127 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			127 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			Ruby
		
	
	
	
require 'spec_helper'
 | 
						|
 | 
						|
describe API::Settings, 'Settings' do
 | 
						|
  let(:user) { create(:user) }
 | 
						|
  set(:admin) { create(:admin) }
 | 
						|
 | 
						|
  describe "GET /application/settings" do
 | 
						|
    it "returns application settings" do
 | 
						|
      get api("/application/settings", admin)
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(200)
 | 
						|
      expect(json_response).to be_an Hash
 | 
						|
      expect(json_response['default_projects_limit']).to eq(42)
 | 
						|
      expect(json_response['password_authentication_enabled_for_web']).to be_truthy
 | 
						|
      expect(json_response['repository_storages']).to eq(['default'])
 | 
						|
      expect(json_response['plantuml_enabled']).to be_falsey
 | 
						|
      expect(json_response['plantuml_url']).to be_nil
 | 
						|
      expect(json_response['default_project_visibility']).to be_a String
 | 
						|
      expect(json_response['default_snippet_visibility']).to be_a String
 | 
						|
      expect(json_response['default_group_visibility']).to be_a String
 | 
						|
      expect(json_response['rsa_key_restriction']).to eq(0)
 | 
						|
      expect(json_response['dsa_key_restriction']).to eq(0)
 | 
						|
      expect(json_response['ecdsa_key_restriction']).to eq(0)
 | 
						|
      expect(json_response['ed25519_key_restriction']).to eq(0)
 | 
						|
      expect(json_response['performance_bar_allowed_group_id']).to be_nil
 | 
						|
      expect(json_response['instance_statistics_visibility_private']).to be(false)
 | 
						|
      expect(json_response).not_to have_key('performance_bar_allowed_group_path')
 | 
						|
      expect(json_response).not_to have_key('performance_bar_enabled')
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe "PUT /application/settings" do
 | 
						|
    let(:group) { create(:group) }
 | 
						|
 | 
						|
    context "custom repository storage type set in the config" do
 | 
						|
      before do
 | 
						|
        # Add a possible storage to the config
 | 
						|
        storages = Gitlab.config.repositories.storages
 | 
						|
                     .merge({ 'custom' => 'tmp/tests/custom_repositories' })
 | 
						|
        allow(Gitlab.config.repositories).to receive(:storages).and_return(storages)
 | 
						|
      end
 | 
						|
 | 
						|
      it "updates application settings" do
 | 
						|
        put api("/application/settings", admin),
 | 
						|
          params: {
 | 
						|
            default_projects_limit: 3,
 | 
						|
            password_authentication_enabled_for_web: false,
 | 
						|
            repository_storages: ['custom'],
 | 
						|
            plantuml_enabled: true,
 | 
						|
            plantuml_url: 'http://plantuml.example.com',
 | 
						|
            default_snippet_visibility: 'internal',
 | 
						|
            restricted_visibility_levels: ['public'],
 | 
						|
            default_artifacts_expire_in: '2 days',
 | 
						|
            help_page_text: 'custom help text',
 | 
						|
            help_page_hide_commercial_content: true,
 | 
						|
            help_page_support_url: 'http://example.com/help',
 | 
						|
            project_export_enabled: false,
 | 
						|
            rsa_key_restriction: ApplicationSetting::FORBIDDEN_KEY_VALUE,
 | 
						|
            dsa_key_restriction: 2048,
 | 
						|
            ecdsa_key_restriction: 384,
 | 
						|
            ed25519_key_restriction: 256,
 | 
						|
            enforce_terms: true,
 | 
						|
            terms: 'Hello world!',
 | 
						|
            performance_bar_allowed_group_path: group.full_path,
 | 
						|
            instance_statistics_visibility_private: true,
 | 
						|
            diff_max_patch_bytes: 150_000,
 | 
						|
            default_branch_protection: Gitlab::Access::PROTECTION_DEV_CAN_MERGE,
 | 
						|
            local_markdown_version: 3
 | 
						|
          }
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(200)
 | 
						|
        expect(json_response['default_projects_limit']).to eq(3)
 | 
						|
        expect(json_response['password_authentication_enabled_for_web']).to be_falsey
 | 
						|
        expect(json_response['repository_storages']).to eq(['custom'])
 | 
						|
        expect(json_response['plantuml_enabled']).to be_truthy
 | 
						|
        expect(json_response['plantuml_url']).to eq('http://plantuml.example.com')
 | 
						|
        expect(json_response['default_snippet_visibility']).to eq('internal')
 | 
						|
        expect(json_response['restricted_visibility_levels']).to eq(['public'])
 | 
						|
        expect(json_response['default_artifacts_expire_in']).to eq('2 days')
 | 
						|
        expect(json_response['help_page_text']).to eq('custom help text')
 | 
						|
        expect(json_response['help_page_hide_commercial_content']).to be_truthy
 | 
						|
        expect(json_response['help_page_support_url']).to eq('http://example.com/help')
 | 
						|
        expect(json_response['project_export_enabled']).to be_falsey
 | 
						|
        expect(json_response['rsa_key_restriction']).to eq(ApplicationSetting::FORBIDDEN_KEY_VALUE)
 | 
						|
        expect(json_response['dsa_key_restriction']).to eq(2048)
 | 
						|
        expect(json_response['ecdsa_key_restriction']).to eq(384)
 | 
						|
        expect(json_response['ed25519_key_restriction']).to eq(256)
 | 
						|
        expect(json_response['enforce_terms']).to be(true)
 | 
						|
        expect(json_response['terms']).to eq('Hello world!')
 | 
						|
        expect(json_response['performance_bar_allowed_group_id']).to eq(group.id)
 | 
						|
        expect(json_response['instance_statistics_visibility_private']).to be(true)
 | 
						|
        expect(json_response['diff_max_patch_bytes']).to eq(150_000)
 | 
						|
        expect(json_response['default_branch_protection']).to eq(Gitlab::Access::PROTECTION_DEV_CAN_MERGE)
 | 
						|
        expect(json_response['local_markdown_version']).to eq(3)
 | 
						|
      end
 | 
						|
    end
 | 
						|
 | 
						|
    it "supports legacy performance_bar_allowed_group_id" do
 | 
						|
      put api("/application/settings", admin),
 | 
						|
        params: { performance_bar_allowed_group_id: group.full_path }
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(200)
 | 
						|
      expect(json_response['performance_bar_allowed_group_id']).to eq(group.id)
 | 
						|
    end
 | 
						|
 | 
						|
    it "supports legacy performance_bar_enabled" do
 | 
						|
      put api("/application/settings", admin),
 | 
						|
        params: {
 | 
						|
          performance_bar_enabled: false,
 | 
						|
          performance_bar_allowed_group_id: group.full_path
 | 
						|
        }
 | 
						|
 | 
						|
      expect(response).to have_gitlab_http_status(200)
 | 
						|
      expect(json_response['performance_bar_allowed_group_id']).to be_nil
 | 
						|
    end
 | 
						|
 | 
						|
    context "missing plantuml_url value when plantuml_enabled is true" do
 | 
						|
      it "returns a blank parameter error message" do
 | 
						|
        put api("/application/settings", admin), params: { plantuml_enabled: true }
 | 
						|
 | 
						|
        expect(response).to have_gitlab_http_status(400)
 | 
						|
        expect(json_response['error']).to eq('plantuml_url is missing')
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 |