gitlab-org--gitlab-foss/spec/requests/api/groups_spec.rb

945 lines
32 KiB
Ruby
Raw Normal View History

2013-02-01 08:59:22 -05:00
require 'spec_helper'
describe API::Groups do
2016-08-18 10:31:44 -04:00
include UploadHelpers
2013-02-01 08:59:22 -05:00
let(:user1) { create(:user, can_create_group: false) }
let(:user2) { create(:user) }
let(:user3) { create(:user) }
2013-02-01 08:59:22 -05:00
let(:admin) { create(:admin) }
2016-08-18 10:31:44 -04:00
let!(:group1) { create(:group, avatar: File.open(uploaded_image_temp_path)) }
2016-03-20 17:55:08 -04:00
let!(:group2) { create(:group, :private) }
let!(:project1) { create(:project, namespace: group1) }
let!(:project2) { create(:project, namespace: group2) }
let!(:project3) { create(:project, namespace: group1, path: 'test', visibility_level: Gitlab::VisibilityLevel::PRIVATE) }
2013-09-26 07:52:17 -04:00
before do
group1.add_owner(user1)
group2.add_owner(user2)
end
2013-02-01 08:59:22 -05:00
describe "GET /groups" do
context "when unauthenticated" do
it "returns public groups" do
2013-02-01 08:59:22 -05:00
get api("/groups")
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
expect(json_response)
.to satisfy_one { |group| group['name'] == group1.name }
2013-02-01 08:59:22 -05:00
end
it 'avoids N+1 queries' do
# Establish baseline
get api("/groups", admin)
control = ActiveRecord::QueryRecorder.new do
get api("/groups", admin)
end
create(:group)
expect do
get api("/groups", admin)
end.not_to exceed_query_limit(control)
end
2013-02-01 08:59:22 -05:00
end
context "when authenticated as user" do
it "normal user: returns an array of groups of user1" do
2013-02-01 08:59:22 -05:00
get api("/groups", user1)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
expect(json_response)
.to satisfy_one { |group| group['name'] == group1.name }
2013-02-01 08:59:22 -05:00
end
it "does not include statistics" do
get api("/groups", user1), statistics: true
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.first).not_to include 'statistics'
end
2013-02-01 08:59:22 -05:00
end
2013-03-20 17:46:30 -04:00
context "when authenticated as admin" do
it "admin: returns an array of all groups" do
2013-02-01 08:59:22 -05:00
get api("/groups", admin)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.length).to eq(2)
2013-02-01 08:59:22 -05:00
end
it "does not include statistics by default" do
get api("/groups", admin)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.first).not_to include('statistics')
end
it "includes statistics if requested" do
attributes = {
storage_size: 702,
repository_size: 123,
lfs_objects_size: 234,
build_artifacts_size: 345
}.stringify_keys
exposed_attributes = attributes.dup
exposed_attributes['job_artifacts_size'] = exposed_attributes.delete('build_artifacts_size')
project1.statistics.update!(attributes)
get api("/groups", admin), statistics: true
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response)
.to satisfy_one { |group| group['statistics'] == exposed_attributes }
end
2013-02-01 08:59:22 -05:00
end
2016-09-01 13:23:39 -04:00
context "when using skip_groups in request" do
it "returns all groups excluding skipped groups" do
get api("/groups", admin), skip_groups: [group2.id]
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
2016-09-01 13:23:39 -04:00
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
end
end
context "when using all_available in request" do
let(:response_groups) { json_response.map { |group| group['name'] } }
it "returns all groups you have access to" do
public_group = create :group, :public
get api("/groups", user1), all_available: true
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(response_groups).to contain_exactly(public_group.name, group1.name)
end
end
context "when using sorting" do
let(:group3) { create(:group, name: "a#{group1.name}", path: "z#{group1.path}") }
let(:group4) { create(:group, name: "same-name", path: "y#{group1.path}") }
let(:group5) { create(:group, name: "same-name") }
let(:response_groups) { json_response.map { |group| group['name'] } }
let(:response_groups_ids) { json_response.map { |group| group['id'] } }
before do
group3.add_owner(user1)
group4.add_owner(user1)
group5.add_owner(user1)
end
it "sorts by name ascending by default" do
get api("/groups", user1)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2018-09-07 08:29:19 -04:00
expect(response_groups).to eq(groups_visible_to_user(user1).order(:name).pluck(:name))
end
it "sorts in descending order when passed" do
get api("/groups", user1), sort: "desc"
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2018-09-07 08:29:19 -04:00
expect(response_groups).to eq(groups_visible_to_user(user1).order(name: :desc).pluck(:name))
end
it "sorts by path in order_by param" do
get api("/groups", user1), order_by: "path"
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2018-09-07 08:29:19 -04:00
expect(response_groups).to eq(groups_visible_to_user(user1).order(:path).pluck(:name))
end
it "sorts by id in the order_by param" do
get api("/groups", user1), order_by: "id"
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2018-09-07 08:29:19 -04:00
expect(response_groups).to eq(groups_visible_to_user(user1).order(:id).pluck(:name))
end
it "sorts also by descending id with pagination fix" do
get api("/groups", user1), order_by: "id", sort: "desc"
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
2018-09-07 08:29:19 -04:00
expect(response_groups).to eq(groups_visible_to_user(user1).order(id: :desc).pluck(:name))
end
it "sorts identical keys by id for good pagination" do
get api("/groups", user1), search: "same-name", order_by: "name"
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(response_groups_ids).to eq(Group.select { |group| group['name'] == 'same-name' }.map { |group| group['id'] }.sort)
end
it "sorts descending identical keys by id for good pagination" do
get api("/groups", user1), search: "same-name", order_by: "name", sort: "desc"
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(response_groups_ids).to eq(Group.select { |group| group['name'] == 'same-name' }.map { |group| group['id'] }.sort)
end
2018-09-07 08:29:19 -04:00
def groups_visible_to_user(user)
Group.where(id: user.authorized_groups.select(:id).reorder(nil))
end
end
2016-10-25 09:22:12 -04:00
context 'when using owned in the request' do
2016-10-25 09:22:12 -04:00
it 'returns an array of groups the user owns' do
group1.add_maintainer(user2)
get api('/groups', user2), owned: true
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
2016-10-25 09:22:12 -04:00
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
2016-10-25 09:22:12 -04:00
expect(json_response.first['name']).to eq(group2.name)
end
end
context 'when using min_access_level in the request' do
let!(:group3) { create(:group, :private) }
let(:response_groups) { json_response.map { |group| group['id'] } }
before do
group1.add_developer(user2)
group3.add_master(user2)
end
it 'returns an array of groups the user has at least master access' do
get api('/groups', user2), min_access_level: 40
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(response_groups).to eq([group2.id, group3.id])
end
end
2016-10-25 09:22:12 -04:00
end
2013-02-01 08:59:22 -05:00
describe "GET /groups/:id" do
# Given a group, create one project for each visibility level
#
# group - Group to add projects to
# share_with - If provided, each project will be shared with this Group
#
# Returns a Hash of visibility_level => Project pairs
def add_projects_to_group(group, share_with: nil)
projects = {
public: create(:project, :public, namespace: group),
internal: create(:project, :internal, namespace: group),
private: create(:project, :private, namespace: group)
}
if share_with
create(:project_group_link, project: projects[:public], group: share_with)
create(:project_group_link, project: projects[:internal], group: share_with)
create(:project_group_link, project: projects[:private], group: share_with)
end
projects
end
def response_project_ids(json_response, key)
json_response[key].map do |project|
project['id'].to_i
end
end
context 'when unauthenticated' do
it 'returns 404 for a private group' do
get api("/groups/#{group2.id}")
expect(response).to have_gitlab_http_status(404)
end
it 'returns 200 for a public group' do
get api("/groups/#{group1.id}")
expect(response).to have_gitlab_http_status(200)
end
it 'returns only public projects in the group' do
public_group = create(:group, :public)
projects = add_projects_to_group(public_group)
get api("/groups/#{public_group.id}")
expect(response_project_ids(json_response, 'projects'))
.to contain_exactly(projects[:public].id)
end
it 'returns only public projects shared with the group' do
public_group = create(:group, :public)
projects = add_projects_to_group(public_group, share_with: group1)
get api("/groups/#{group1.id}")
expect(response_project_ids(json_response, 'shared_projects'))
.to contain_exactly(projects[:public].id)
end
end
2013-02-01 08:59:22 -05:00
context "when authenticated as user" do
2016-07-08 04:59:52 -04:00
it "returns one of user1's groups" do
project = create(:project, namespace: group2, path: 'Foo')
2016-07-08 04:59:52 -04:00
create(:project_group_link, project: project, group: group1)
2013-02-01 08:59:22 -05:00
get api("/groups/#{group1.id}", user1)
2016-07-08 04:59:52 -04:00
expect(response).to have_gitlab_http_status(200)
2016-07-08 04:59:52 -04:00
expect(json_response['id']).to eq(group1.id)
expect(json_response['name']).to eq(group1.name)
expect(json_response['path']).to eq(group1.path)
expect(json_response['description']).to eq(group1.description)
expect(json_response['visibility']).to eq(Gitlab::VisibilityLevel.string_level(group1.visibility_level))
expect(json_response['avatar_url']).to eq(group1.avatar_url(only_path: false))
2016-07-08 04:59:52 -04:00
expect(json_response['web_url']).to eq(group1.web_url)
expect(json_response['request_access_enabled']).to eq(group1.request_access_enabled)
expect(json_response['full_name']).to eq(group1.full_name)
expect(json_response['full_path']).to eq(group1.full_path)
expect(json_response['parent_id']).to eq(group1.parent_id)
2016-07-08 04:59:52 -04:00
expect(json_response['projects']).to be_an Array
expect(json_response['projects'].length).to eq(2)
expect(json_response['shared_projects']).to be_an Array
expect(json_response['shared_projects'].length).to eq(1)
expect(json_response['shared_projects'][0]['id']).to eq(project.id)
2013-02-01 08:59:22 -05:00
end
2013-03-20 17:46:30 -04:00
it "returns one of user1's groups without projects when with_projects option is set to false" do
project = create(:project, namespace: group2, path: 'Foo')
create(:project_group_link, project: project, group: group1)
get api("/groups/#{group1.id}", user1), with_projects: false
expect(response).to have_gitlab_http_status(200)
expect(json_response['projects']).to be_nil
expect(json_response['shared_projects']).to be_nil
end
it "does not return a non existing group" do
2013-02-01 08:59:22 -05:00
get api("/groups/1328", user1)
expect(response).to have_gitlab_http_status(404)
2013-02-01 08:59:22 -05:00
end
2013-03-20 17:46:30 -04:00
it "does not return a group not attached to user1" do
2013-02-01 08:59:22 -05:00
get api("/groups/#{group2.id}", user1)
expect(response).to have_gitlab_http_status(404)
2013-02-01 08:59:22 -05:00
end
it 'returns only public and internal projects in the group' do
public_group = create(:group, :public)
projects = add_projects_to_group(public_group)
get api("/groups/#{public_group.id}", user2)
expect(response_project_ids(json_response, 'projects'))
.to contain_exactly(projects[:public].id, projects[:internal].id)
end
it 'returns only public and internal projects shared with the group' do
public_group = create(:group, :public)
projects = add_projects_to_group(public_group, share_with: group1)
get api("/groups/#{group1.id}", user2)
expect(response_project_ids(json_response, 'shared_projects'))
.to contain_exactly(projects[:public].id, projects[:internal].id)
end
2013-02-01 08:59:22 -05:00
end
2013-03-20 17:46:30 -04:00
2013-02-01 08:59:22 -05:00
context "when authenticated as admin" do
it "returns any existing group" do
2013-02-01 08:59:22 -05:00
get api("/groups/#{group2.id}", admin)
expect(response).to have_gitlab_http_status(200)
2015-12-08 07:34:09 -05:00
expect(json_response['name']).to eq(group2.name)
2013-02-01 08:59:22 -05:00
end
2013-03-20 17:46:30 -04:00
it "does not return a non existing group" do
2013-02-01 08:59:22 -05:00
get api("/groups/1328", admin)
expect(response).to have_gitlab_http_status(404)
2013-02-01 08:59:22 -05:00
end
end
2015-01-30 04:46:08 -05:00
context 'when using group path in URL' do
it 'returns any existing group' do
2015-01-30 04:46:08 -05:00
get api("/groups/#{group1.path}", admin)
expect(response).to have_gitlab_http_status(200)
2015-12-08 07:34:09 -05:00
expect(json_response['name']).to eq(group1.name)
2015-01-30 04:46:08 -05:00
end
it 'does not return a non existing group' do
2015-01-30 04:46:08 -05:00
get api('/groups/unknown', admin)
expect(response).to have_gitlab_http_status(404)
2015-01-30 04:46:08 -05:00
end
it 'does not return a group not attached to user1' do
2015-01-30 04:46:08 -05:00
get api("/groups/#{group2.path}", user1)
expect(response).to have_gitlab_http_status(404)
2015-01-30 04:46:08 -05:00
end
end
2013-02-01 08:59:22 -05:00
end
2013-03-20 17:46:30 -04:00
2016-04-07 04:12:49 -04:00
describe 'PUT /groups/:id' do
let(:new_group_name) { 'New Group'}
context 'when authenticated as the group owner' do
2016-04-07 04:12:49 -04:00
it 'updates the group' do
put api("/groups/#{group1.id}", user1), name: new_group_name, request_access_enabled: true
2016-04-07 04:12:49 -04:00
expect(response).to have_gitlab_http_status(200)
2016-04-07 04:12:49 -04:00
expect(json_response['name']).to eq(new_group_name)
expect(json_response['request_access_enabled']).to eq(true)
2016-04-07 04:12:49 -04:00
end
it 'returns 404 for a non existing group' do
2016-11-07 10:54:39 -05:00
put api('/groups/1328', user1), name: new_group_name
2016-04-07 04:12:49 -04:00
expect(response).to have_gitlab_http_status(404)
2016-04-07 04:12:49 -04:00
end
end
context 'when authenticated as the admin' do
2016-04-07 04:12:49 -04:00
it 'updates the group' do
put api("/groups/#{group1.id}", admin), name: new_group_name
expect(response).to have_gitlab_http_status(200)
2016-04-07 04:12:49 -04:00
expect(json_response['name']).to eq(new_group_name)
end
end
context 'when authenticated as an user that can see the group' do
it 'does not updates the group' do
2016-04-07 04:12:49 -04:00
put api("/groups/#{group1.id}", user2), name: new_group_name
expect(response).to have_gitlab_http_status(403)
2016-04-07 04:12:49 -04:00
end
end
context 'when authenticated as an user that cannot see the group' do
it 'returns 404 when trying to update the group' do
put api("/groups/#{group2.id}", user1), name: new_group_name
expect(response).to have_gitlab_http_status(404)
end
end
2016-04-07 04:12:49 -04:00
end
2015-12-08 07:34:09 -05:00
describe "GET /groups/:id/projects" do
context "when authenticated as user" do
it "returns the group's projects" do
2015-12-08 07:34:09 -05:00
get api("/groups/#{group1.id}/projects", user1)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response.length).to eq(2)
2017-02-21 18:33:53 -05:00
project_names = json_response.map { |proj| proj['name'] }
expect(project_names).to match_array([project1.name, project3.name])
expect(json_response.first['visibility']).to be_present
end
it "returns the group's projects with simple representation" do
get api("/groups/#{group1.id}/projects", user1), simple: true
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response.length).to eq(2)
2017-02-21 18:33:53 -05:00
project_names = json_response.map { |proj| proj['name'] }
expect(project_names).to match_array([project1.name, project3.name])
expect(json_response.first['visibility']).not_to be_present
2015-12-08 07:34:09 -05:00
end
2016-12-12 03:55:29 -05:00
it 'filters the groups projects' do
public_project = create(:project, :public, path: 'test1', group: group1)
2016-12-12 03:55:29 -05:00
get api("/groups/#{group1.id}/projects", user1), visibility: 'public'
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
2016-12-12 03:55:29 -05:00
expect(json_response).to be_an(Array)
expect(json_response.length).to eq(1)
expect(json_response.first['name']).to eq(public_project.name)
2016-12-12 03:55:29 -05:00
end
it "does not return a non existing group" do
2015-12-08 07:34:09 -05:00
get api("/groups/1328/projects", user1)
expect(response).to have_gitlab_http_status(404)
2015-12-08 07:34:09 -05:00
end
it "does not return a group not attached to user1" do
2015-12-08 07:34:09 -05:00
get api("/groups/#{group2.id}/projects", user1)
expect(response).to have_gitlab_http_status(404)
2015-12-08 07:34:09 -05:00
end
it "only returns projects to which user has access" do
project3.add_developer(user3)
get api("/groups/#{group1.id}/projects", user3)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
expect(json_response.length).to eq(1)
expect(json_response.first['name']).to eq(project3.name)
end
it 'only returns the projects owned by user' do
project2.group.add_owner(user3)
get api("/groups/#{project2.group.id}/projects", user3), owned: true
expect(response).to have_gitlab_http_status(200)
expect(json_response.length).to eq(1)
expect(json_response.first['name']).to eq(project2.name)
end
it 'only returns the projects starred by user' do
user1.starred_projects = [project1]
get api("/groups/#{group1.id}/projects", user1), starred: true
expect(response).to have_gitlab_http_status(200)
expect(json_response.length).to eq(1)
expect(json_response.first['name']).to eq(project1.name)
end
2015-12-08 07:34:09 -05:00
end
context "when authenticated as admin" do
it "returns any existing group" do
2015-12-08 07:34:09 -05:00
get api("/groups/#{group2.id}/projects", admin)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
2015-12-08 07:34:09 -05:00
expect(json_response.length).to eq(1)
expect(json_response.first['name']).to eq(project2.name)
end
it "does not return a non existing group" do
2015-12-08 07:34:09 -05:00
get api("/groups/1328/projects", admin)
expect(response).to have_gitlab_http_status(404)
2015-12-08 07:34:09 -05:00
end
it 'avoids N+1 queries' do
get api("/groups/#{group1.id}/projects", admin)
control_count = ActiveRecord::QueryRecorder.new do
get api("/groups/#{group1.id}/projects", admin)
end.count
create(:project, namespace: group1)
expect do
get api("/groups/#{group1.id}/projects", admin)
end.not_to exceed_query_limit(control_count)
end
2015-12-08 07:34:09 -05:00
end
context 'when using group path in URL' do
it 'returns any existing group' do
2015-12-08 07:34:09 -05:00
get api("/groups/#{group1.path}/projects", admin)
expect(response).to have_gitlab_http_status(200)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
2017-02-21 18:33:53 -05:00
project_names = json_response.map { |proj| proj['name'] }
expect(project_names).to match_array([project1.name, project3.name])
2015-12-08 07:34:09 -05:00
end
it 'does not return a non existing group' do
2015-12-08 07:34:09 -05:00
get api('/groups/unknown/projects', admin)
expect(response).to have_gitlab_http_status(404)
2015-12-08 07:34:09 -05:00
end
it 'does not return a group not attached to user1' do
2015-12-08 07:34:09 -05:00
get api("/groups/#{group2.path}/projects", user1)
expect(response).to have_gitlab_http_status(404)
2015-12-08 07:34:09 -05:00
end
end
end
describe 'GET /groups/:id/subgroups', :nested_groups do
let!(:subgroup1) { create(:group, parent: group1) }
let!(:subgroup2) { create(:group, :private, parent: group1) }
let!(:subgroup3) { create(:group, :private, parent: group2) }
context 'when unauthenticated' do
it 'returns only public subgroups' do
get api("/groups/#{group1.id}/subgroups")
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
expect(json_response.first['id']).to eq(subgroup1.id)
expect(json_response.first['parent_id']).to eq(group1.id)
end
it 'returns 404 for a private group' do
get api("/groups/#{group2.id}/subgroups")
expect(response).to have_gitlab_http_status(404)
end
end
context 'when authenticated as user' do
context 'when user is not member of a public group' do
it 'returns no subgroups for the public group' do
get api("/groups/#{group1.id}/subgroups", user2)
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.length).to eq(0)
end
context 'when using all_available in request' do
it 'returns public subgroups' do
get api("/groups/#{group1.id}/subgroups", user2), all_available: true
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
expect(json_response[0]['id']).to eq(subgroup1.id)
expect(json_response[0]['parent_id']).to eq(group1.id)
end
end
end
context 'when user is not member of a private group' do
it 'returns 404 for the private group' do
get api("/groups/#{group2.id}/subgroups", user1)
expect(response).to have_gitlab_http_status(404)
end
end
context 'when user is member of public group' do
before do
group1.add_guest(user2)
end
it 'returns private subgroups' do
get api("/groups/#{group1.id}/subgroups", user2)
expect(response).to have_gitlab_http_status(200)
expect(response).to include_pagination_headers
expect(json_response).to be_an Array
expect(json_response.length).to eq(2)
private_subgroups = json_response.select { |group| group['visibility'] == 'private' }
expect(private_subgroups.length).to eq(1)
expect(private_subgroups.first['id']).to eq(subgroup2.id)
expect(private_subgroups.first['parent_id']).to eq(group1.id)
end
context 'when using statistics in request' do
it 'does not include statistics' do
get api("/groups/#{group1.id}/subgroups", user2), statistics: true
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.first).not_to include 'statistics'
end
end
end
context 'when user is member of private group' do
before do
group2.add_guest(user1)
end
it 'returns subgroups' do
get api("/groups/#{group2.id}/subgroups", user1)
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
expect(json_response.first['id']).to eq(subgroup3.id)
expect(json_response.first['parent_id']).to eq(group2.id)
end
end
end
context 'when authenticated as admin' do
it 'returns private subgroups of a public group' do
get api("/groups/#{group1.id}/subgroups", admin)
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.length).to eq(2)
end
it 'returns subgroups of a private group' do
get api("/groups/#{group2.id}/subgroups", admin)
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.length).to eq(1)
end
it 'does not include statistics by default' do
get api("/groups/#{group1.id}/subgroups", admin)
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.first).not_to include('statistics')
end
it 'includes statistics if requested' do
get api("/groups/#{group1.id}/subgroups", admin), statistics: true
expect(response).to have_gitlab_http_status(200)
expect(json_response).to be_an Array
expect(json_response.first).to include('statistics')
end
end
end
2013-02-01 08:59:22 -05:00
describe "POST /groups" do
context "when authenticated as user without group permissions" do
it "does not create group" do
2013-02-01 08:59:22 -05:00
post api("/groups", user1), attributes_for(:group)
expect(response).to have_gitlab_http_status(403)
2013-02-01 08:59:22 -05:00
end
context 'as owner', :nested_groups do
before do
group2.add_owner(user1)
end
it 'can create subgroups' do
post api("/groups", user1), parent_id: group2.id, name: 'foo', path: 'foo'
expect(response).to have_gitlab_http_status(201)
end
end
context 'as maintainer', :nested_groups do
before do
group2.add_maintainer(user1)
end
it 'cannot create subgroups' do
post api("/groups", user1), parent_id: group2.id, name: 'foo', path: 'foo'
expect(response).to have_gitlab_http_status(403)
end
end
2013-02-01 08:59:22 -05:00
end
2013-03-20 17:46:30 -04:00
context "when authenticated as user with group permissions" do
it "creates group" do
group = attributes_for(:group, { request_access_enabled: false })
post api("/groups", user3), group
expect(response).to have_gitlab_http_status(201)
expect(json_response["name"]).to eq(group[:name])
expect(json_response["path"]).to eq(group[:path])
expect(json_response["request_access_enabled"]).to eq(group[:request_access_enabled])
expect(json_response["visibility"]).to eq(Gitlab::VisibilityLevel.string_level(Gitlab::CurrentSettings.current_application_settings.default_group_visibility))
2013-02-01 08:59:22 -05:00
end
2013-02-01 12:58:53 -05:00
Use CTEs for nested groups and authorizations This commit introduces the usage of Common Table Expressions (CTEs) to efficiently retrieve nested group hierarchies, without having to rely on the "routes" table (which is an _incredibly_ inefficient way of getting the data). This requires a patch to ActiveRecord (found in the added initializer) to work properly as ActiveRecord doesn't support WITH statements properly out of the box. Unfortunately MySQL provides no efficient way of getting nested groups. For example, the old routes setup could easily take 5-10 seconds depending on the amount of "routes" in a database. Providing vastly different logic for both MySQL and PostgreSQL will negatively impact the development process. Because of this the various nested groups related methods return empty relations when used in combination with MySQL. For project authorizations the logic is split up into two classes: * Gitlab::ProjectAuthorizations::WithNestedGroups * Gitlab::ProjectAuthorizations::WithoutNestedGroups Both classes get the fresh project authorizations (= as they should be in the "project_authorizations" table), including nested groups if PostgreSQL is used. The logic of these two classes is quite different apart from their public interface. This complicates development a bit, but unfortunately there is no way around this. This commit also introduces Gitlab::GroupHierarchy. This class can be used to get the ancestors and descendants of a base relation, or both by using a UNION. This in turn is used by methods such as: * Namespace#ancestors * Namespace#descendants * User#all_expanded_groups Again this class relies on CTEs and thus only works on PostgreSQL. The Namespace methods will return an empty relation when MySQL is used, while User#all_expanded_groups will return only the groups a user is a direct member of. Performance wise the impact is quite large. For example, on GitLab.com Namespace#descendants used to take around 580 ms to retrieve data for a particular user. Using CTEs we are able to reduce this down to roughly 1 millisecond, returning the exact same data. == On The Fly Refreshing Refreshing of authorizations on the fly (= when users.authorized_projects_populated was not set) is removed with this commit. This simplifies the code, and ensures any queries used for authorizations are not mutated because they are executed in a Rails scope (e.g. Project.visible_to_user). This commit includes a migration to schedule refreshing authorizations for all users, ensuring all of them have their authorizations in place. Said migration schedules users in batches of 5000, with 5 minutes between every batch to smear the load around a bit. == Spec Changes This commit also introduces some changes to various specs. For example, some specs for ProjectTeam assumed that creating a personal project would _not_ lead to the owner having access, which is incorrect. Because we also no longer refresh authorizations on the fly for new users some code had to be added to the "empty_project" factory. This chunk of code ensures that the owner's permissions are refreshed after creating the project, something that is normally done in Projects::CreateService.
2017-04-24 11:19:22 -04:00
it "creates a nested group", :nested_groups do
parent = create(:group)
parent.add_owner(user3)
group = attributes_for(:group, { parent_id: parent.id })
post api("/groups", user3), group
expect(response).to have_gitlab_http_status(201)
expect(json_response["full_path"]).to eq("#{parent.path}/#{group[:path]}")
expect(json_response["parent_id"]).to eq(parent.id)
end
it "does not create group, duplicate" do
post api("/groups", user3), { name: 'Duplicate Test', path: group2.path }
expect(response).to have_gitlab_http_status(400)
expect(response.message).to eq("Bad Request")
2013-02-01 12:58:53 -05:00
end
it "returns 400 bad request error if name not given" do
post api("/groups", user3), { path: group2.path }
expect(response).to have_gitlab_http_status(400)
end
it "returns 400 bad request error if path not given" do
post api("/groups", user3), { name: 'test' }
expect(response).to have_gitlab_http_status(400)
end
2013-02-01 08:59:22 -05:00
end
end
2012-11-14 15:37:52 -05:00
2013-10-07 06:18:37 -04:00
describe "DELETE /groups/:id" do
context "when authenticated as user" do
it "removes group" do
2018-05-17 21:05:11 -04:00
Sidekiq::Testing.fake! do
expect { delete api("/groups/#{group1.id}", user1) }.to change(GroupDestroyWorker.jobs, :size).by(1)
end
2018-05-17 21:05:11 -04:00
expect(response).to have_gitlab_http_status(202)
2013-10-07 06:18:37 -04:00
end
2017-08-24 12:03:39 -04:00
it_behaves_like '412 response' do
let(:request) { api("/groups/#{group1.id}", user1) }
2018-05-17 21:05:11 -04:00
let(:success_status) { 202 }
2017-08-24 12:03:39 -04:00
end
it "does not remove a group if not an owner" do
user4 = create(:user)
group1.add_maintainer(user4)
2013-10-07 06:18:37 -04:00
delete api("/groups/#{group1.id}", user3)
expect(response).to have_gitlab_http_status(403)
2013-10-07 06:18:37 -04:00
end
it "does not remove a non existing group" do
2013-10-07 06:18:37 -04:00
delete api("/groups/1328", user1)
expect(response).to have_gitlab_http_status(404)
2013-10-07 06:18:37 -04:00
end
it "does not remove a group not attached to user1" do
2013-10-07 06:18:37 -04:00
delete api("/groups/#{group2.id}", user1)
expect(response).to have_gitlab_http_status(404)
2013-10-07 06:18:37 -04:00
end
end
context "when authenticated as admin" do
it "removes any existing group" do
2013-10-07 06:18:37 -04:00
delete api("/groups/#{group2.id}", admin)
2018-05-17 21:05:11 -04:00
expect(response).to have_gitlab_http_status(202)
2013-10-07 06:18:37 -04:00
end
it "does not remove a non existing group" do
2013-10-07 06:18:37 -04:00
delete api("/groups/1328", admin)
expect(response).to have_gitlab_http_status(404)
2013-10-07 06:18:37 -04:00
end
end
end
2012-11-14 15:37:52 -05:00
describe "POST /groups/:id/projects/:project_id" do
let(:project) { create(:project) }
let(:project_path) { CGI.escape(project.full_path) }
before do
2017-06-21 09:48:12 -04:00
allow_any_instance_of(Projects::TransferService)
.to receive(:execute).and_return(true)
2012-11-14 15:37:52 -05:00
end
context "when authenticated as user" do
it "does not transfer project to group" do
2012-11-14 15:37:52 -05:00
post api("/groups/#{group1.id}/projects/#{project.id}", user2)
expect(response).to have_gitlab_http_status(403)
2012-11-14 15:37:52 -05:00
end
end
context "when authenticated as admin" do
it "transfers project to group" do
2012-11-14 15:37:52 -05:00
post api("/groups/#{group1.id}/projects/#{project.id}", admin)
expect(response).to have_gitlab_http_status(201)
2012-11-14 15:37:52 -05:00
end
context 'when using project path in URL' do
context 'with a valid project path' do
it "transfers project to group" do
post api("/groups/#{group1.id}/projects/#{project_path}", admin)
expect(response).to have_gitlab_http_status(201)
end
end
context 'with a non-existent project path' do
it "does not transfer project to group" do
post api("/groups/#{group1.id}/projects/nogroup%2Fnoproject", admin)
expect(response).to have_gitlab_http_status(404)
end
end
end
context 'when using a group path in URL' do
context 'with a valid group path' do
it "transfers project to group" do
post api("/groups/#{group1.path}/projects/#{project_path}", admin)
expect(response).to have_gitlab_http_status(201)
end
end
context 'with a non-existent group path' do
it "does not transfer project to group" do
post api("/groups/noexist/projects/#{project_path}", admin)
expect(response).to have_gitlab_http_status(404)
end
end
end
2012-11-14 15:37:52 -05:00
end
end
2017-09-18 11:07:38 -04:00
it_behaves_like 'custom attributes endpoints', 'groups' do
let(:attributable) { group1 }
let(:other_attributable) { group2 }
let(:user) { user1 }
before do
group2.add_owner(user1)
end
end
2013-02-01 08:59:22 -05:00
end