2019-11-26 03:06:24 +00:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-30 17:45:58 +00:00
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe Gitlab::ImportExport::Importer do
|
2018-04-06 15:23:49 +00:00
|
|
|
let(:user) { create(:user) }
|
2018-03-30 17:45:58 +00:00
|
|
|
let(:test_path) { "#{Dir.tmpdir}/importer_spec" }
|
|
|
|
let(:shared) { project.import_export_shared }
|
2018-08-29 13:41:56 +00:00
|
|
|
let(:project) { create(:project) }
|
|
|
|
let(:import_file) { fixture_file_upload('spec/features/projects/import_export/test_project_export.tar.gz') }
|
2018-03-30 17:45:58 +00:00
|
|
|
|
|
|
|
subject(:importer) { described_class.new(project) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow_any_instance_of(Gitlab::ImportExport).to receive(:storage_path).and_return(test_path)
|
2018-07-26 10:55:21 +00:00
|
|
|
allow_any_instance_of(Gitlab::ImportExport::FileImporter).to receive(:remove_import_file)
|
2018-08-29 13:41:56 +00:00
|
|
|
stub_uploads_object_storage(FileUploader)
|
2018-07-26 10:55:21 +00:00
|
|
|
|
2018-03-30 17:45:58 +00:00
|
|
|
FileUtils.mkdir_p(shared.export_path)
|
2018-08-29 13:41:56 +00:00
|
|
|
ImportExportUpload.create(project: project, import_file: import_file)
|
2020-05-26 15:08:17 +00:00
|
|
|
allow(FileUtils).to receive(:rm_rf).and_call_original
|
2018-03-30 17:45:58 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
FileUtils.rm_rf(test_path)
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#execute' do
|
|
|
|
it 'succeeds' do
|
|
|
|
importer.execute
|
|
|
|
|
|
|
|
expect(shared.errors).to be_empty
|
|
|
|
end
|
|
|
|
|
2019-01-16 12:09:29 +00:00
|
|
|
it 'extracts the archive' do
|
2018-03-30 17:45:58 +00:00
|
|
|
expect(Gitlab::ImportExport::FileImporter).to receive(:import).and_call_original
|
|
|
|
|
|
|
|
importer.execute
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'checks the version' do
|
|
|
|
expect(Gitlab::ImportExport::VersionChecker).to receive(:check!).and_call_original
|
|
|
|
|
|
|
|
importer.execute
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'all restores are executed' do
|
|
|
|
[
|
|
|
|
Gitlab::ImportExport::AvatarRestorer,
|
|
|
|
Gitlab::ImportExport::RepoRestorer,
|
|
|
|
Gitlab::ImportExport::WikiRestorer,
|
|
|
|
Gitlab::ImportExport::UploadsRestorer,
|
2018-04-06 15:23:49 +00:00
|
|
|
Gitlab::ImportExport::LfsRestorer,
|
2020-03-06 18:08:08 +00:00
|
|
|
Gitlab::ImportExport::StatisticsRestorer,
|
2020-05-12 00:10:11 +00:00
|
|
|
Gitlab::ImportExport::SnippetsRepoRestorer,
|
|
|
|
Gitlab::ImportExport::DesignRepoRestorer
|
2018-03-30 17:45:58 +00:00
|
|
|
].each do |restorer|
|
|
|
|
it "calls the #{restorer}" do
|
|
|
|
fake_restorer = double(restorer.to_s)
|
|
|
|
|
|
|
|
expect(fake_restorer).to receive(:restore).and_return(true).at_least(1)
|
|
|
|
expect(restorer).to receive(:new).and_return(fake_restorer).at_least(1)
|
|
|
|
|
|
|
|
importer.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'restores the ProjectTree' do
|
2020-02-26 18:09:24 +00:00
|
|
|
expect(Gitlab::ImportExport::Project::TreeRestorer).to receive(:new).and_call_original
|
2018-03-30 17:45:58 +00:00
|
|
|
|
|
|
|
importer.execute
|
|
|
|
end
|
2018-08-16 10:02:34 +00:00
|
|
|
|
2018-08-29 13:41:56 +00:00
|
|
|
it 'removes the import file' do
|
|
|
|
expect(importer).to receive(:remove_import_file).and_call_original
|
|
|
|
|
|
|
|
importer.execute
|
|
|
|
|
|
|
|
expect(project.import_export_upload.import_file&.file).to be_nil
|
|
|
|
end
|
|
|
|
|
2020-05-26 15:08:17 +00:00
|
|
|
it 'removes tmp files' do
|
|
|
|
importer.execute
|
|
|
|
|
|
|
|
expect(FileUtils).to have_received(:rm_rf).with(shared.base_path)
|
|
|
|
expect(Dir.exist?(shared.base_path)).to eq(false)
|
|
|
|
end
|
|
|
|
|
2018-08-16 10:02:34 +00:00
|
|
|
it 'sets the correct visibility_level when visibility level is a string' do
|
|
|
|
project.create_or_update_import_data(
|
|
|
|
data: { override_params: { visibility_level: Gitlab::VisibilityLevel::PRIVATE.to_s } }
|
|
|
|
)
|
|
|
|
|
|
|
|
importer.execute
|
|
|
|
|
|
|
|
expect(project.visibility_level).to eq(Gitlab::VisibilityLevel::PRIVATE)
|
|
|
|
end
|
2018-03-30 17:45:58 +00:00
|
|
|
end
|
2018-04-06 15:23:49 +00:00
|
|
|
|
|
|
|
context 'when project successfully restored' do
|
2020-05-09 12:09:53 +00:00
|
|
|
context "with a project in a user's namespace" do
|
|
|
|
let!(:existing_project) { create(:project, namespace: user.namespace) }
|
|
|
|
let(:project) { create(:project, namespace: user.namespace, name: 'whatever', path: 'whatever') }
|
2018-04-06 15:23:49 +00:00
|
|
|
|
2020-05-09 12:09:53 +00:00
|
|
|
before do
|
|
|
|
restorers = double(:restorers, all?: true)
|
2018-04-06 15:23:49 +00:00
|
|
|
|
2020-05-09 12:09:53 +00:00
|
|
|
allow(subject).to receive(:import_file).and_return(true)
|
|
|
|
allow(subject).to receive(:check_version!).and_return(true)
|
|
|
|
allow(subject).to receive(:restorers).and_return(restorers)
|
|
|
|
allow(project).to receive(:import_data).and_return(double(data: { 'original_path' => existing_project.path }))
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when import_data' do
|
|
|
|
context 'has original_path' do
|
|
|
|
it 'overwrites existing project' do
|
|
|
|
expect_next_instance_of(::Projects::OverwriteProjectService) do |service|
|
|
|
|
expect(service).to receive(:execute).with(existing_project)
|
|
|
|
end
|
|
|
|
|
|
|
|
subject.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'has not original_path' do
|
|
|
|
before do
|
|
|
|
allow(project).to receive(:import_data).and_return(double(data: {}))
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not call the overwrite service' do
|
|
|
|
expect(::Projects::OverwriteProjectService).not_to receive(:new)
|
|
|
|
|
|
|
|
subject.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-04-06 15:23:49 +00:00
|
|
|
end
|
|
|
|
|
2020-05-09 12:09:53 +00:00
|
|
|
context "with a project in a group namespace" do
|
|
|
|
let(:group) { create(:group) }
|
|
|
|
let!(:existing_project) { create(:project, group: group) }
|
|
|
|
let(:project) { create(:project, creator: user, group: group, name: 'whatever', path: 'whatever') }
|
|
|
|
|
|
|
|
before do
|
|
|
|
restorers = double(:restorers, all?: true)
|
|
|
|
|
|
|
|
allow(subject).to receive(:import_file).and_return(true)
|
|
|
|
allow(subject).to receive(:check_version!).and_return(true)
|
|
|
|
allow(subject).to receive(:restorers).and_return(restorers)
|
|
|
|
allow(project).to receive(:import_data).and_return(double(data: { 'original_path' => existing_project.path }))
|
|
|
|
end
|
|
|
|
|
2018-04-06 15:23:49 +00:00
|
|
|
context 'has original_path' do
|
|
|
|
it 'overwrites existing project' do
|
2020-05-09 12:09:53 +00:00
|
|
|
group.add_owner(user)
|
2018-04-06 15:23:49 +00:00
|
|
|
|
2020-05-09 12:09:53 +00:00
|
|
|
expect_next_instance_of(::Projects::OverwriteProjectService) do |service|
|
|
|
|
expect(service).to receive(:execute).with(existing_project)
|
|
|
|
end
|
2018-04-06 15:23:49 +00:00
|
|
|
|
2020-05-09 12:09:53 +00:00
|
|
|
subject.execute
|
2018-04-06 15:23:49 +00:00
|
|
|
end
|
|
|
|
|
2020-05-09 12:09:53 +00:00
|
|
|
it 'does not allow user to overwrite existing project' do
|
|
|
|
expect(::Projects::OverwriteProjectService).not_to receive(:new)
|
2018-04-06 15:23:49 +00:00
|
|
|
|
2020-05-09 12:09:53 +00:00
|
|
|
expect { subject.execute }.to raise_error(Projects::ImportService::Error,
|
|
|
|
"User #{user.username} (#{user.id}) cannot overwrite a project in #{group.path}")
|
2018-04-06 15:23:49 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2018-03-30 17:45:58 +00:00
|
|
|
end
|
|
|
|
end
|