gitlab-org--gitlab-foss/spec/requests/api/projects_spec.rb

755 lines
27 KiB
Ruby
Raw Normal View History

2012-06-27 08:51:39 -04:00
require 'spec_helper'
describe API::API do
include ApiHelpers
before(:each) { enable_observers }
Merge Request on forked projects The good: - You can do a merge request for a forked commit and it will merge properly (i.e. it does work). - Push events take into account merge requests on forked projects - Tests around merge_actions now present, spinach, and other rspec tests - Satellites now clean themselves up rather then recreate The questionable: - Events only know about target projects - Project's merge requests only hold on to MR's where they are the target - All operations performed in the satellite The bad: - Duplication between project's repositories and satellites (e.g. commits_between) (for reference: http://feedback.gitlab.com/forums/176466-general/suggestions/3456722-merge-requests-between-projects-repos) Fixes: Make test repos/satellites only create when needed -Spinach/Rspec now only initialize test directory, and setup stubs (things that are relatively cheap) -project_with_code, source_project_with_code, and target_project_with_code now create/destroy their repos individually -fixed remote removal -How to merge renders properly -Update emails to show project/branches -Edit MR doesn't set target branch -Fix some failures on editing/creating merge requests, added a test -Added back a test around merge request observer -Clean up project_transfer_spec, Remove duplicate enable/disable observers -Ensure satellite lock files are cleaned up, Attempted to add some testing around these as well -Signifant speed ups for tests -Update formatting ordering in notes_on_merge_requests -Remove wiki schema update Fixes for search/search results -Search results was using by_project for a list of projects, updated this to use in_projects -updated search results to reference the correct (target) project -udpated search results to print both sides of the merge request Change-Id: I19407990a0950945cc95d62089cbcc6262dab1a8
2013-04-25 10:15:33 -04:00
after(:each) { disable_observers }
let(:user) { create(:user) }
let(:user2) { create(:user) }
let(:user3) { create(:user) }
2012-11-14 15:37:52 -05:00
let(:admin) { create(:admin) }
let(:project) { create(:project, creator_id: user.id, namespace: user.namespace) }
let(:snippet) { create(:project_snippet, author: user, project: project, title: 'example') }
let(:users_project) { create(:users_project, user: user, project: project, project_access: UsersProject::MASTER) }
let(:users_project2) { create(:users_project, user: user3, project: project, project_access: UsersProject::DEVELOPER) }
2012-06-27 08:51:39 -04:00
describe "GET /projects" do
before { project }
context "when unauthenticated" do
it "should return authentication error" do
get api("/projects")
response.status.should == 401
end
2012-06-27 08:51:39 -04:00
end
context "when authenticated" do
2012-06-27 08:51:39 -04:00
it "should return an array of projects" do
2012-08-25 13:43:55 -04:00
get api("/projects", user)
2012-06-27 08:51:39 -04:00
response.status.should == 200
2012-07-04 03:48:00 -04:00
json_response.should be_an Array
json_response.first['name'].should == project.name
json_response.first['owner']['email'].should == user.email
2012-06-27 08:51:39 -04:00
end
end
end
describe "GET /projects/all" do
before { project }
context "when unauthenticated" do
it "should return authentication error" do
get api("/projects/all")
response.status.should == 401
end
end
context "when authenticated as regular user" do
it "should return authentication error" do
get api("/projects/all", user)
response.status.should == 403
end
end
context "when authenticated as admin" do
it "should return an array of all projects" do
get api("/projects/all", admin)
response.status.should == 200
json_response.should be_an Array
json_response.first['name'].should == project.name
json_response.first['owner']['email'].should == user.email
end
end
end
2012-08-31 03:15:37 -04:00
describe "POST /projects" do
context "maximum number of projects reached" do
before do
(1..user2.projects_limit).each do |project|
post api("/projects", user2), name: "foo#{project}"
end
end
it "should not create new project" do
expect {
post api("/projects", user2), name: 'foo'
}.to change {Project.count}.by(0)
end
end
2012-11-23 14:31:09 -05:00
it "should create new project without path" do
expect { post api("/projects", user), name: 'foo' }.to change {Project.count}.by(1)
2012-08-31 03:15:37 -04:00
end
2012-09-04 03:29:26 -04:00
it "should not create new project without name" do
expect { post api("/projects", user) }.to_not change {Project.count}
2012-09-04 03:29:26 -04:00
end
it "should return a 400 error if name not given" do
post api("/projects", user)
response.status.should == 400
end
it "should create last project before reaching project limit" do
(1..user2.projects_limit-1).each { |p| post api("/projects", user2), name: "foo#{p}" }
post api("/projects", user2), name: "foo"
response.status.should == 201
end
2012-09-04 03:29:26 -04:00
it "should respond with 201 on success" do
post api("/projects", user), name: 'foo'
response.status.should == 201
2012-08-31 03:15:37 -04:00
end
2012-09-04 03:29:26 -04:00
it "should respond with 400 if name is not given" do
2012-09-04 03:29:26 -04:00
post api("/projects", user)
response.status.should == 400
2012-08-31 03:15:37 -04:00
end
2012-09-04 03:29:26 -04:00
it "should return a 403 error if project limit reached" do
(1..user.projects_limit).each do |p|
post api("/projects", user), name: "foo#{p}"
end
post api("/projects", user), name: 'bar'
response.status.should == 403
end
2012-09-04 03:29:26 -04:00
it "should assign attributes to project" do
project = attributes_for(:project, {
description: Faker::Lorem.sentence,
issues_enabled: false,
wall_enabled: false,
merge_requests_enabled: false,
wiki_enabled: false
2012-09-04 03:29:26 -04:00
})
post api("/projects", user), project
project.each_pair do |k,v|
2012-12-22 17:15:48 -05:00
next if k == :path
2012-09-04 03:29:26 -04:00
json_response[k.to_s].should == v
end
2012-08-31 03:15:37 -04:00
end
it "should set a project as public" do
project = attributes_for(:project, { visibility_level: Gitlab::VisibilityLevel::PUBLIC })
post api("/projects", user), project
json_response['public'].should be_true
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PUBLIC
end
it "should set a project as public using :public" do
project = attributes_for(:project, { public: true })
post api("/projects", user), project
json_response['public'].should be_true
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PUBLIC
end
it "should set a project as internal" do
project = attributes_for(:project, { visibility_level: Gitlab::VisibilityLevel::INTERNAL })
post api("/projects", user), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::INTERNAL
end
it "should set a project as internal overriding :public" do
project = attributes_for(:project, { public: true, visibility_level: Gitlab::VisibilityLevel::INTERNAL })
post api("/projects", user), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::INTERNAL
end
it "should set a project as private" do
project = attributes_for(:project, { visibility_level: Gitlab::VisibilityLevel::PRIVATE })
post api("/projects", user), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PRIVATE
end
it "should set a project as private using :public" do
project = attributes_for(:project, { public: false })
post api("/projects", user), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PRIVATE
end
2012-08-31 03:15:37 -04:00
end
2012-11-14 15:37:52 -05:00
describe "POST /projects/user/:id" do
before { project }
2012-11-14 15:37:52 -05:00
before { admin }
it "should create new project without path" do
expect { post api("/projects/user/#{user.id}", admin), name: 'foo' }.to change {Project.count}.by(1)
2012-11-14 15:37:52 -05:00
end
it "should not create new project without name" do
expect { post api("/projects/user/#{user.id}", admin) }.to_not change {Project.count}
2012-11-14 15:37:52 -05:00
end
it "should respond with 201 on success" do
post api("/projects/user/#{user.id}", admin), name: 'foo'
response.status.should == 201
end
it "should respond with 404 on failure" do
post api("/projects/user/#{user.id}", admin)
response.status.should == 404
end
it "should assign attributes to project" do
project = attributes_for(:project, {
description: Faker::Lorem.sentence,
issues_enabled: false,
wall_enabled: false,
merge_requests_enabled: false,
wiki_enabled: false
2012-11-14 15:37:52 -05:00
})
post api("/projects/user/#{user.id}", admin), project
project.each_pair do |k,v|
2012-11-14 15:37:52 -05:00
next if k == :path
json_response[k.to_s].should == v
end
end
it "should set a project as public" do
project = attributes_for(:project, { visibility_level: Gitlab::VisibilityLevel::PUBLIC })
post api("/projects/user/#{user.id}", admin), project
json_response['public'].should be_true
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PUBLIC
end
it "should set a project as public using :public" do
project = attributes_for(:project, { public: true })
post api("/projects/user/#{user.id}", admin), project
json_response['public'].should be_true
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PUBLIC
end
it "should set a project as internal" do
project = attributes_for(:project, { visibility_level: Gitlab::VisibilityLevel::INTERNAL })
post api("/projects/user/#{user.id}", admin), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::INTERNAL
end
it "should set a project as internal overriding :public" do
project = attributes_for(:project, { public: true, visibility_level: Gitlab::VisibilityLevel::INTERNAL })
post api("/projects/user/#{user.id}", admin), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::INTERNAL
end
it "should set a project as private" do
project = attributes_for(:project, { visibility_level: Gitlab::VisibilityLevel::PRIVATE })
post api("/projects/user/#{user.id}", admin), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PRIVATE
end
it "should set a project as private using :public" do
project = attributes_for(:project, { public: false })
post api("/projects/user/#{user.id}", admin), project
json_response['public'].should be_false
json_response['visibility_level'].should == Gitlab::VisibilityLevel::PRIVATE
end
2012-11-14 15:37:52 -05:00
end
2012-06-27 08:51:39 -04:00
describe "GET /projects/:id" do
before { project }
2012-06-27 08:51:39 -04:00
it "should return a project by id" do
2012-08-25 13:43:55 -04:00
get api("/projects/#{project.id}", user)
2012-06-27 08:51:39 -04:00
response.status.should == 200
2012-07-04 03:48:00 -04:00
json_response['name'].should == project.name
json_response['owner']['email'].should == user.email
2012-06-27 08:51:39 -04:00
end
2012-07-25 05:18:30 -04:00
2012-11-23 14:31:09 -05:00
it "should return a project by path name" do
get api("/projects/#{project.id}", user)
2012-07-25 05:18:30 -04:00
response.status.should == 200
json_response['name'].should == project.name
end
2012-07-25 08:24:28 -04:00
it "should return a 404 error if not found" do
2012-08-25 13:43:55 -04:00
get api("/projects/42", user)
2012-07-25 08:24:28 -04:00
response.status.should == 404
2012-09-10 06:49:00 -04:00
json_response['message'].should == '404 Not Found'
2012-07-25 08:24:28 -04:00
end
it "should return a 404 error if user is not a member" do
other_user = create(:user)
get api("/projects/#{project.id}", other_user)
response.status.should == 404
end
2012-06-27 08:51:39 -04:00
end
2013-06-06 12:19:17 -04:00
describe "GET /projects/:id/events" do
before { users_project }
2013-06-06 12:19:17 -04:00
it "should return a project events" do
get api("/projects/#{project.id}/events", user)
response.status.should == 200
json_event = json_response.first
json_event['action_name'].should == 'joined'
json_event['project_id'].to_i.should == project.id
end
it "should return a 404 error if not found" do
get api("/projects/42/events", user)
response.status.should == 404
json_response['message'].should == '404 Not Found'
end
it "should return a 404 error if user is not a member" do
other_user = create(:user)
get api("/projects/#{project.id}/events", other_user)
response.status.should == 404
end
end
2012-09-21 06:23:17 -04:00
describe "GET /projects/:id/members" do
before { users_project }
before { users_project2 }
2012-09-21 06:23:17 -04:00
it "should return project team members" do
get api("/projects/#{project.id}/members", user)
2012-09-08 10:51:28 -04:00
response.status.should == 200
json_response.should be_an Array
2012-09-08 12:39:10 -04:00
json_response.count.should == 2
2013-05-02 01:46:27 -04:00
json_response.map { |u| u['email'] }.should include user.email
2012-09-08 10:51:28 -04:00
end
2012-12-18 13:52:18 -05:00
it "finds team members with query string" do
get api("/projects/#{project.id}/members", user), query: user.username
2012-12-18 13:52:18 -05:00
response.status.should == 200
json_response.should be_an Array
json_response.count.should == 1
json_response.first['email'].should == user.email
end
it "should return a 404 error if id not found" do
get api("/projects/9999/members", user)
response.status.should == 404
end
2012-09-08 10:51:28 -04:00
end
2012-09-21 06:23:17 -04:00
describe "GET /projects/:id/members/:user_id" do
before { users_project }
2012-09-21 06:23:17 -04:00
it "should return project team member" do
get api("/projects/#{project.id}/members/#{user.id}", user)
2012-09-21 06:23:17 -04:00
response.status.should == 200
json_response['email'].should == user.email
json_response['access_level'].should == UsersProject::MASTER
2012-09-08 10:40:36 -04:00
end
it "should return a 404 error if user id not found" do
get api("/projects/#{project.id}/members/1234", user)
response.status.should == 404
end
2012-09-08 10:40:36 -04:00
end
2012-09-21 06:23:17 -04:00
describe "POST /projects/:id/members" do
it "should add user to project team" do
2012-09-08 10:40:36 -04:00
expect {
post api("/projects/#{project.id}/members", user), user_id: user2.id,
access_level: UsersProject::DEVELOPER
2012-09-21 06:23:17 -04:00
}.to change { UsersProject.count }.by(1)
response.status.should == 201
json_response['email'].should == user2.email
json_response['access_level'].should == UsersProject::DEVELOPER
end
it "should return a 201 status if user is already project member" do
post api("/projects/#{project.id}/members", user), user_id: user2.id,
access_level: UsersProject::DEVELOPER
expect {
post api("/projects/#{project.id}/members", user), user_id: user2.id,
access_level: UsersProject::DEVELOPER
}.not_to change { UsersProject.count }.by(1)
response.status.should == 201
json_response['email'].should == user2.email
json_response['access_level'].should == UsersProject::DEVELOPER
end
it "should return a 400 error when user id is not given" do
post api("/projects/#{project.id}/members", user), access_level: UsersProject::MASTER
response.status.should == 400
end
it "should return a 400 error when access level is not given" do
post api("/projects/#{project.id}/members", user), user_id: user2.id
response.status.should == 400
end
it "should return a 422 error when access level is not known" do
post api("/projects/#{project.id}/members", user), user_id: user2.id, access_level: 1234
response.status.should == 422
end
2012-09-21 06:23:17 -04:00
end
describe "PUT /projects/:id/members/:user_id" do
before { users_project2 }
2012-09-21 06:23:17 -04:00
it "should update project team member" do
put api("/projects/#{project.id}/members/#{user3.id}", user), access_level: UsersProject::MASTER
2012-09-21 06:23:17 -04:00
response.status.should == 200
json_response['email'].should == user3.email
json_response['access_level'].should == UsersProject::MASTER
2012-09-08 10:40:36 -04:00
end
it "should return a 404 error if user_id is not found" do
put api("/projects/#{project.id}/members/1234", user), access_level: UsersProject::MASTER
response.status.should == 404
end
it "should return a 400 error when access level is not given" do
put api("/projects/#{project.id}/members/#{user3.id}", user)
response.status.should == 400
end
it "should return a 422 error when access level is not known" do
put api("/projects/#{project.id}/members/#{user3.id}", user), access_level: 123
response.status.should == 422
end
2012-09-08 10:40:36 -04:00
end
2012-09-21 06:23:17 -04:00
describe "DELETE /projects/:id/members/:user_id" do
before { users_project }
before { users_project2 }
2012-09-21 06:23:17 -04:00
it "should remove user from project team" do
2012-09-08 10:40:36 -04:00
expect {
delete api("/projects/#{project.id}/members/#{user3.id}", user)
2012-09-21 06:23:17 -04:00
}.to change { UsersProject.count }.by(-1)
2012-09-08 10:40:36 -04:00
end
it "should return 200 if team member is not part of a project" do
delete api("/projects/#{project.id}/members/#{user3.id}", user)
expect {
delete api("/projects/#{project.id}/members/#{user3.id}", user)
}.to_not change { UsersProject.count }.by(1)
end
it "should return 200 if team member already removed" do
delete api("/projects/#{project.id}/members/#{user3.id}", user)
delete api("/projects/#{project.id}/members/#{user3.id}", user)
response.status.should == 200
end
2012-09-08 10:40:36 -04:00
it "should return 200 OK when the user was not member" do
expect {
delete api("/projects/#{project.id}/members/1000000", user)
}.to change { UsersProject.count }.by(0)
response.status.should == 200
json_response['message'].should == "Access revoked"
json_response['id'].should == 1000000
end
end
2012-10-08 05:13:53 -04:00
describe "GET /projects/:id/snippets" do
before { snippet }
2012-10-19 06:25:39 -04:00
it "should return an array of project snippets" do
get api("/projects/#{project.id}/snippets", user)
2012-10-08 05:13:53 -04:00
response.status.should == 200
json_response.should be_an Array
json_response.first['title'].should == snippet.title
end
end
2012-06-29 09:34:08 -04:00
describe "GET /projects/:id/snippets/:snippet_id" do
it "should return a project snippet" do
get api("/projects/#{project.id}/snippets/#{snippet.id}", user)
2012-06-29 09:34:08 -04:00
response.status.should == 200
2012-07-04 03:48:00 -04:00
json_response['title'].should == snippet.title
2012-06-29 09:34:08 -04:00
end
it "should return a 404 error if snippet id not found" do
get api("/projects/#{project.id}/snippets/1234", user)
response.status.should == 404
end
2012-06-29 09:34:08 -04:00
end
describe "POST /projects/:id/snippets" do
it "should create a new project snippet" do
post api("/projects/#{project.id}/snippets", user),
title: 'api test', file_name: 'sample.rb', code: 'test'
2012-06-29 09:34:08 -04:00
response.status.should == 201
2012-07-04 03:48:00 -04:00
json_response['title'].should == 'api test'
2012-06-29 09:34:08 -04:00
end
it "should return a 400 error if title is not given" do
post api("/projects/#{project.id}/snippets", user),
file_name: 'sample.rb', code: 'test'
response.status.should == 400
end
it "should return a 400 error if file_name not given" do
post api("/projects/#{project.id}/snippets", user),
title: 'api test', code: 'test'
response.status.should == 400
end
it "should return a 400 error if code not given" do
post api("/projects/#{project.id}/snippets", user),
title: 'api test', file_name: 'sample.rb'
response.status.should == 400
end
2012-06-29 09:34:08 -04:00
end
describe "PUT /projects/:id/snippets/:shippet_id" do
it "should update an existing project snippet" do
put api("/projects/#{project.id}/snippets/#{snippet.id}", user),
code: 'updated code'
response.status.should == 200
json_response['title'].should == 'example'
snippet.reload.content.should == 'updated code'
end
it "should update an existing project snippet with new title" do
put api("/projects/#{project.id}/snippets/#{snippet.id}", user),
title: 'other api test'
response.status.should == 200
json_response['title'].should == 'other api test'
end
end
2012-06-29 09:34:08 -04:00
describe "DELETE /projects/:id/snippets/:snippet_id" do
before { snippet }
2012-07-13 09:10:30 -04:00
it "should delete existing project snippet" do
2012-06-29 09:34:08 -04:00
expect {
delete api("/projects/#{project.id}/snippets/#{snippet.id}", user)
}.to change { Snippet.count }.by(-1)
response.status.should == 200
end
it "should return success when deleting unknown snippet id" do
delete api("/projects/#{project.id}/snippets/1234", user)
response.status.should == 200
2012-06-29 09:34:08 -04:00
end
end
describe "GET /projects/:id/snippets/:snippet_id/raw" do
it "should get a raw project snippet" do
get api("/projects/#{project.id}/snippets/#{snippet.id}/raw", user)
response.status.should == 200
end
it "should return a 404 error if raw project snippet not found" do
get api("/projects/#{project.id}/snippets/5555/raw", user)
response.status.should == 404
end
end
describe :deploy_keys do
let(:deploy_keys_project) { create(:deploy_keys_project, project: project) }
let(:deploy_key) { deploy_keys_project.deploy_key }
2013-03-05 16:23:29 -05:00
describe "GET /projects/:id/keys" do
before { deploy_key }
2013-03-05 16:23:29 -05:00
it "should return array of ssh keys" do
get api("/projects/#{project.id}/keys", user)
response.status.should == 200
json_response.should be_an Array
json_response.first['title'].should == deploy_key.title
end
2013-03-05 16:23:29 -05:00
end
describe "GET /projects/:id/keys/:key_id" do
it "should return a single key" do
get api("/projects/#{project.id}/keys/#{deploy_key.id}", user)
response.status.should == 200
json_response['title'].should == deploy_key.title
end
2013-03-05 16:23:29 -05:00
it "should return 404 Not Found with invalid ID" do
get api("/projects/#{project.id}/keys/404", user)
response.status.should == 404
end
2013-03-05 16:23:29 -05:00
end
describe "POST /projects/:id/keys" do
it "should not create an invalid ssh key" do
post api("/projects/#{project.id}/keys", user), { title: "invalid key" }
response.status.should == 404
end
it "should create new ssh key" do
key_attrs = attributes_for :key
expect {
post api("/projects/#{project.id}/keys", user), key_attrs
}.to change{ project.deploy_keys.count }.by(1)
end
2013-03-05 16:23:29 -05:00
end
describe "DELETE /projects/:id/keys/:key_id" do
before { deploy_key }
it "should delete existing key" do
expect {
delete api("/projects/#{project.id}/keys/#{deploy_key.id}", user)
}.to change{ project.deploy_keys.count }.by(-1)
end
it "should return 404 Not Found with invalid ID" do
delete api("/projects/#{project.id}/keys/404", user)
response.status.should == 404
end
2013-03-05 16:23:29 -05:00
end
end
describe :fork_admin do
let(:project_fork_target) { create(:project) }
let(:project_fork_source) { create(:project, visibility_level: Gitlab::VisibilityLevel::PUBLIC) }
describe "POST /projects/:id/fork/:forked_from_id" do
let(:new_project_fork_source) { create(:project, visibility_level: Gitlab::VisibilityLevel::PUBLIC) }
it "shouldn't available for non admin users" do
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", user)
response.status.should == 403
end
it "should allow project to be forked from an existing project" do
project_fork_target.forked?.should_not be_true
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", admin)
response.status.should == 201
project_fork_target.reload
project_fork_target.forked_from_project.id.should == project_fork_source.id
project_fork_target.forked_project_link.should_not be_nil
project_fork_target.forked?.should be_true
end
it "should fail if forked_from project which does not exist" do
post api("/projects/#{project_fork_target.id}/fork/9999", admin)
response.status.should == 404
end
it "should fail with 409 if already forked" do
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", admin)
project_fork_target.reload
project_fork_target.forked_from_project.id.should == project_fork_source.id
post api("/projects/#{project_fork_target.id}/fork/#{new_project_fork_source.id}", admin)
response.status.should == 409
project_fork_target.reload
project_fork_target.forked_from_project.id.should == project_fork_source.id
project_fork_target.forked?.should be_true
end
end
describe "DELETE /projects/:id/fork" do
it "shouldn't available for non admin users" do
delete api("/projects/#{project_fork_target.id}/fork", user)
response.status.should == 403
end
it "should make forked project unforked" do
post api("/projects/#{project_fork_target.id}/fork/#{project_fork_source.id}", admin)
project_fork_target.reload
project_fork_target.forked_from_project.should_not be_nil
project_fork_target.forked?.should be_true
delete api("/projects/#{project_fork_target.id}/fork", admin)
response.status.should == 200
project_fork_target.reload
project_fork_target.forked_from_project.should be_nil
project_fork_target.forked?.should_not be_true
end
it "should be idempotent if not forked" do
project_fork_target.forked_from_project.should be_nil
delete api("/projects/#{project_fork_target.id}/fork", admin)
response.status.should == 200
project_fork_target.reload.forked_from_project.should be_nil
end
end
end
describe "GET /projects/search/:query" do
let!(:query) { 'query'}
let!(:search) { create(:empty_project, name: query, creator_id: user.id, namespace: user.namespace) }
let!(:pre) { create(:empty_project, name: "pre_#{query}", creator_id: user.id, namespace: user.namespace) }
let!(:post) { create(:empty_project, name: "#{query}_post", creator_id: user.id, namespace: user.namespace) }
let!(:pre_post) { create(:empty_project, name: "pre_#{query}_post", creator_id: user.id, namespace: user.namespace) }
let!(:unfound) { create(:empty_project, name: 'unfound', creator_id: user.id, namespace: user.namespace) }
let!(:internal) { create(:empty_project, name: "internal #{query}", visibility_level: Gitlab::VisibilityLevel::INTERNAL) }
let!(:unfound_internal) { create(:empty_project, name: 'unfound internal', visibility_level: Gitlab::VisibilityLevel::INTERNAL) }
let!(:public) { create(:empty_project, name: "public #{query}", visibility_level: Gitlab::VisibilityLevel::PUBLIC) }
let!(:unfound_public) { create(:empty_project, name: 'unfound public', visibility_level: Gitlab::VisibilityLevel::PUBLIC) }
context "when unauthenticated" do
it "should return authentication error" do
get api("/projects/search/#{query}")
response.status.should == 401
end
end
context "when authenticated" do
it "should return an array of projects" do
get api("/projects/search/#{query}",user)
response.status.should == 200
json_response.should be_an Array
json_response.size.should == 6
json_response.each {|project| project['name'].should =~ /.*query.*/}
end
end
context "when authenticated as a different user" do
it "should return matching public projects" do
get api("/projects/search/#{query}", user2)
response.status.should == 200
json_response.should be_an Array
json_response.size.should == 2
json_response.each {|project| project['name'].should =~ /(internal|public) query/}
end
end
end
2013-10-09 07:41:54 -04:00
describe "DELETE /projects/:id" do
context "when authenticated as user" do
it "should remove project" do
delete api("/projects/#{project.id}", user)
response.status.should == 200
end
it "should not remove a project if not an owner" do
user3 = create(:user)
project.team << [user3, :developer]
delete api("/projects/#{project.id}", user3)
response.status.should == 403
end
it "should not remove a non existing project" do
delete api("/projects/1328", user)
response.status.should == 404
end
it "should not remove a project not attached to user" do
delete api("/projects/#{project.id}", user2)
response.status.should == 404
end
end
context "when authenticated as admin" do
it "should remove any existing project" do
delete api("/projects/#{project.id}", admin)
response.status.should == 200
end
it "should not remove a non existing project" do
delete api("/projects/1328", admin)
response.status.should == 404
end
end
end
2012-06-27 08:51:39 -04:00
end