |
|       let_it_be(:personal_snippet) { create(:personal_snippet, :private, :repository, author: user) }
 | |
| 
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         context 'when signed in user is not the author' do
 | |
|           let(:other_author) { create(:author) }
 | |
|           let(:other_personal_snippet) { create(:personal_snippet, :private, author: other_author) }
 | |
| 
 | |
|           it 'responds with status 404' do
 | |
|             get :show, params: { id: other_personal_snippet.to_param }
 | |
| 
 | |
|             expect(response).to have_gitlab_http_status(:not_found)
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when signed in user is the author' do
 | |
|           it_behaves_like 'successful response' do
 | |
|             subject { get :show, params: { id: personal_snippet.to_param } }
 | |
|           end
 | |
| 
 | |
|           it 'responds with status 404 when embeddable content is requested' do
 | |
|             get :show, params: { id: personal_snippet.to_param }, format: :js
 | |
| 
 | |
|             expect(response).to have_gitlab_http_status(:not_found)
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'redirects to the sign in page' do
 | |
|           get :show, params: { id: personal_snippet.to_param }
 | |
| 
 | |
|           expect(response).to redirect_to(new_user_session_path)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet is internal' do
 | |
|       let_it_be(:personal_snippet) { create(:personal_snippet, :internal, :repository, author: user) }
 | |
| 
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         it_behaves_like 'successful response' do
 | |
|           subject { get :show, params: { id: personal_snippet.to_param } }
 | |
|         end
 | |
| 
 | |
|         it 'responds with status 404 when embeddable content is requested' do
 | |
|           get :show, params: { id: personal_snippet.to_param }, format: :js
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'redirects to the sign in page' do
 | |
|           get :show, params: { id: personal_snippet.to_param }
 | |
| 
 | |
|           expect(response).to redirect_to(new_user_session_path)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet is public' do
 | |
|       let_it_be(:personal_snippet) { create(:personal_snippet, :public, :repository, author: user) }
 | |
| 
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         it_behaves_like 'successful response' do
 | |
|           subject { get :show, params: { id: personal_snippet.to_param } }
 | |
|         end
 | |
| 
 | |
|         it 'responds with status 200 when embeddable content is requested' do
 | |
|           get :show, params: { id: personal_snippet.to_param }, format: :js
 | |
| 
 | |
|           expect(assigns(:snippet)).to eq(personal_snippet)
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'renders the snippet' do
 | |
|           get :show, params: { id: personal_snippet.to_param }
 | |
| 
 | |
|           expect(assigns(:snippet)).to eq(personal_snippet)
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet does not exist' do
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with status 404' do
 | |
|           get :show, params: { id: 'doesntexist' }
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'responds with status 404' do
 | |
|           get :show, params: { id: 'doesntexist' }
 | |
| 
 | |
|           expect(response).to redirect_to(new_user_session_path)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST #create' do
 | |
|     def create_snippet(snippet_params = {}, additional_params = {})
 | |
|       sign_in(user)
 | |
| 
 | |
|       post :create, params: {
 | |
|         personal_snippet: { title: 'Title', content: 'Content', description: 'Description' }.merge(snippet_params)
 | |
|       }.merge(additional_params)
 | |
| 
 | |
|       Snippet.last
 | |
|     end
 | |
| 
 | |
|     it 'creates the snippet correctly' do
 | |
|       snippet = create_snippet(visibility_level: Snippet::PRIVATE)
 | |
| 
 | |
|       expect(snippet.title).to eq('Title')
 | |
|       expect(snippet.content).to eq('Content')
 | |
|       expect(snippet.description).to eq('Description')
 | |
|     end
 | |
| 
 | |
|     context 'when user is not allowed to create a personal snippet' do
 | |
|       let(:user) { create(:user, :external) }
 | |
| 
 | |
|       it 'responds with status 404' do
 | |
|         aggregate_failures do
 | |
|           expect do
 | |
|             create_snippet(visibility_level: Snippet::PUBLIC)
 | |
|           end.not_to change { Snippet.count }
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the controller receives the files param' do
 | |
|       let(:files) { %w(foo bar) }
 | |
| 
 | |
|       it 'passes the files param to the snippet create service' do
 | |
|         expect(Snippets::CreateService).to receive(:new).with(nil, user, hash_including(files: files)).and_call_original
 | |
| 
 | |
|         create_snippet({ title: nil }, { files: files })
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the snippet is spam' do
 | |
|       before do
 | |
|         allow_next_instance_of(Spam::AkismetService) do |instance|
 | |
|           allow(instance).to receive(:spam?).and_return(true)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when the snippet is private' do
 | |
|         it 'creates the snippet' do
 | |
|           expect { create_snippet(visibility_level: Snippet::PRIVATE) }
 | |
|             .to change { Snippet.count }.by(1)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when the snippet is public' do
 | |
|         it 'rejects the snippet' do
 | |
|           expect { create_snippet(visibility_level: Snippet::PUBLIC) }
 | |
|             .not_to change { Snippet.count }
 | |
|         end
 | |
| 
 | |
|         it 'creates a spam log' do
 | |
|           expect { create_snippet(visibility_level: Snippet::PUBLIC) }
 | |
|             .to log_spam(title: 'Title', user: user, noteable_type: 'PersonalSnippet')
 | |
|         end
 | |
| 
 | |
|         it 'renders :new with reCAPTCHA disabled' do
 | |
|           stub_application_setting(recaptcha_enabled: false)
 | |
| 
 | |
|           create_snippet(visibility_level: Snippet::PUBLIC)
 | |
| 
 | |
|           expect(response).to render_template(:new)
 | |
|         end
 | |
| 
 | |
|         context 'reCAPTCHA enabled' do
 | |
|           before do
 | |
|             stub_application_setting(recaptcha_enabled: true)
 | |
|           end
 | |
| 
 | |
|           it 'renders :verify' do
 | |
|             create_snippet(visibility_level: Snippet::PUBLIC)
 | |
| 
 | |
|             expect(response).to render_template(:verify)
 | |
|           end
 | |
| 
 | |
|           it 'renders snippet page' do
 | |
|             spammy_title = 'Whatever'
 | |
| 
 | |
|             spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title)
 | |
|             snippet = create_snippet({ title: spammy_title },
 | |
|                                      { spam_log_id: spam_logs.last.id,
 | |
|                                        recaptcha_verification: true })
 | |
| 
 | |
|             expect(response).to redirect_to(snippet_path(snippet))
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'PUT #update' do
 | |
|     let(:project) { create :project }
 | |
|     let(:visibility_level) { Snippet::PUBLIC }
 | |
|     let(:snippet) { create :personal_snippet, author: user, project: project, visibility_level: visibility_level }
 | |
| 
 | |
|     def update_snippet(snippet_params = {}, additional_params = {})
 | |
|       sign_in(user)
 | |
| 
 | |
|       put :update, params: {
 | |
|         id: snippet.id,
 | |
|         personal_snippet: { title: 'Title', content: 'Content' }.merge(snippet_params)
 | |
|       }.merge(additional_params)
 | |
| 
 | |
|       snippet.reload
 | |
|     end
 | |
| 
 | |
|     it_behaves_like 'updating snippet checks blob is binary' do
 | |
|       let_it_be(:title) { 'Foo' }
 | |
| 
 | |
|       subject { put :update, params: { id: snippet, personal_snippet: { title: title } } }
 | |
|     end
 | |
| 
 | |
|     context 'when the snippet is spam' do
 | |
|       before do
 | |
|         allow_next_instance_of(Spam::AkismetService) do |instance|
 | |
|           allow(instance).to receive(:spam?).and_return(true)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when the snippet is private' do
 | |
|         let(:visibility_level) { Snippet::PRIVATE }
 | |
| 
 | |
|         it 'updates the snippet' do
 | |
|           expect { update_snippet(title: 'Foo') }
 | |
|             .to change { snippet.reload.title }.to('Foo')
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when a private snippet is made public' do
 | |
|         let(:visibility_level) { Snippet::PRIVATE }
 | |
| 
 | |
|         it 'rejects the snippet' do
 | |
|           expect { update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) }
 | |
|             .not_to change { snippet.reload.title }
 | |
|         end
 | |
| 
 | |
|         it 'creates a spam log' do
 | |
|           expect { update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) }
 | |
|             .to log_spam(title: 'Foo', user: user, noteable_type: 'PersonalSnippet')
 | |
|         end
 | |
| 
 | |
|         it 'renders :edit with reCAPTCHA disabled' do
 | |
|           stub_application_setting(recaptcha_enabled: false)
 | |
| 
 | |
|           update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC)
 | |
| 
 | |
|           expect(response).to render_template(:edit)
 | |
|         end
 | |
| 
 | |
|         context 'reCAPTCHA enabled' do
 | |
|           before do
 | |
|             stub_application_setting(recaptcha_enabled: true)
 | |
|           end
 | |
| 
 | |
|           it 'renders :verify' do
 | |
|             update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC)
 | |
| 
 | |
|             expect(response).to render_template(:verify)
 | |
|           end
 | |
| 
 | |
|           it 'renders snippet page when reCAPTCHA verified' do
 | |
|             spammy_title = 'Whatever'
 | |
| 
 | |
|             spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title)
 | |
|             snippet = update_snippet({ title: spammy_title, visibility_level: Snippet::PUBLIC },
 | |
|                                      { spam_log_id: spam_logs.last.id,
 | |
|                                        recaptcha_verification: true })
 | |
| 
 | |
|             expect(response).to redirect_to(snippet_path(snippet))
 | |
|           end
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when the snippet is public' do
 | |
|         it 'rejects the snippet' do
 | |
|           expect { update_snippet(title: 'Foo') }
 | |
|             .not_to change { snippet.reload.title }
 | |
|         end
 | |
| 
 | |
|         it 'creates a spam log' do
 | |
|           expect {update_snippet(title: 'Foo') }
 | |
|             .to log_spam(title: 'Foo', user: user, noteable_type: 'PersonalSnippet')
 | |
|         end
 | |
| 
 | |
|         it 'renders :edit with reCAPTCHA disabled' do
 | |
|           stub_application_setting(recaptcha_enabled: false)
 | |
| 
 | |
|           update_snippet(title: 'Foo')
 | |
| 
 | |
|           expect(response).to render_template(:edit)
 | |
|         end
 | |
| 
 | |
|         context 'recaptcha enabled' do
 | |
|           before do
 | |
|             stub_application_setting(recaptcha_enabled: true)
 | |
|           end
 | |
| 
 | |
|           it 'renders :verify' do
 | |
|             update_snippet(title: 'Foo')
 | |
| 
 | |
|             expect(response).to render_template(:verify)
 | |
|           end
 | |
| 
 | |
|           it 'renders snippet page when reCAPTCHA verified' do
 | |
|             spammy_title = 'Whatever'
 | |
| 
 | |
|             spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title)
 | |
|             snippet = update_snippet({ title: spammy_title },
 | |
|                                      { spam_log_id: spam_logs.last.id,
 | |
|                                        recaptcha_verification: true })
 | |
| 
 | |
|             expect(response).to redirect_to(snippet_path(snippet))
 | |
|           end
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST #mark_as_spam' do
 | |
|     let(:snippet) { create(:personal_snippet, :public, author: user) }
 | |
| 
 | |
|     before do
 | |
|       allow_next_instance_of(Spam::AkismetService) do |instance|
 | |
|         allow(instance).to receive_messages(submit_spam: true)
 | |
|       end
 | |
|       stub_application_setting(akismet_enabled: true)
 | |
|     end
 | |
| 
 | |
|     def mark_as_spam
 | |
|       admin = create(:admin)
 | |
|       create(:user_agent_detail, subject: snippet)
 | |
|       sign_in(admin)
 | |
| 
 | |
|       post :mark_as_spam, params: { id: snippet.id }
 | |
|     end
 | |
| 
 | |
|     it 'updates the snippet' do
 | |
|       mark_as_spam
 | |
| 
 | |
|       expect(snippet.reload).not_to be_submittable_as_spam
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "GET #raw" do
 | |
|     let(:inline) { nil }
 | |
|     let(:params) { { id: snippet.to_param, inline: inline } }
 | |
| 
 | |
|     subject { get :raw, params: params }
 | |
| 
 | |
|     shared_examples '200 status' do
 | |
|       before do
 | |
|         subject
 | |
|       end
 | |
| 
 | |
|       it 'responds with status 200' do
 | |
|         expect(assigns(:snippet)).to eq(snippet)
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
| 
 | |
|       it "sets #{Gitlab::Workhorse::DETECT_HEADER} header" do
 | |
|         expect(response.header[Gitlab::Workhorse::DETECT_HEADER]).to eq 'true'
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     shared_examples 'CRLF line ending' do
 | |
|       let(:content) { "first line\r\nsecond line\r\nthird line" }
 | |
|       let(:formatted_content) { content.gsub(/\r\n/, "\n") }
 | |
|       let(:snippet) do
 | |
|         create(:personal_snippet, :public, :repository, author: user, content: content)
 | |
|       end
 | |
| 
 | |
|       before do
 | |
|         allow_next_instance_of(Blob) do |instance|
 | |
|           allow(instance).to receive(:data).and_return(content)
 | |
|         end
 | |
| 
 | |
|         subject
 | |
|       end
 | |
| 
 | |
|       it 'returns LF line endings by default' do
 | |
|         expect(response.body).to eq(formatted_content)
 | |
|       end
 | |
| 
 | |
|       context 'when parameter present' do
 | |
|         let(:params) { { id: snippet.to_param, line_ending: :raw } }
 | |
| 
 | |
|         it 'does not convert line endings when parameter present' do
 | |
|           expect(response.body).to eq(content)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     shared_examples 'successful response' do
 | |
|       it_behaves_like '200 status'
 | |
| 
 | |
|       it 'has expected blob headers' do
 | |
|         subject
 | |
| 
 | |
|         expect(response.header[Gitlab::Workhorse::SEND_DATA_HEADER]).to start_with('git-blob:')
 | |
|         expect(response.header[Gitlab::Workhorse::DETECT_HEADER]).to eq 'true'
 | |
|       end
 | |
| 
 | |
|       it_behaves_like 'content disposition headers'
 | |
| 
 | |
|       it 'sets cache_control public header based on snippet visibility' do
 | |
|         subject
 | |
| 
 | |
|         expect(response.cache_control[:public]).to eq snippet.public?
 | |
|       end
 | |
| 
 | |
|       context 'when snippet repository is empty' do
 | |
|         before do
 | |
|           allow_any_instance_of(Repository).to receive(:empty?).and_return(true)
 | |
|         end
 | |
| 
 | |
|         it_behaves_like '200 status'
 | |
|         it_behaves_like 'CRLF line ending'
 | |
| 
 | |
|         it 'returns snippet database content' do
 | |
|           subject
 | |
| 
 | |
|           expect(response.body).to eq snippet.content
 | |
|           expect(response.header['Content-Type']).to eq('text/plain; charset=utf-8')
 | |
|         end
 | |
| 
 | |
|         it_behaves_like 'content disposition headers'
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet is private' do
 | |
|       let_it_be(:snippet) { create(:personal_snippet, :private, :repository, author: user) }
 | |
| 
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         context 'when signed in user is not the author' do
 | |
|           let(:other_author) { create(:author) }
 | |
|           let(:other_personal_snippet) { create(:personal_snippet, :private, author: other_author) }
 | |
| 
 | |
|           it 'responds with status 404' do
 | |
|             get :raw, params: { id: other_personal_snippet.to_param }
 | |
| 
 | |
|             expect(response).to have_gitlab_http_status(:not_found)
 | |
|           end
 | |
|         end
 | |
| 
 | |
|         context 'when signed in user is the author' do
 | |
|           it_behaves_like 'successful response'
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'redirects to the sign in page' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to redirect_to(new_user_session_path)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet is internal' do
 | |
|       let_it_be(:snippet) { create(:personal_snippet, :internal, :repository, author: user) }
 | |
| 
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         it_behaves_like 'successful response'
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'redirects to the sign in page' do
 | |
|           subject
 | |
| 
 | |
|           expect(response).to redirect_to(new_user_session_path)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet is public' do
 | |
|       let_it_be(:snippet) { create(:personal_snippet, :public, :repository, author: user) }
 | |
| 
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         it_behaves_like 'successful response'
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'responds with status 200' do
 | |
|           subject
 | |
| 
 | |
|           expect(assigns(:snippet)).to eq(snippet)
 | |
|           expect(response).to have_gitlab_http_status(:ok)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when the personal snippet does not exist' do
 | |
|       context 'when signed in' do
 | |
|         before do
 | |
|           sign_in(user)
 | |
|         end
 | |
| 
 | |
|         it 'responds with status 404' do
 | |
|           get :raw, params: { id: 'doesntexist' }
 | |
| 
 | |
|           expect(response).to have_gitlab_http_status(:not_found)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when not signed in' do
 | |
|         it 'redirects to the sign in path' do
 | |
|           get :raw, params: { id: 'doesntexist' }
 | |
| 
 | |
|           expect(response).to redirect_to(new_user_session_path)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   context 'award emoji on snippets' do
 | |
|     let(:personal_snippet) { create(:personal_snippet, :public, author: user) }
 | |
|     let(:another_user) { create(:user) }
 | |
| 
 | |
|     before do
 | |
|       sign_in(another_user)
 | |
|     end
 | |
| 
 | |
|     describe 'POST #toggle_award_emoji' do
 | |
|       it "toggles the award emoji" do
 | |
|         expect do
 | |
|           post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" })
 | |
|         end.to change { personal_snippet.award_emoji.count }.from(0).to(1)
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
| 
 | |
|       it "removes the already awarded emoji" do
 | |
|         post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" })
 | |
| 
 | |
|         expect do
 | |
|           post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" })
 | |
|         end.to change { personal_snippet.award_emoji.count }.from(1).to(0)
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:ok)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'POST #preview_markdown' do
 | |
|     let(:snippet) { create(:personal_snippet, :public) }
 | |
| 
 | |
|     it 'renders json in a correct format' do
 | |
|       sign_in(user)
 | |
| 
 | |
|       post :preview_markdown, params: { id: snippet, text: '*Markdown* text' }
 | |
| 
 | |
|       expect(json_response.keys).to match_array(%w(body references))
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'DELETE #destroy' do
 | |
|     let!(:snippet) { create :personal_snippet, author: user }
 | |
| 
 | |
|     context 'when current user has ability to destroy the snippet' do
 | |
|       before do
 | |
|         sign_in(user)
 | |
|       end
 | |
| 
 | |
|       it 'removes the snippet' do
 | |
|         delete :destroy, params: { id: snippet.to_param }
 | |
| 
 | |
|         expect { snippet.reload }.to raise_error(ActiveRecord::RecordNotFound)
 | |
|       end
 | |
| 
 | |
|       context 'when snippet is succesfuly destroyed' do
 | |
|         it 'redirects to the project snippets page' do
 | |
|           delete :destroy, params: { id: snippet.to_param }
 | |
| 
 | |
|           expect(response).to redirect_to(dashboard_snippets_path)
 | |
|         end
 | |
|       end
 | |
| 
 | |
|       context 'when snippet is not destroyed' do
 | |
|         before do
 | |
|           allow(snippet).to receive(:destroy).and_return(false)
 | |
|           controller.instance_variable_set(:@snippet, snippet)
 | |
|         end
 | |
| 
 | |
|         it 'renders the snippet page with errors' do
 | |
|           delete :destroy, params: { id: snippet.to_param }
 | |
| 
 | |
|           expect(flash[:alert]).to eq('Failed to remove snippet.')
 | |
|           expect(response).to redirect_to(snippet_path(snippet))
 | |
|         end
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     context 'when current_user does not have ability to destroy the snippet' do
 | |
|       let(:another_user) { create(:user) }
 | |
| 
 | |
|       before do
 | |
|         sign_in(another_user)
 | |
|       end
 | |
| 
 | |
|       it 'responds with status 404' do
 | |
|         delete :destroy, params: { id: snippet.to_param }
 | |
| 
 | |
|         expect(response).to have_gitlab_http_status(:not_found)
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe 'GET #edit' do
 | |
|     it_behaves_like 'editing snippet checks blob is binary' do
 | |
|       let_it_be(:snippet) { create(:personal_snippet, :public, :repository, author: user) }
 | |
| 
 | |
|       subject { get :edit, params: { id: snippet } }
 | |
|     end
 | |
|   end
 | |
| end
 |