2019-03-30 03:23:56 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-01-04 16:35:31 -05:00
|
|
|
require "spec_helper"
|
|
|
|
|
2020-06-24 14:09:03 -04:00
|
|
|
RSpec.describe ProjectTeam do
|
2020-09-16 11:09:32 -04:00
|
|
|
include ProjectForksHelper
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
let(:maintainer) { create(:user) }
|
2014-06-04 04:52:17 -04:00
|
|
|
let(:reporter) { create(:user) }
|
|
|
|
let(:guest) { create(:user) }
|
|
|
|
let(:nonmember) { create(:user) }
|
2013-01-04 16:35:31 -05:00
|
|
|
|
2014-06-20 05:54:03 -04:00
|
|
|
context 'personal project' do
|
2017-08-02 15:55:11 -04:00
|
|
|
let(:project) { create(:project) }
|
2014-06-04 04:52:17 -04:00
|
|
|
|
2014-06-20 05:54:03 -04:00
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
project.add_maintainer(maintainer)
|
2016-11-18 07:52:39 -05:00
|
|
|
project.add_reporter(reporter)
|
|
|
|
project.add_guest(guest)
|
2014-06-20 05:54:03 -04:00
|
|
|
end
|
2014-06-04 04:52:17 -04:00
|
|
|
|
2014-06-20 05:54:03 -04:00
|
|
|
describe 'members collection' do
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.maintainers).to include(maintainer) }
|
|
|
|
it { expect(project.team.maintainers).not_to include(guest) }
|
|
|
|
it { expect(project.team.maintainers).not_to include(reporter) }
|
|
|
|
it { expect(project.team.maintainers).not_to include(nonmember) }
|
2014-06-20 05:54:03 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'access methods' do
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.maintainer?(maintainer)).to be_truthy }
|
|
|
|
it { expect(project.team.maintainer?(guest)).to be_falsey }
|
|
|
|
it { expect(project.team.maintainer?(reporter)).to be_falsey }
|
|
|
|
it { expect(project.team.maintainer?(nonmember)).to be_falsey }
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(project.team.member?(nonmember)).to be_falsey }
|
|
|
|
it { expect(project.team.member?(guest)).to be_truthy }
|
2016-06-06 15:13:31 -04:00
|
|
|
it { expect(project.team.member?(reporter, Gitlab::Access::REPORTER)).to be_truthy }
|
|
|
|
it { expect(project.team.member?(guest, Gitlab::Access::REPORTER)).to be_falsey }
|
|
|
|
it { expect(project.team.member?(nonmember, Gitlab::Access::GUEST)).to be_falsey }
|
2014-06-20 05:54:03 -04:00
|
|
|
end
|
2014-06-04 04:52:17 -04:00
|
|
|
end
|
|
|
|
|
2014-06-20 05:54:03 -04:00
|
|
|
context 'group project' do
|
|
|
|
let(:group) { create(:group) }
|
2017-08-02 15:55:11 -04:00
|
|
|
let!(:project) { create(:project, group: group) }
|
2014-06-20 05:54:03 -04:00
|
|
|
|
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
group.add_maintainer(maintainer)
|
2015-08-07 00:20:02 -04:00
|
|
|
group.add_reporter(reporter)
|
|
|
|
group.add_guest(guest)
|
2014-06-20 05:54:03 -04:00
|
|
|
|
|
|
|
# If user is a group and a project member - GitLab uses highest permission
|
2018-07-11 10:36:08 -04:00
|
|
|
# So we add group guest as maintainer and add group maintainer as guest
|
2014-06-20 05:54:03 -04:00
|
|
|
# to this project to test highest access
|
2018-07-11 10:36:08 -04:00
|
|
|
project.add_maintainer(guest)
|
|
|
|
project.add_guest(maintainer)
|
2014-06-20 05:54:03 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'members collection' do
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(project.team.reporters).to include(reporter) }
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.maintainers).to include(maintainer) }
|
|
|
|
it { expect(project.team.maintainers).to include(guest) }
|
|
|
|
it { expect(project.team.maintainers).not_to include(reporter) }
|
|
|
|
it { expect(project.team.maintainers).not_to include(nonmember) }
|
2014-06-20 05:54:03 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'access methods' do
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(project.team.reporter?(reporter)).to be_truthy }
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.maintainer?(maintainer)).to be_truthy }
|
|
|
|
it { expect(project.team.maintainer?(guest)).to be_truthy }
|
|
|
|
it { expect(project.team.maintainer?(reporter)).to be_falsey }
|
|
|
|
it { expect(project.team.maintainer?(nonmember)).to be_falsey }
|
2015-02-12 13:17:35 -05:00
|
|
|
it { expect(project.team.member?(nonmember)).to be_falsey }
|
|
|
|
it { expect(project.team.member?(guest)).to be_truthy }
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.member?(guest, Gitlab::Access::MAINTAINER)).to be_truthy }
|
|
|
|
it { expect(project.team.member?(reporter, Gitlab::Access::MAINTAINER)).to be_falsey }
|
2016-06-06 15:13:31 -04:00
|
|
|
it { expect(project.team.member?(nonmember, Gitlab::Access::GUEST)).to be_falsey }
|
2014-06-20 05:54:03 -04:00
|
|
|
end
|
2013-01-04 01:43:25 -05:00
|
|
|
end
|
2015-10-02 08:10:33 -04:00
|
|
|
|
2022-01-20 04:11:11 -05:00
|
|
|
describe 'owner methods' do
|
|
|
|
context 'personal project' do
|
|
|
|
let(:project) { create(:project) }
|
2022-01-25 13:11:55 -05:00
|
|
|
let(:owner) { project.first_owner }
|
2022-01-20 04:11:11 -05:00
|
|
|
|
|
|
|
specify { expect(project.team.owners).to contain_exactly(owner) }
|
|
|
|
specify { expect(project.team.owner?(owner)).to be_truthy }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'group project' do
|
|
|
|
let(:group) { create(:group) }
|
|
|
|
let(:project) { create(:project, group: group) }
|
|
|
|
let(:user1) { create(:user) }
|
|
|
|
let(:user2) { create(:user) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
group.add_owner(user1)
|
|
|
|
group.add_owner(user2)
|
|
|
|
end
|
|
|
|
|
|
|
|
specify { expect(project.team.owners).to contain_exactly(user1, user2) }
|
|
|
|
specify { expect(project.team.owner?(user1)).to be_truthy }
|
|
|
|
specify { expect(project.team.owner?(user2)).to be_truthy }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-09-20 08:18:11 -04:00
|
|
|
describe '#fetch_members' do
|
|
|
|
context 'personal project' do
|
2017-08-02 15:55:11 -04:00
|
|
|
let(:project) { create(:project) }
|
2016-09-20 08:18:11 -04:00
|
|
|
|
|
|
|
it 'returns project members' do
|
2022-01-25 13:11:55 -05:00
|
|
|
# TODO this can be updated when we have multiple project owners
|
|
|
|
# See https://gitlab.com/gitlab-org/gitlab/-/issues/350605
|
2016-09-20 08:18:11 -04:00
|
|
|
user = create(:user)
|
2016-11-18 07:52:39 -05:00
|
|
|
project.add_guest(user)
|
2016-09-20 08:18:11 -04:00
|
|
|
|
2022-01-25 13:11:55 -05:00
|
|
|
expect(project.team.members).to contain_exactly(user, project.first_owner)
|
2016-09-20 08:18:11 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns project members of a specified level' do
|
|
|
|
user = create(:user)
|
2016-11-18 07:52:39 -05:00
|
|
|
project.add_reporter(user)
|
2016-09-20 08:18:11 -04:00
|
|
|
|
|
|
|
expect(project.team.guests).to be_empty
|
|
|
|
expect(project.team.reporters).to contain_exactly(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns invited members of a group' do
|
|
|
|
group_member = create(:group_member)
|
2020-06-03 02:08:34 -04:00
|
|
|
create(:project_group_link, group: group_member.group,
|
|
|
|
project: project,
|
|
|
|
group_access: Gitlab::Access::GUEST)
|
2016-09-20 08:18:11 -04:00
|
|
|
|
2017-06-21 09:48:12 -04:00
|
|
|
expect(project.team.members)
|
2022-01-25 13:11:55 -05:00
|
|
|
.to contain_exactly(group_member.user, project.first_owner)
|
2016-09-20 08:18:11 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns invited members of a group of a specified level' do
|
|
|
|
group_member = create(:group_member)
|
2020-06-03 02:08:34 -04:00
|
|
|
create(:project_group_link, group: group_member.group,
|
|
|
|
project: project,
|
|
|
|
group_access: Gitlab::Access::REPORTER)
|
2016-09-20 08:18:11 -04:00
|
|
|
|
2016-09-20 14:48:58 -04:00
|
|
|
expect(project.team.guests).to be_empty
|
2016-09-20 08:18:11 -04:00
|
|
|
expect(project.team.reporters).to contain_exactly(group_member.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'group project' do
|
|
|
|
let(:group) { create(:group) }
|
2017-08-02 15:55:11 -04:00
|
|
|
let!(:project) { create(:project, group: group) }
|
2016-09-20 08:18:11 -04:00
|
|
|
|
|
|
|
it 'returns project members' do
|
|
|
|
group_member = create(:group_member, group: group)
|
|
|
|
|
|
|
|
expect(project.team.members).to contain_exactly(group_member.user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns project members of a specified level' do
|
|
|
|
group_member = create(:group_member, :reporter, group: group)
|
|
|
|
|
|
|
|
expect(project.team.guests).to be_empty
|
|
|
|
expect(project.team.reporters).to contain_exactly(group_member.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-04-18 12:53:32 -04:00
|
|
|
describe '#find_member' do
|
|
|
|
context 'personal project' do
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
let(:project) do
|
2019-10-16 08:06:32 -04:00
|
|
|
create(:project, :public)
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
end
|
|
|
|
|
2016-04-18 12:53:32 -04:00
|
|
|
let(:requester) { create(:user) }
|
|
|
|
|
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
project.add_maintainer(maintainer)
|
2016-11-18 07:52:39 -05:00
|
|
|
project.add_reporter(reporter)
|
|
|
|
project.add_guest(guest)
|
2016-04-18 12:53:32 -04:00
|
|
|
project.request_access(requester)
|
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.find_member(maintainer.id)).to be_a(ProjectMember) }
|
2016-04-18 12:53:32 -04:00
|
|
|
it { expect(project.team.find_member(reporter.id)).to be_a(ProjectMember) }
|
|
|
|
it { expect(project.team.find_member(guest.id)).to be_a(ProjectMember) }
|
|
|
|
it { expect(project.team.find_member(nonmember.id)).to be_nil }
|
|
|
|
it { expect(project.team.find_member(requester.id)).to be_nil }
|
2016-03-12 08:45:14 -05:00
|
|
|
end
|
|
|
|
|
2016-04-18 12:53:32 -04:00
|
|
|
context 'group project' do
|
2019-10-16 08:06:32 -04:00
|
|
|
let(:group) { create(:group) }
|
2017-08-02 15:55:11 -04:00
|
|
|
let(:project) { create(:project, group: group) }
|
2016-04-18 12:53:32 -04:00
|
|
|
let(:requester) { create(:user) }
|
|
|
|
|
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
group.add_maintainer(maintainer)
|
2016-04-18 12:53:32 -04:00
|
|
|
group.add_reporter(reporter)
|
|
|
|
group.add_guest(guest)
|
|
|
|
group.request_access(requester)
|
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.find_member(maintainer.id)).to be_a(GroupMember) }
|
2016-04-18 12:53:32 -04:00
|
|
|
it { expect(project.team.find_member(reporter.id)).to be_a(GroupMember) }
|
|
|
|
it { expect(project.team.find_member(guest.id)).to be_a(GroupMember) }
|
|
|
|
it { expect(project.team.find_member(nonmember.id)).to be_nil }
|
|
|
|
it { expect(project.team.find_member(requester.id)).to be_nil }
|
2016-03-12 08:45:14 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-01-14 16:53:37 -05:00
|
|
|
describe '#members_in_project_and_ancestors' do
|
|
|
|
context 'group project' do
|
|
|
|
it 'filters out users who are not members of the project' do
|
|
|
|
group = create(:group)
|
|
|
|
project = create(:project, group: group)
|
|
|
|
group_member = create(:group_member, group: group)
|
|
|
|
old_user = create(:user)
|
|
|
|
|
|
|
|
ProjectAuthorization.create!(project: project, user: old_user, access_level: Gitlab::Access::GUEST)
|
|
|
|
|
|
|
|
expect(project.team.members_in_project_and_ancestors).to contain_exactly(group_member.user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-08-13 11:11:15 -04:00
|
|
|
describe '#members_with_access_levels' do
|
|
|
|
let_it_be(:maintainer) { create(:user) }
|
|
|
|
let_it_be(:developer) { create(:user) }
|
|
|
|
let_it_be(:guest) { create(:user) }
|
2022-02-23 01:18:49 -05:00
|
|
|
let_it_be(:project) { create(:project, group: create(:group)) }
|
2021-08-13 11:11:15 -04:00
|
|
|
let_it_be(:access_levels) { [Gitlab::Access::DEVELOPER, Gitlab::Access::MAINTAINER] }
|
|
|
|
|
|
|
|
subject(:members_with_access_levels) { project.team.members_with_access_levels(access_levels) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
project.team.add_developer(developer)
|
|
|
|
project.team.add_maintainer(maintainer)
|
|
|
|
project.team.add_guest(guest)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with access_levels' do
|
|
|
|
it 'filters members who have given access levels' do
|
|
|
|
expect(members_with_access_levels).to contain_exactly(developer, maintainer)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'without access_levels' do
|
|
|
|
let_it_be(:access_levels) { [] }
|
|
|
|
|
|
|
|
it 'returns empty array' do
|
|
|
|
expect(members_with_access_levels).to be_empty
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-05 14:08:43 -04:00
|
|
|
describe '#add_members' do
|
2019-04-01 13:20:31 -04:00
|
|
|
let(:user1) { create(:user) }
|
|
|
|
let(:user2) { create(:user) }
|
|
|
|
let(:project) { create(:project) }
|
|
|
|
|
|
|
|
it 'add the given users to the team' do
|
2022-07-05 14:08:43 -04:00
|
|
|
project.team.add_members([user1, user2], :reporter)
|
2019-04-01 13:20:31 -04:00
|
|
|
|
|
|
|
expect(project.team.reporter?(user1)).to be(true)
|
|
|
|
expect(project.team.reporter?(user2)).to be(true)
|
|
|
|
end
|
2021-10-25 08:10:19 -04:00
|
|
|
|
|
|
|
context 'when `tasks_to_be_done` and `tasks_project_id` are passed' do
|
|
|
|
before do
|
2022-07-05 14:08:43 -04:00
|
|
|
project.team.add_members([user1], :developer, tasks_to_be_done: %w(ci code), tasks_project_id: project.id)
|
2021-10-25 08:10:19 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a member_task with the correct attributes', :aggregate_failures do
|
|
|
|
member = project.project_members.last
|
|
|
|
|
|
|
|
expect(member.tasks_to_be_done).to match_array([:ci, :code])
|
|
|
|
expect(member.member_task.project).to eq(project)
|
|
|
|
end
|
|
|
|
end
|
2019-04-01 13:20:31 -04:00
|
|
|
end
|
|
|
|
|
2022-07-05 14:08:43 -04:00
|
|
|
describe '#add_member' do
|
2019-04-01 13:20:31 -04:00
|
|
|
let(:user) { create(:user) }
|
|
|
|
let(:project) { create(:project) }
|
|
|
|
|
|
|
|
it 'add the given user to the team' do
|
2022-07-05 14:08:43 -04:00
|
|
|
project.team.add_member(user, :reporter)
|
2019-04-01 13:20:31 -04:00
|
|
|
|
|
|
|
expect(project.team.reporter?(user)).to be(true)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-06-02 12:05:06 -04:00
|
|
|
describe "#human_max_access" do
|
2018-05-22 07:55:07 -04:00
|
|
|
it 'returns Maintainer role' do
|
2016-06-02 12:05:06 -04:00
|
|
|
user = create(:user)
|
|
|
|
group = create(:group)
|
2017-08-02 15:55:11 -04:00
|
|
|
project = create(:project, namespace: group)
|
2016-06-02 12:05:06 -04:00
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
group.add_maintainer(user)
|
2016-06-02 12:05:06 -04:00
|
|
|
|
2018-05-22 07:55:07 -04:00
|
|
|
expect(project.team.human_max_access(user.id)).to eq 'Maintainer'
|
2016-06-02 12:05:06 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns Owner role' do
|
|
|
|
user = create(:user)
|
|
|
|
group = create(:group)
|
2017-08-02 15:55:11 -04:00
|
|
|
project = create(:project, namespace: group)
|
2016-06-02 12:05:06 -04:00
|
|
|
|
2016-11-21 08:36:40 -05:00
|
|
|
group.add_owner(user)
|
2016-06-02 12:05:06 -04:00
|
|
|
|
|
|
|
expect(project.team.human_max_access(user.id)).to eq 'Owner'
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-16 11:09:32 -04:00
|
|
|
describe '#contributor?' do
|
|
|
|
let(:project) { create(:project, :public, :repository) }
|
|
|
|
|
|
|
|
context 'when user is a member of project' do
|
|
|
|
before do
|
|
|
|
project.add_maintainer(maintainer)
|
|
|
|
project.add_reporter(reporter)
|
|
|
|
project.add_guest(guest)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect(project.team.contributor?(maintainer.id)).to be false }
|
|
|
|
it { expect(project.team.contributor?(reporter.id)).to be false }
|
|
|
|
it { expect(project.team.contributor?(guest.id)).to be false }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user has at least one merge request merged into default_branch' do
|
|
|
|
let(:contributor) { create(:user) }
|
|
|
|
let(:user_without_access) { create(:user) }
|
|
|
|
let(:first_fork_project) { fork_project(project, contributor, repository: true) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
create(:merge_request, :merged, author: contributor, target_project: project, source_project: first_fork_project, target_branch: project.default_branch.to_s)
|
|
|
|
end
|
|
|
|
|
|
|
|
it { expect(project.team.contributor?(contributor.id)).to be true }
|
|
|
|
it { expect(project.team.contributor?(user_without_access.id)).to be false }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-04-18 12:53:32 -04:00
|
|
|
describe '#max_member_access' do
|
|
|
|
let(:requester) { create(:user) }
|
|
|
|
|
|
|
|
context 'personal project' do
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
let(:project) do
|
2019-10-16 08:06:32 -04:00
|
|
|
create(:project, :public)
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
end
|
2016-04-18 12:53:32 -04:00
|
|
|
|
|
|
|
context 'when project is not shared with group' do
|
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
project.add_maintainer(maintainer)
|
2016-11-18 07:52:39 -05:00
|
|
|
project.add_reporter(reporter)
|
|
|
|
project.add_guest(guest)
|
2016-04-18 12:53:32 -04:00
|
|
|
project.request_access(requester)
|
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.max_member_access(maintainer.id)).to eq(Gitlab::Access::MAINTAINER) }
|
2016-04-18 12:53:32 -04:00
|
|
|
it { expect(project.team.max_member_access(reporter.id)).to eq(Gitlab::Access::REPORTER) }
|
|
|
|
it { expect(project.team.max_member_access(guest.id)).to eq(Gitlab::Access::GUEST) }
|
2016-07-20 00:52:31 -04:00
|
|
|
it { expect(project.team.max_member_access(nonmember.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
|
|
|
it { expect(project.team.max_member_access(requester.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
2016-04-18 12:53:32 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when project is shared with group' do
|
|
|
|
before do
|
|
|
|
group = create(:group)
|
2021-05-03 14:10:17 -04:00
|
|
|
project.project_group_links.create!(
|
2016-04-18 12:53:32 -04:00
|
|
|
group: group,
|
|
|
|
group_access: Gitlab::Access::DEVELOPER)
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
group.add_maintainer(maintainer)
|
2016-04-18 12:53:32 -04:00
|
|
|
group.add_reporter(reporter)
|
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.max_member_access(maintainer.id)).to eq(Gitlab::Access::DEVELOPER) }
|
2016-04-18 12:53:32 -04:00
|
|
|
it { expect(project.team.max_member_access(reporter.id)).to eq(Gitlab::Access::REPORTER) }
|
2016-07-20 00:52:31 -04:00
|
|
|
it { expect(project.team.max_member_access(nonmember.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
|
|
|
it { expect(project.team.max_member_access(requester.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
2016-04-18 12:53:32 -04:00
|
|
|
|
2021-07-26 08:10:08 -04:00
|
|
|
context 'but share_with_group_lock is true', :sidekiq_inline do
|
2017-06-14 14:18:56 -04:00
|
|
|
before do
|
2021-05-03 14:10:17 -04:00
|
|
|
project.namespace.update!(share_with_group_lock: true)
|
2017-06-14 14:18:56 -04:00
|
|
|
end
|
2016-04-18 12:53:32 -04:00
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.max_member_access(maintainer.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
2016-07-20 00:52:31 -04:00
|
|
|
it { expect(project.team.max_member_access(reporter.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
2016-04-18 12:53:32 -04:00
|
|
|
end
|
|
|
|
end
|
2016-02-18 16:39:59 -05:00
|
|
|
end
|
|
|
|
|
2016-04-18 12:53:32 -04:00
|
|
|
context 'group project' do
|
2019-10-16 08:06:32 -04:00
|
|
|
let(:group) { create(:group) }
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
let!(:project) do
|
2017-08-02 15:55:11 -04:00
|
|
|
create(:project, group: group)
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
end
|
2016-04-18 12:53:32 -04:00
|
|
|
|
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
group.add_maintainer(maintainer)
|
2016-04-18 12:53:32 -04:00
|
|
|
group.add_reporter(reporter)
|
|
|
|
group.add_guest(guest)
|
|
|
|
group.request_access(requester)
|
|
|
|
end
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
it { expect(project.team.max_member_access(maintainer.id)).to eq(Gitlab::Access::MAINTAINER) }
|
2016-04-18 12:53:32 -04:00
|
|
|
it { expect(project.team.max_member_access(reporter.id)).to eq(Gitlab::Access::REPORTER) }
|
|
|
|
it { expect(project.team.max_member_access(guest.id)).to eq(Gitlab::Access::GUEST) }
|
2016-07-20 00:52:31 -04:00
|
|
|
it { expect(project.team.max_member_access(nonmember.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
|
|
|
it { expect(project.team.max_member_access(requester.id)).to eq(Gitlab::Access::NO_ACCESS) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-11 23:08:58 -04:00
|
|
|
describe '#purge_member_access_cache_for_user_id', :request_store do
|
|
|
|
let(:project) { create(:project) }
|
|
|
|
let(:user_id) { 1 }
|
|
|
|
let(:resource_data) { { user_id => 50, 42 => 50 } }
|
|
|
|
|
|
|
|
before do
|
|
|
|
Gitlab::SafeRequestStore[project.max_member_access_for_resource_key(User)] = resource_data
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'removes cached max access for user from store' do
|
|
|
|
project.team.purge_member_access_cache_for_user_id(user_id)
|
|
|
|
|
|
|
|
expect(Gitlab::SafeRequestStore[project.max_member_access_for_resource_key(User)]).to eq({ 42 => 50 })
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-11-18 12:15:47 -05:00
|
|
|
describe '#member?' do
|
|
|
|
let(:group) { create(:group) }
|
|
|
|
let(:developer) { create(:user) }
|
2018-07-11 10:36:08 -04:00
|
|
|
let(:maintainer) { create(:user) }
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
|
|
|
|
let(:personal_project) do
|
2017-08-02 15:55:11 -04:00
|
|
|
create(:project, namespace: developer.namespace)
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
let(:group_project) do
|
2017-08-02 15:55:11 -04:00
|
|
|
create(:project, namespace: group)
|
Use CTEs for nested groups and authorizations
This commit introduces the usage of Common Table Expressions (CTEs) to
efficiently retrieve nested group hierarchies, without having to rely on
the "routes" table (which is an _incredibly_ inefficient way of getting
the data). This requires a patch to ActiveRecord (found in the added
initializer) to work properly as ActiveRecord doesn't support WITH
statements properly out of the box.
Unfortunately MySQL provides no efficient way of getting nested groups.
For example, the old routes setup could easily take 5-10 seconds
depending on the amount of "routes" in a database. Providing vastly
different logic for both MySQL and PostgreSQL will negatively impact the
development process. Because of this the various nested groups related
methods return empty relations when used in combination with MySQL.
For project authorizations the logic is split up into two classes:
* Gitlab::ProjectAuthorizations::WithNestedGroups
* Gitlab::ProjectAuthorizations::WithoutNestedGroups
Both classes get the fresh project authorizations (= as they should be
in the "project_authorizations" table), including nested groups if
PostgreSQL is used. The logic of these two classes is quite different
apart from their public interface. This complicates development a bit,
but unfortunately there is no way around this.
This commit also introduces Gitlab::GroupHierarchy. This class can be
used to get the ancestors and descendants of a base relation, or both by
using a UNION. This in turn is used by methods such as:
* Namespace#ancestors
* Namespace#descendants
* User#all_expanded_groups
Again this class relies on CTEs and thus only works on PostgreSQL. The
Namespace methods will return an empty relation when MySQL is used,
while User#all_expanded_groups will return only the groups a user is a
direct member of.
Performance wise the impact is quite large. For example, on GitLab.com
Namespace#descendants used to take around 580 ms to retrieve data for a
particular user. Using CTEs we are able to reduce this down to roughly 1
millisecond, returning the exact same data.
== On The Fly Refreshing
Refreshing of authorizations on the fly (= when
users.authorized_projects_populated was not set) is removed with this
commit. This simplifies the code, and ensures any queries used for
authorizations are not mutated because they are executed in a Rails
scope (e.g. Project.visible_to_user).
This commit includes a migration to schedule refreshing authorizations
for all users, ensuring all of them have their authorizations in place.
Said migration schedules users in batches of 5000, with 5 minutes
between every batch to smear the load around a bit.
== Spec Changes
This commit also introduces some changes to various specs. For example,
some specs for ProjectTeam assumed that creating a personal project
would _not_ lead to the owner having access, which is incorrect. Because
we also no longer refresh authorizations on the fly for new users some
code had to be added to the "empty_project" factory. This chunk of code
ensures that the owner's permissions are refreshed after creating the
project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
|
|
|
end
|
|
|
|
|
2017-08-02 15:55:11 -04:00
|
|
|
let(:members_project) { create(:project) }
|
|
|
|
let(:shared_project) { create(:project) }
|
2016-11-18 12:15:47 -05:00
|
|
|
|
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
group.add_maintainer(maintainer)
|
2016-11-18 12:15:47 -05:00
|
|
|
group.add_developer(developer)
|
|
|
|
|
2017-12-22 03:18:28 -05:00
|
|
|
members_project.add_developer(developer)
|
2018-07-11 10:36:08 -04:00
|
|
|
members_project.add_maintainer(maintainer)
|
2016-11-18 12:15:47 -05:00
|
|
|
|
|
|
|
create(:project_group_link, project: shared_project, group: group)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns false for no user' do
|
|
|
|
expect(personal_project.team.member?(nil)).to be(false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for personal projects of the user' do
|
|
|
|
expect(personal_project.team.member?(developer)).to be(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for projects of groups the user is a member of' do
|
|
|
|
expect(group_project.team.member?(developer)).to be(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for projects for which the user is a member of' do
|
|
|
|
expect(members_project.team.member?(developer)).to be(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns true for projects shared on a group the user is a member of' do
|
|
|
|
expect(shared_project.team.member?(developer)).to be(true)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'checks for the correct minimum level access' do
|
2018-07-11 10:36:08 -04:00
|
|
|
expect(group_project.team.member?(developer, Gitlab::Access::MAINTAINER)).to be(false)
|
|
|
|
expect(group_project.team.member?(maintainer, Gitlab::Access::MAINTAINER)).to be(true)
|
|
|
|
expect(members_project.team.member?(developer, Gitlab::Access::MAINTAINER)).to be(false)
|
|
|
|
expect(members_project.team.member?(maintainer, Gitlab::Access::MAINTAINER)).to be(true)
|
|
|
|
expect(shared_project.team.member?(developer, Gitlab::Access::MAINTAINER)).to be(false)
|
|
|
|
expect(shared_project.team.member?(maintainer, Gitlab::Access::MAINTAINER)).to be(false)
|
2016-11-18 12:15:47 -05:00
|
|
|
expect(shared_project.team.member?(developer, Gitlab::Access::DEVELOPER)).to be(true)
|
2018-07-11 10:36:08 -04:00
|
|
|
expect(shared_project.team.member?(maintainer, Gitlab::Access::DEVELOPER)).to be(true)
|
2016-11-18 12:15:47 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-16 11:09:32 -04:00
|
|
|
describe '#contribution_check_for_user_ids', :request_store do
|
|
|
|
let(:project) { create(:project, :public, :repository) }
|
|
|
|
let(:contributor) { create(:user) }
|
|
|
|
let(:second_contributor) { create(:user) }
|
|
|
|
let(:user_without_access) { create(:user) }
|
|
|
|
let(:first_fork_project) { fork_project(project, contributor, repository: true) }
|
|
|
|
let(:second_fork_project) { fork_project(project, second_contributor, repository: true) }
|
|
|
|
|
|
|
|
let(:users) do
|
|
|
|
[contributor, second_contributor, user_without_access].map(&:id)
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:expected) do
|
|
|
|
{
|
|
|
|
contributor.id => true,
|
|
|
|
second_contributor.id => true,
|
|
|
|
user_without_access.id => false
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
create(:merge_request, :merged, author: contributor, target_project: project, source_project: first_fork_project, target_branch: project.default_branch.to_s)
|
|
|
|
create(:merge_request, :merged, author: second_contributor, target_project: project, source_project: second_fork_project, target_branch: project.default_branch.to_s)
|
|
|
|
end
|
|
|
|
|
|
|
|
def contributors(users)
|
|
|
|
project.team.contribution_check_for_user_ids(users)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not perform extra queries when asked for users who have already been found' do
|
|
|
|
contributors(users)
|
|
|
|
|
|
|
|
expect { contributors([contributor.id]) }.not_to exceed_query_limit(0)
|
|
|
|
|
|
|
|
expect(contributors([contributor.id])).to eq(expected)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'only requests the extra users when uncached users are passed' do
|
|
|
|
new_contributor = create(:user)
|
|
|
|
new_fork_project = fork_project(project, new_contributor, repository: true)
|
|
|
|
second_new_user = create(:user)
|
|
|
|
all_users = users + [new_contributor.id, second_new_user.id]
|
|
|
|
create(:merge_request, :merged, author: new_contributor, target_project: project, source_project: new_fork_project, target_branch: project.default_branch.to_s)
|
|
|
|
|
|
|
|
expected_all = expected.merge(new_contributor.id => true,
|
|
|
|
second_new_user.id => false)
|
|
|
|
|
|
|
|
contributors(users)
|
|
|
|
|
|
|
|
queries = ActiveRecord::QueryRecorder.new { contributors(all_users) }
|
|
|
|
|
|
|
|
expect(queries.count).to eq(1)
|
|
|
|
expect(contributors([new_contributor.id])).to eq(expected_all)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns correct contributors' do
|
|
|
|
expect(contributors(users)).to eq(expected)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-05-31 11:45:14 -04:00
|
|
|
shared_examples 'max member access for users' do
|
2017-08-02 15:55:11 -04:00
|
|
|
let(:project) { create(:project) }
|
2017-05-31 11:45:14 -04:00
|
|
|
let(:group) { create(:group) }
|
|
|
|
let(:second_group) { create(:group) }
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
let(:maintainer) { create(:user) }
|
2017-05-31 11:45:14 -04:00
|
|
|
let(:reporter) { create(:user) }
|
|
|
|
let(:guest) { create(:user) }
|
|
|
|
|
|
|
|
let(:promoted_guest) { create(:user) }
|
|
|
|
|
|
|
|
let(:group_developer) { create(:user) }
|
|
|
|
let(:second_developer) { create(:user) }
|
|
|
|
|
|
|
|
let(:user_without_access) { create(:user) }
|
|
|
|
let(:second_user_without_access) { create(:user) }
|
|
|
|
|
|
|
|
let(:users) do
|
2018-07-11 10:36:08 -04:00
|
|
|
[maintainer, reporter, promoted_guest, guest, group_developer, second_developer, user_without_access].map(&:id)
|
2017-05-31 11:45:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
let(:expected) do
|
|
|
|
{
|
2018-07-11 10:36:08 -04:00
|
|
|
maintainer.id => Gitlab::Access::MAINTAINER,
|
2017-05-31 11:45:14 -04:00
|
|
|
reporter.id => Gitlab::Access::REPORTER,
|
|
|
|
promoted_guest.id => Gitlab::Access::DEVELOPER,
|
|
|
|
guest.id => Gitlab::Access::GUEST,
|
|
|
|
group_developer.id => Gitlab::Access::DEVELOPER,
|
2018-07-11 10:36:08 -04:00
|
|
|
second_developer.id => Gitlab::Access::MAINTAINER,
|
2017-05-31 11:45:14 -04:00
|
|
|
user_without_access.id => Gitlab::Access::NO_ACCESS
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
2018-07-11 10:36:08 -04:00
|
|
|
project.add_maintainer(maintainer)
|
2017-05-31 11:45:14 -04:00
|
|
|
project.add_reporter(reporter)
|
|
|
|
project.add_guest(promoted_guest)
|
|
|
|
project.add_guest(guest)
|
|
|
|
|
2021-05-03 14:10:17 -04:00
|
|
|
project.project_group_links.create!(
|
2017-05-31 11:45:14 -04:00
|
|
|
group: group,
|
|
|
|
group_access: Gitlab::Access::DEVELOPER
|
|
|
|
)
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
group.add_maintainer(promoted_guest)
|
2017-05-31 11:45:14 -04:00
|
|
|
group.add_developer(group_developer)
|
|
|
|
group.add_developer(second_developer)
|
|
|
|
|
2021-05-03 14:10:17 -04:00
|
|
|
project.project_group_links.create!(
|
2017-05-31 11:45:14 -04:00
|
|
|
group: second_group,
|
2018-07-11 10:36:08 -04:00
|
|
|
group_access: Gitlab::Access::MAINTAINER
|
2017-05-31 11:45:14 -04:00
|
|
|
)
|
|
|
|
|
2018-07-11 10:36:08 -04:00
|
|
|
second_group.add_maintainer(second_developer)
|
2017-05-31 11:45:14 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'returns correct roles for different users' do
|
|
|
|
expect(project.team.max_member_access_for_user_ids(users)).to eq(expected)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#max_member_access_for_user_ids' do
|
2017-06-09 13:12:51 -04:00
|
|
|
context 'with RequestStore enabled', :request_store do
|
2017-05-31 11:45:14 -04:00
|
|
|
include_examples 'max member access for users'
|
2016-08-01 16:11:45 -04:00
|
|
|
|
2017-05-31 11:45:14 -04:00
|
|
|
def access_levels(users)
|
|
|
|
project.team.max_member_access_for_user_ids(users)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not perform extra queries when asked for users who have already been found' do
|
|
|
|
access_levels(users)
|
|
|
|
|
2020-09-16 11:09:32 -04:00
|
|
|
expect { access_levels([maintainer.id]) }.not_to exceed_query_limit(0)
|
2016-08-01 16:11:45 -04:00
|
|
|
|
2020-09-16 11:09:32 -04:00
|
|
|
expect(access_levels([maintainer.id])).to eq(expected)
|
2016-08-01 16:11:45 -04:00
|
|
|
end
|
|
|
|
|
2017-05-31 11:45:14 -04:00
|
|
|
it 'only requests the extra users when uncached users are passed' do
|
|
|
|
new_user = create(:user)
|
|
|
|
second_new_user = create(:user)
|
|
|
|
all_users = users + [new_user.id, second_new_user.id]
|
|
|
|
|
|
|
|
expected_all = expected.merge(new_user.id => Gitlab::Access::NO_ACCESS,
|
|
|
|
second_new_user.id => Gitlab::Access::NO_ACCESS)
|
|
|
|
|
|
|
|
access_levels(users)
|
2016-08-01 16:11:45 -04:00
|
|
|
|
2017-05-31 11:45:14 -04:00
|
|
|
queries = ActiveRecord::QueryRecorder.new { access_levels(all_users) }
|
|
|
|
|
|
|
|
expect(queries.count).to eq(1)
|
|
|
|
expect(queries.log_message).to match(/\W#{new_user.id}\W/)
|
|
|
|
expect(queries.log_message).to match(/\W#{second_new_user.id}\W/)
|
|
|
|
expect(queries.log_message).not_to match(/\W#{promoted_guest.id}\W/)
|
|
|
|
expect(access_levels(all_users)).to eq(expected_all)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with RequestStore disabled' do
|
|
|
|
include_examples 'max member access for users'
|
|
|
|
end
|
2016-08-01 16:11:45 -04:00
|
|
|
end
|
2013-01-04 01:43:25 -05:00
|
|
|
end
|