2019-11-14 07:06:30 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-06-24 02:09:01 -04:00
|
|
|
RSpec.describe API::GroupExport do
|
2019-11-14 07:06:30 -05:00
|
|
|
let_it_be(:group) { create(:group) }
|
|
|
|
let_it_be(:user) { create(:user) }
|
|
|
|
|
|
|
|
let(:path) { "/groups/#{group.id}/export" }
|
|
|
|
let(:download_path) { "/groups/#{group.id}/export/download" }
|
|
|
|
|
|
|
|
let(:export_path) { "#{Dir.tmpdir}/group_export_spec" }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow_next_instance_of(Gitlab::ImportExport) do |import_export|
|
|
|
|
expect(import_export).to receive(:storage_path).and_return(export_path)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
FileUtils.rm_rf(export_path, secure: true)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /groups/:group_id/export/download' do
|
|
|
|
let(:upload) { ImportExportUpload.new(group: group) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_uploads_object_storage(ImportExportUploader)
|
|
|
|
|
|
|
|
group.add_owner(user)
|
|
|
|
end
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
context 'when export file exists' do
|
2019-11-14 07:06:30 -05:00
|
|
|
before do
|
2022-06-27 11:09:33 -04:00
|
|
|
allow_next_instance_of(Gitlab::ApplicationRateLimiter::BaseStrategy) do |strategy|
|
|
|
|
allow(strategy).to receive(:increment).and_return(0)
|
2022-09-09 14:12:57 -04:00
|
|
|
allow(strategy).to receive(:read).and_return(0)
|
2022-06-27 11:09:33 -04:00
|
|
|
end
|
2019-11-14 07:06:30 -05:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
upload.export_file = fixture_file_upload('spec/fixtures/group_export.tar.gz', "`/tar.gz")
|
|
|
|
upload.save!
|
|
|
|
end
|
2020-01-28 07:08:44 -05:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
it 'downloads exported group archive' do
|
|
|
|
get api(download_path, user)
|
2020-01-28 07:08:44 -05:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
2020-01-28 07:08:44 -05:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
context 'when export_file.file does not exist' do
|
|
|
|
before do
|
|
|
|
expect_next_instance_of(ImportExportUploader) do |uploader|
|
|
|
|
expect(uploader).to receive(:file).and_return(nil)
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
end
|
2021-06-15 02:10:17 -04:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
it 'returns 404' do
|
|
|
|
get api(download_path, user)
|
2021-06-15 02:10:17 -04:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
|
|
end
|
|
|
|
end
|
2021-06-15 02:10:17 -04:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
context 'when object is not present' do
|
|
|
|
let(:other_group) { create(:group, :with_export) }
|
|
|
|
let(:other_download_path) { "/groups/#{other_group.id}/export/download" }
|
2021-06-15 02:10:17 -04:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
before do
|
|
|
|
other_group.add_owner(user)
|
|
|
|
other_group.export_file.file.delete
|
2021-06-15 02:10:17 -04:00
|
|
|
end
|
2019-11-14 07:06:30 -05:00
|
|
|
|
|
|
|
it 'returns 404' do
|
2022-04-13 14:08:33 -04:00
|
|
|
get api(other_download_path, user)
|
2019-11-14 07:06:30 -05:00
|
|
|
|
2020-02-25 07:08:48 -05:00
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
2022-04-13 14:08:33 -04:00
|
|
|
expect(json_response['message']).to eq('The group export file is not available yet')
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
context 'when export file does not exist' do
|
|
|
|
it 'returns 404' do
|
2019-11-14 07:06:30 -05:00
|
|
|
get api(download_path, user)
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
allow(Gitlab::ApplicationRateLimiter)
|
|
|
|
.to receive(:increment)
|
|
|
|
.and_return(0)
|
|
|
|
|
2020-02-25 07:08:48 -05:00
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
end
|
2020-06-03 08:08:21 -04:00
|
|
|
|
|
|
|
context 'when the requests have exceeded the rate limit' do
|
|
|
|
before do
|
|
|
|
allow(Gitlab::ApplicationRateLimiter)
|
|
|
|
.to receive(:increment)
|
2020-07-07 11:08:49 -04:00
|
|
|
.and_return(Gitlab::ApplicationRateLimiter.rate_limits[:group_download_export][:threshold].call + 1)
|
2020-06-03 08:08:21 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'throttles the endpoint' do
|
|
|
|
get api(download_path, user)
|
|
|
|
|
|
|
|
expect(json_response["message"])
|
|
|
|
.to include('error' => 'This endpoint has been requested too many times. Try again later.')
|
|
|
|
expect(response).to have_gitlab_http_status :too_many_requests
|
|
|
|
end
|
|
|
|
end
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'POST /groups/:group_id/export' do
|
2022-04-13 14:08:33 -04:00
|
|
|
context 'when user is a group owner' do
|
2019-11-14 07:06:30 -05:00
|
|
|
before do
|
2022-04-13 14:08:33 -04:00
|
|
|
group.add_owner(user)
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
it 'accepts download' do
|
|
|
|
post api(path, user)
|
2020-01-28 07:08:44 -05:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:accepted)
|
2020-01-28 07:08:44 -05:00
|
|
|
end
|
2022-04-13 14:08:33 -04:00
|
|
|
end
|
2020-01-28 07:08:44 -05:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
context 'when the export cannot be started' do
|
|
|
|
before do
|
|
|
|
group.add_owner(user)
|
|
|
|
allow(GroupExportWorker).to receive(:perform_async).and_return(nil)
|
2020-04-09 08:09:24 -04:00
|
|
|
end
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
it 'returns an error' do
|
|
|
|
post api(path, user)
|
2020-01-28 07:08:44 -05:00
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:error)
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
context 'when user is not a group owner' do
|
2019-11-14 07:06:30 -05:00
|
|
|
before do
|
2022-04-13 14:08:33 -04:00
|
|
|
group.add_developer(user)
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
it 'forbids the request' do
|
2019-11-14 07:06:30 -05:00
|
|
|
post api(path, user)
|
|
|
|
|
2022-04-13 14:08:33 -04:00
|
|
|
expect(response).to have_gitlab_http_status(:forbidden)
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
|
|
|
end
|
2020-06-03 08:08:21 -04:00
|
|
|
|
|
|
|
context 'when the requests have exceeded the rate limit' do
|
|
|
|
before do
|
|
|
|
group.add_owner(user)
|
|
|
|
|
2022-06-27 11:09:33 -04:00
|
|
|
allow_next_instance_of(Gitlab::ApplicationRateLimiter::BaseStrategy) do |strategy|
|
|
|
|
allow(strategy)
|
|
|
|
.to receive(:increment)
|
|
|
|
.and_return(Gitlab::ApplicationRateLimiter.rate_limits[:group_export][:threshold].call + 1)
|
|
|
|
end
|
2020-06-03 08:08:21 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'throttles the endpoint' do
|
|
|
|
post api(path, user)
|
|
|
|
|
|
|
|
expect(json_response["message"])
|
|
|
|
.to include('error' => 'This endpoint has been requested too many times. Try again later.')
|
|
|
|
expect(response).to have_gitlab_http_status :too_many_requests
|
|
|
|
end
|
|
|
|
end
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|
2021-05-04 14:10:03 -04:00
|
|
|
|
|
|
|
describe 'relations export' do
|
|
|
|
let(:path) { "/groups/#{group.id}/export_relations" }
|
|
|
|
let(:download_path) { "/groups/#{group.id}/export_relations/download?relation=labels" }
|
|
|
|
let(:status_path) { "/groups/#{group.id}/export_relations/status" }
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.add_owner(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'POST /groups/:id/export_relations' do
|
|
|
|
it 'accepts the request' do
|
|
|
|
post api(path, user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:accepted)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when response is not success' do
|
|
|
|
it 'returns api error' do
|
|
|
|
allow_next_instance_of(BulkImports::ExportService) do |service|
|
|
|
|
allow(service).to receive(:execute).and_return(ServiceResponse.error(message: 'error', http_status: :error))
|
|
|
|
end
|
|
|
|
|
|
|
|
post api(path, user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:error)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /groups/:id/export_relations/download' do
|
|
|
|
let(:export) { create(:bulk_import_export, group: group, relation: 'labels') }
|
|
|
|
let(:upload) { create(:bulk_import_export_upload, export: export) }
|
|
|
|
|
|
|
|
context 'when export file exists' do
|
|
|
|
it 'downloads exported group archive' do
|
2021-06-02 14:10:01 -04:00
|
|
|
upload.update!(export_file: fixture_file_upload('spec/fixtures/bulk_imports/gz/labels.ndjson.gz'))
|
2021-05-04 14:10:03 -04:00
|
|
|
|
|
|
|
get api(download_path, user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when export_file.file does not exist' do
|
|
|
|
it 'returns 404' do
|
|
|
|
allow(upload).to receive(:export_file).and_return(nil)
|
|
|
|
|
|
|
|
get api(download_path, user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'GET /groups/:id/export_relations/status' do
|
|
|
|
it 'returns a list of relation export statuses' do
|
|
|
|
create(:bulk_import_export, :started, group: group, relation: 'labels')
|
|
|
|
create(:bulk_import_export, :finished, group: group, relation: 'milestones')
|
|
|
|
create(:bulk_import_export, :failed, group: group, relation: 'badges')
|
|
|
|
|
|
|
|
get api(status_path, user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
|
|
expect(json_response.pluck('relation')).to contain_exactly('labels', 'milestones', 'badges')
|
|
|
|
expect(json_response.pluck('status')).to contain_exactly(-1, 0, 1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-11-14 07:06:30 -05:00
|
|
|
end
|