2015-07-18 01:54:04 -04:00
|
|
|
require('spec_helper')
|
|
|
|
|
|
|
|
describe Projects::IssuesController do
|
2016-03-21 14:32:37 -04:00
|
|
|
let(:project) { create(:project_empty_repo) }
|
2016-02-26 03:55:43 -05:00
|
|
|
let(:user) { create(:user) }
|
|
|
|
let(:issue) { create(:issue, project: project) }
|
2015-07-18 01:54:04 -04:00
|
|
|
|
2016-02-26 03:55:43 -05:00
|
|
|
describe "GET #index" do
|
2016-03-17 15:38:51 -04:00
|
|
|
before do
|
|
|
|
sign_in(user)
|
|
|
|
project.team << [user, :developer]
|
|
|
|
end
|
2015-07-18 01:54:04 -04:00
|
|
|
|
|
|
|
it "returns index" do
|
2015-09-17 10:06:55 -04:00
|
|
|
get :index, namespace_id: project.namespace.path, project_id: project.path
|
2015-07-18 01:54:04 -04:00
|
|
|
|
|
|
|
expect(response.status).to eq(200)
|
|
|
|
end
|
|
|
|
|
2015-09-17 09:56:16 -04:00
|
|
|
it "return 301 if request path doesn't match project path" do
|
|
|
|
get :index, namespace_id: project.namespace.path, project_id: project.path.upcase
|
|
|
|
|
|
|
|
expect(response).to redirect_to(namespace_project_issues_path(project.namespace, project))
|
|
|
|
end
|
|
|
|
|
2015-07-18 01:54:04 -04:00
|
|
|
it "returns 404 when issues are disabled" do
|
|
|
|
project.issues_enabled = false
|
|
|
|
project.save
|
|
|
|
|
2015-09-17 10:06:55 -04:00
|
|
|
get :index, namespace_id: project.namespace.path, project_id: project.path
|
2015-07-18 01:54:04 -04:00
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns 404 when external issue tracker is enabled" do
|
2015-09-17 10:06:55 -04:00
|
|
|
controller.instance_variable_set(:@project, project)
|
2015-07-18 01:54:04 -04:00
|
|
|
allow(project).to receive(:default_issues_tracker?).and_return(false)
|
|
|
|
|
2015-09-17 10:06:55 -04:00
|
|
|
get :index, namespace_id: project.namespace.path, project_id: project.path
|
2015-07-18 01:54:04 -04:00
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
2016-03-17 15:38:51 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'Confidential Issues' do
|
2016-03-19 10:35:24 -04:00
|
|
|
let(:project) { create(:project_empty_repo, :public) }
|
2016-03-17 15:38:51 -04:00
|
|
|
let(:assignee) { create(:assignee) }
|
|
|
|
let(:author) { create(:user) }
|
|
|
|
let(:non_member) { create(:user) }
|
|
|
|
let(:member) { create(:user) }
|
|
|
|
let(:admin) { create(:admin) }
|
|
|
|
let!(:issue) { create(:issue, project: project) }
|
|
|
|
let!(:unescaped_parameter_value) { create(:issue, :confidential, project: project, author: author) }
|
|
|
|
let!(:request_forgery_timing_attack) { create(:issue, :confidential, project: project, assignee: assignee) }
|
|
|
|
|
|
|
|
describe 'GET #index' do
|
|
|
|
it 'should not list confidential issues for guests' do
|
|
|
|
sign_out(:user)
|
|
|
|
get_issues
|
|
|
|
|
|
|
|
expect(assigns(:issues)).to eq [issue]
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should not list confidential issues for non project members' do
|
|
|
|
sign_in(non_member)
|
|
|
|
get_issues
|
|
|
|
|
|
|
|
expect(assigns(:issues)).to eq [issue]
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should list confidential issues for author' do
|
|
|
|
sign_in(author)
|
|
|
|
get_issues
|
|
|
|
|
|
|
|
expect(assigns(:issues)).to include unescaped_parameter_value
|
|
|
|
expect(assigns(:issues)).not_to include request_forgery_timing_attack
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should list confidential issues for assignee' do
|
|
|
|
sign_in(assignee)
|
|
|
|
get_issues
|
|
|
|
|
|
|
|
expect(assigns(:issues)).not_to include unescaped_parameter_value
|
|
|
|
expect(assigns(:issues)).to include request_forgery_timing_attack
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should list confidential issues for project members' do
|
|
|
|
sign_in(member)
|
|
|
|
project.team << [member, :developer]
|
|
|
|
|
|
|
|
get_issues
|
|
|
|
|
|
|
|
expect(assigns(:issues)).to include unescaped_parameter_value
|
|
|
|
expect(assigns(:issues)).to include request_forgery_timing_attack
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'should list confidential issues for admin' do
|
|
|
|
sign_in(admin)
|
|
|
|
get_issues
|
|
|
|
|
|
|
|
expect(assigns(:issues)).to include unescaped_parameter_value
|
|
|
|
expect(assigns(:issues)).to include request_forgery_timing_attack
|
|
|
|
end
|
|
|
|
|
|
|
|
def get_issues
|
|
|
|
get :index,
|
|
|
|
namespace_id: project.namespace.to_param,
|
|
|
|
project_id: project.to_param
|
|
|
|
end
|
|
|
|
end
|
2015-07-18 01:54:04 -04:00
|
|
|
|
2016-03-17 15:38:51 -04:00
|
|
|
shared_examples_for 'restricted action' do |http_status|
|
|
|
|
it 'returns 404 for guests' do
|
|
|
|
sign_out :user
|
|
|
|
go(id: unescaped_parameter_value.to_param)
|
|
|
|
|
|
|
|
expect(response).to have_http_status :not_found
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns 404 for non project members' do
|
|
|
|
sign_in(non_member)
|
|
|
|
go(id: unescaped_parameter_value.to_param)
|
|
|
|
|
|
|
|
expect(response).to have_http_status :not_found
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns #{http_status[:success]} for author" do
|
|
|
|
sign_in(author)
|
|
|
|
go(id: unescaped_parameter_value.to_param)
|
|
|
|
|
|
|
|
expect(response).to have_http_status http_status[:success]
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns #{http_status[:success]} for assignee" do
|
|
|
|
sign_in(assignee)
|
|
|
|
go(id: request_forgery_timing_attack.to_param)
|
|
|
|
|
|
|
|
expect(response).to have_http_status http_status[:success]
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns #{http_status[:success]} for project members" do
|
|
|
|
sign_in(member)
|
|
|
|
project.team << [member, :developer]
|
|
|
|
go(id: unescaped_parameter_value.to_param)
|
|
|
|
|
|
|
|
expect(response).to have_http_status http_status[:success]
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns #{http_status[:success]} for admin" do
|
|
|
|
sign_in(admin)
|
|
|
|
go(id: unescaped_parameter_value.to_param)
|
|
|
|
|
|
|
|
expect(response).to have_http_status http_status[:success]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET #show' do
|
|
|
|
it_behaves_like 'restricted action', success: 200
|
|
|
|
|
|
|
|
def go(id:)
|
|
|
|
get :show,
|
|
|
|
namespace_id: project.namespace.to_param,
|
|
|
|
project_id: project.to_param,
|
|
|
|
id: id
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET #edit' do
|
|
|
|
it_behaves_like 'restricted action', success: 200
|
|
|
|
|
|
|
|
def go(id:)
|
|
|
|
get :edit,
|
|
|
|
namespace_id: project.namespace.to_param,
|
|
|
|
project_id: project.to_param,
|
|
|
|
id: id
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'PUT #update' do
|
|
|
|
it_behaves_like 'restricted action', success: 302
|
|
|
|
|
|
|
|
def go(id:)
|
|
|
|
put :update,
|
|
|
|
namespace_id: project.namespace.to_param,
|
|
|
|
project_id: project.to_param,
|
|
|
|
id: id,
|
|
|
|
issue: { title: 'New title' }
|
|
|
|
end
|
|
|
|
end
|
2015-07-18 01:54:04 -04:00
|
|
|
end
|
2016-02-26 03:55:43 -05:00
|
|
|
|
|
|
|
describe "DELETE #destroy" do
|
2016-03-21 09:12:52 -04:00
|
|
|
context "when the user is a developer" do
|
|
|
|
before { sign_in(user) }
|
|
|
|
it "rejects a developer to destroy an issue" do
|
|
|
|
delete :destroy, namespace_id: project.namespace.path, project_id: project.path, id: issue.iid
|
|
|
|
expect(response.status).to eq(404)
|
|
|
|
end
|
2016-02-26 03:55:43 -05:00
|
|
|
end
|
|
|
|
|
2016-03-21 09:12:52 -04:00
|
|
|
context "when the user is owner" do
|
|
|
|
let(:owner) { create(:user) }
|
|
|
|
let(:namespace) { create(:namespace, owner: owner) }
|
|
|
|
let(:project) { create(:project, namespace: namespace) }
|
|
|
|
|
2016-03-21 12:12:03 -04:00
|
|
|
before { sign_in(owner) }
|
2016-02-26 03:55:43 -05:00
|
|
|
|
2016-03-21 09:12:52 -04:00
|
|
|
it "deletes the issue" do
|
2016-02-26 03:55:43 -05:00
|
|
|
delete :destroy, namespace_id: project.namespace.path, project_id: project.path, id: issue.iid
|
|
|
|
|
2016-03-21 09:12:52 -04:00
|
|
|
expect(response.status).to eq(302)
|
|
|
|
expect(controller).to set_flash[:notice].to(/The issue was successfully deleted\./).now
|
2016-02-26 03:55:43 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2015-07-18 01:54:04 -04:00
|
|
|
end
|