2014-03-31 09:31:53 -04:00
|
|
|
require 'spec_helper'
|
|
|
|
|
2017-04-21 16:32:02 -04:00
|
|
|
describe API::Branches do
|
2017-09-19 10:11:23 -04:00
|
|
|
set(:user) { create(:user) }
|
2017-07-26 08:33:09 -04:00
|
|
|
let(:project) { create(:project, :repository, creator: user, path: 'my.project') }
|
2017-09-19 10:11:23 -04:00
|
|
|
let(:guest) { create(:user).tap { |u| project.add_guest(u) } }
|
2017-07-26 08:33:09 -04:00
|
|
|
let(:branch_name) { 'feature' }
|
|
|
|
let(:branch_sha) { '0b4bc9a49b562e85de7cc9e834518ea6828729b9' }
|
|
|
|
let(:branch_with_dot) { project.repository.find_branch('ends-with.json') }
|
|
|
|
let(:branch_with_slash) { project.repository.find_branch('improve/awesome') }
|
|
|
|
|
|
|
|
let(:project_id) { project.id }
|
|
|
|
let(:current_user) { nil }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.add_master(user)
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
|
|
|
|
describe "GET /projects/:id/repository/branches" do
|
2017-07-26 08:33:09 -04:00
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches" }
|
2015-07-21 21:52:56 -04:00
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
shared_examples_for 'repository branches' do
|
|
|
|
it 'returns the repository branches' do
|
|
|
|
get api(route, current_user), per_page: 100
|
2017-01-24 15:49:10 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branches')
|
2017-03-20 04:37:14 -04:00
|
|
|
expect(response).to include_pagination_headers
|
|
|
|
branch_names = json_response.map { |x| x['name'] }
|
|
|
|
expect(branch_names).to match_array(project.repository.branch_names)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
context 'when unauthenticated', 'and project is public' do
|
2017-09-19 10:11:23 -04:00
|
|
|
before do
|
|
|
|
project.update(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
|
|
|
|
end
|
2017-07-26 08:33:09 -04:00
|
|
|
|
|
|
|
it_behaves_like 'repository branches'
|
2017-03-20 04:37:14 -04:00
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when authenticated', 'as a master' do
|
|
|
|
let(:current_user) { user }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branches'
|
|
|
|
|
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branches'
|
2017-03-20 04:37:14 -04:00
|
|
|
end
|
|
|
|
end
|
2016-12-06 15:56:59 -05:00
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { get api(route, guest) }
|
|
|
|
end
|
2016-12-06 15:56:59 -05:00
|
|
|
end
|
2017-03-20 04:37:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "GET /projects/:id/repository/branches/:branch" do
|
2017-07-26 08:33:09 -04:00
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches/#{branch_name}" }
|
2016-12-06 15:56:59 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
shared_examples_for 'repository branch' do
|
2017-09-04 19:55:12 -04:00
|
|
|
context 'HEAD request' do
|
|
|
|
it 'returns 204 No Content' do
|
|
|
|
head api(route, user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(204)
|
|
|
|
expect(response.body).to be_empty
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns 404 Not Found' do
|
|
|
|
head api("/projects/#{project_id}/repository/branches/unknown", user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
|
|
expect(response.body).to be_empty
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
it 'returns the repository branch' do
|
|
|
|
get api(route, current_user)
|
2016-11-28 13:16:15 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2017-03-20 04:37:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when branch does not exist' do
|
|
|
|
let(:branch_name) { 'unknown' }
|
|
|
|
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
let(:message) { '404 Branch Not Found' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-10-14 05:32:24 -04:00
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
2016-11-28 13:16:15 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
context 'when unauthenticated', 'and project is public' do
|
2017-09-19 10:11:23 -04:00
|
|
|
before do
|
|
|
|
project.update(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
|
|
|
|
end
|
2017-07-26 08:33:09 -04:00
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when authenticated', 'as a master' do
|
2017-03-20 04:37:14 -04:00
|
|
|
let(:current_user) { user }
|
2017-07-26 08:33:09 -04:00
|
|
|
|
2017-03-20 04:37:14 -04:00
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
|
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot.name }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when branch contains a slash' do
|
|
|
|
let(:branch_name) { branch_with_slash.name }
|
|
|
|
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { get api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when branch contains an escaped slash' do
|
|
|
|
let(:branch_name) { CGI.escape(branch_with_slash.name) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
2017-03-20 04:37:14 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot.name }
|
|
|
|
|
|
|
|
it_behaves_like 'repository branch'
|
|
|
|
end
|
2017-03-20 04:37:14 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { get api(route, guest) }
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-07-12 10:31:55 -04:00
|
|
|
describe 'PUT /projects/:id/repository/branches/:branch/protect' do
|
2017-07-26 08:33:09 -04:00
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches/#{branch_name}/protect" }
|
2016-07-12 10:31:55 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
shared_examples_for 'repository new protected branch' do
|
|
|
|
it 'protects a single branch' do
|
|
|
|
put api(route, current_user)
|
2016-12-06 15:56:59 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2016-12-06 15:56:59 -05:00
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
end
|
|
|
|
|
2016-09-06 01:05:34 -04:00
|
|
|
it 'protects a single branch and developers can push' do
|
2017-07-26 08:33:09 -04:00
|
|
|
put api(route, current_user), developers_can_push: true
|
2014-03-31 09:31:53 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2016-09-06 01:05:34 -04:00
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(true)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(false)
|
|
|
|
end
|
2016-07-12 10:31:55 -04:00
|
|
|
|
2016-09-06 01:05:34 -04:00
|
|
|
it 'protects a single branch and developers can merge' do
|
2017-07-26 08:33:09 -04:00
|
|
|
put api(route, current_user), developers_can_merge: true
|
2016-07-12 10:31:55 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2016-09-06 01:05:34 -04:00
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(false)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(true)
|
|
|
|
end
|
2016-07-19 04:36:18 -04:00
|
|
|
|
2016-09-06 01:05:34 -04:00
|
|
|
it 'protects a single branch and developers can push and merge' do
|
2017-07-26 08:33:09 -04:00
|
|
|
put api(route, current_user), developers_can_push: true, developers_can_merge: true
|
2016-07-19 04:36:18 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
2016-09-06 01:05:34 -04:00
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(true)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(true)
|
|
|
|
end
|
2017-07-26 08:33:09 -04:00
|
|
|
|
|
|
|
context 'when branch does not exist' do
|
|
|
|
let(:branch_name) { 'unknown' }
|
|
|
|
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
let(:message) { '404 Branch Not Found' }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-10-14 05:32:24 -04:00
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
2016-07-12 10:31:55 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
2016-07-12 10:31:55 -04:00
|
|
|
end
|
2017-07-26 08:33:09 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { put api(route, guest) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when authenticated', 'as a master' do
|
|
|
|
let(:current_user) { user }
|
2016-07-12 10:31:55 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context "when a protected branch doesn't already exist" do
|
|
|
|
it_behaves_like 'repository new protected branch'
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot.name }
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it_behaves_like 'repository new protected branch'
|
2016-09-06 01:05:34 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when branch contains a slash' do
|
|
|
|
let(:branch_name) { branch_with_slash.name }
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
2016-09-06 01:05:34 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when branch contains an escaped slash' do
|
|
|
|
let(:branch_name) { CGI.escape(branch_with_slash.name) }
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it_behaves_like 'repository new protected branch'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository new protected branch'
|
|
|
|
|
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot.name }
|
|
|
|
|
|
|
|
it_behaves_like 'repository new protected branch'
|
|
|
|
end
|
2016-09-06 01:05:34 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when protected branch already exists' do
|
|
|
|
before do
|
|
|
|
project.repository.add_branch(user, protected_branch.name, 'master')
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when developers can push and merge' do
|
|
|
|
let(:protected_branch) { create(:protected_branch, :developers_can_push, :developers_can_merge, project: project, name: 'protected_branch') }
|
|
|
|
|
|
|
|
it 'updates that a developer cannot push or merge' do
|
|
|
|
put api("/projects/#{project.id}/repository/branches/#{protected_branch.name}/protect", user),
|
|
|
|
developers_can_push: false, developers_can_merge: false
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(protected_branch.name)
|
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(false)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(false)
|
|
|
|
expect(protected_branch.reload.push_access_levels.first.access_level).to eq(Gitlab::Access::MASTER)
|
|
|
|
expect(protected_branch.reload.merge_access_levels.first.access_level).to eq(Gitlab::Access::MASTER)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when developers cannot push or merge' do
|
|
|
|
let(:protected_branch) { create(:protected_branch, project: project, name: 'protected_branch') }
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it 'updates that a developer can push and merge' do
|
|
|
|
put api("/projects/#{project.id}/repository/branches/#{protected_branch.name}/protect", user),
|
|
|
|
developers_can_push: true, developers_can_merge: true
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(protected_branch.name)
|
|
|
|
expect(json_response['protected']).to eq(true)
|
|
|
|
expect(json_response['developers_can_push']).to eq(true)
|
|
|
|
expect(json_response['developers_can_merge']).to eq(true)
|
|
|
|
end
|
2016-09-06 01:05:34 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2017-07-26 08:33:09 -04:00
|
|
|
end
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
describe 'PUT /projects/:id/repository/branches/:branch/unprotect' do
|
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches/#{branch_name}/unprotect" }
|
2016-07-12 10:31:55 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
shared_examples_for 'repository unprotected branch' do
|
|
|
|
it 'unprotects a single branch' do
|
|
|
|
put api(route, current_user)
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq(CGI.unescape(branch_name))
|
|
|
|
expect(json_response['protected']).to eq(false)
|
2016-07-12 10:31:55 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when branch does not exist' do
|
|
|
|
let(:branch_name) { 'unknown' }
|
2016-07-12 10:31:55 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
let(:message) { '404 Branch Not Found' }
|
|
|
|
end
|
2016-09-06 01:05:34 -04:00
|
|
|
end
|
|
|
|
|
2017-10-14 05:32:24 -04:00
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
2016-09-06 01:05:34 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
2016-07-12 10:31:55 -04:00
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { put api(route, guest) }
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when authenticated', 'as a master' do
|
|
|
|
let(:current_user) { user }
|
|
|
|
|
|
|
|
context "when a protected branch doesn't already exist" do
|
|
|
|
it_behaves_like 'repository unprotected branch'
|
|
|
|
|
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot.name }
|
|
|
|
|
|
|
|
it_behaves_like 'repository unprotected branch'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when branch contains a slash' do
|
|
|
|
let(:branch_name) { branch_with_slash.name }
|
|
|
|
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { put api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when branch contains an escaped slash' do
|
|
|
|
let(:branch_name) { CGI.escape(branch_with_slash.name) }
|
2014-03-31 09:31:53 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it_behaves_like 'repository unprotected branch'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
|
|
|
|
|
|
|
it_behaves_like 'repository unprotected branch'
|
|
|
|
|
|
|
|
context 'when branch contains a dot' do
|
|
|
|
let(:branch_name) { branch_with_dot.name }
|
|
|
|
|
|
|
|
it_behaves_like 'repository unprotected branch'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
2017-07-26 08:33:09 -04:00
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
describe 'POST /projects/:id/repository/branches' do
|
|
|
|
let(:route) { "/projects/#{project_id}/repository/branches" }
|
2016-12-06 15:56:59 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
shared_examples_for 'repository new branch' do
|
|
|
|
it 'creates a new branch' do
|
|
|
|
post api(route, current_user), branch: 'feature1', ref: branch_sha
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(201)
|
|
|
|
expect(response).to match_response_schema('public_api/v4/branch')
|
|
|
|
expect(json_response['name']).to eq('feature1')
|
|
|
|
expect(json_response['commit']['id']).to eq(branch_sha)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when repository is disabled' do
|
|
|
|
include_context 'disabled repository'
|
|
|
|
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { post api(route, current_user) }
|
|
|
|
end
|
|
|
|
end
|
2016-12-06 15:56:59 -05:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when unauthenticated', 'and project is private' do
|
|
|
|
it_behaves_like '404 response' do
|
|
|
|
let(:request) { post api(route) }
|
|
|
|
let(:message) { '404 Project Not Found' }
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when authenticated', 'as a guest' do
|
|
|
|
it_behaves_like '403 response' do
|
|
|
|
let(:request) { post api(route, guest) }
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'when authenticated', 'as a master' do
|
|
|
|
let(:current_user) { user }
|
2014-04-01 03:39:53 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context "when a protected branch doesn't already exist" do
|
|
|
|
it_behaves_like 'repository new branch'
|
2014-04-01 03:39:53 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
context 'requesting with the escaped project full path' do
|
|
|
|
let(:project_id) { CGI.escape(project.full_path) }
|
2014-04-01 03:39:53 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it_behaves_like 'repository new branch'
|
|
|
|
end
|
|
|
|
end
|
2014-04-01 03:39:53 -04:00
|
|
|
end
|
2014-07-27 10:40:00 -04:00
|
|
|
|
2016-08-01 11:00:44 -04:00
|
|
|
it 'returns 400 if branch name is invalid' do
|
2017-07-26 08:33:09 -04:00
|
|
|
post api(route, user), branch: 'new design', ref: branch_sha
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(400)
|
2015-12-18 09:43:53 -05:00
|
|
|
expect(json_response['message']).to eq('Branch name is invalid')
|
2014-07-27 10:40:00 -04:00
|
|
|
end
|
|
|
|
|
2016-08-01 11:00:44 -04:00
|
|
|
it 'returns 400 if branch already exists' do
|
2017-07-26 08:33:09 -04:00
|
|
|
post api(route, user), branch: 'new_design1', ref: branch_sha
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(201)
|
|
|
|
|
|
|
|
post api(route, user), branch: 'new_design1', ref: branch_sha
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(400)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(json_response['message']).to eq('Branch already exists')
|
2014-07-27 10:40:00 -04:00
|
|
|
end
|
|
|
|
|
2016-08-01 11:00:44 -04:00
|
|
|
it 'returns 400 if ref name is invalid' do
|
2017-07-26 08:33:09 -04:00
|
|
|
post api(route, user), branch: 'new_design3', ref: 'foo'
|
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(400)
|
2015-02-12 13:17:35 -05:00
|
|
|
expect(json_response['message']).to eq('Invalid reference name')
|
2014-07-27 10:40:00 -04:00
|
|
|
end
|
2014-04-01 03:39:53 -04:00
|
|
|
end
|
2014-05-23 08:34:02 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
describe 'DELETE /projects/:id/repository/branches/:branch' do
|
2015-05-21 17:49:06 -04:00
|
|
|
before do
|
|
|
|
allow_any_instance_of(Repository).to receive(:rm_branch).and_return(true)
|
|
|
|
end
|
2014-05-23 08:34:02 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it 'removes branch' do
|
2014-08-01 10:30:28 -04:00
|
|
|
delete api("/projects/#{project.id}/repository/branches/#{branch_name}", user)
|
2017-02-20 13:18:12 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(204)
|
2014-05-23 08:34:02 -04:00
|
|
|
end
|
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
it 'removes a branch with dots in the branch name' do
|
2017-03-20 04:37:14 -04:00
|
|
|
delete api("/projects/#{project.id}/repository/branches/#{branch_with_dot.name}", user)
|
2016-12-06 15:56:59 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(204)
|
2016-12-06 15:56:59 -05:00
|
|
|
end
|
|
|
|
|
2016-08-01 11:00:44 -04:00
|
|
|
it 'returns 404 if branch not exists' do
|
2014-07-27 10:40:00 -04:00
|
|
|
delete api("/projects/#{project.id}/repository/branches/foobar", user)
|
2017-07-26 08:33:09 -04:00
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
2014-07-27 10:40:00 -04:00
|
|
|
end
|
2017-08-24 12:03:39 -04:00
|
|
|
|
2017-10-14 05:32:24 -04:00
|
|
|
context 'when the branch refname is invalid' do
|
|
|
|
let(:branch_name) { 'branch*' }
|
|
|
|
let(:message) { 'The branch refname is invalid' }
|
|
|
|
|
|
|
|
it_behaves_like '400 response' do
|
|
|
|
let(:request) { delete api("/projects/#{project.id}/repository/branches/#{branch_name}", user) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-08-24 12:03:39 -04:00
|
|
|
it_behaves_like '412 response' do
|
|
|
|
let(:request) { api("/projects/#{project.id}/repository/branches/#{branch_name}", user) }
|
|
|
|
end
|
2014-05-23 08:34:02 -04:00
|
|
|
end
|
2016-09-21 10:15:12 -04:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
describe 'DELETE /projects/:id/repository/merged_branches' do
|
2016-09-21 10:15:12 -04:00
|
|
|
before do
|
|
|
|
allow_any_instance_of(Repository).to receive(:rm_branch).and_return(true)
|
|
|
|
end
|
|
|
|
|
2017-02-22 12:37:13 -05:00
|
|
|
it 'returns 202 with json body' do
|
2016-09-21 10:15:12 -04:00
|
|
|
delete api("/projects/#{project.id}/repository/merged_branches", user)
|
2017-02-22 12:37:13 -05:00
|
|
|
|
2017-07-26 08:33:09 -04:00
|
|
|
expect(response).to have_gitlab_http_status(202)
|
2017-02-22 12:37:13 -05:00
|
|
|
expect(json_response['message']).to eql('202 Accepted')
|
2016-09-21 10:15:12 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns a 403 error if guest' do
|
2017-03-20 04:37:14 -04:00
|
|
|
delete api("/projects/#{project.id}/repository/merged_branches", guest)
|
2017-07-26 08:33:09 -04:00
|
|
|
|
|
|
|
expect(response).to have_gitlab_http_status(403)
|
2016-09-21 10:15:12 -04:00
|
|
|
end
|
|
|
|
end
|
2014-03-31 09:31:53 -04:00
|
|
|
end
|