gitlab-org--gitlab-foss/spec/requests/api/triggers_spec.rb

338 lines
12 KiB
Ruby
Raw Normal View History

# frozen_string_literal: true
2015-12-10 12:04:40 -05:00
require 'spec_helper'
RSpec.describe API::Triggers do
let_it_be(:user) { create(:user) }
let_it_be(:user2) { create(:user) }
let!(:trigger_token) { 'secure_token' }
let!(:trigger_token_2) { 'secure_token_2' }
let!(:project) { create(:project, :repository, creator: user) }
let!(:maintainer) { create(:project_member, :maintainer, user: user, project: project) }
let!(:developer) { create(:project_member, :developer, user: user2, project: project) }
let!(:trigger) { create(:ci_trigger, project: project, token: trigger_token, owner: user) }
let!(:trigger2) { create(:ci_trigger, project: project, token: trigger_token_2, owner: user2) }
2016-01-04 10:38:32 -05:00
let!(:trigger_request) { create(:ci_trigger_request, trigger: trigger, created_at: '2015-01-01 12:13:14') }
2017-03-05 14:58:08 -05:00
describe 'POST /projects/:project_id/trigger/pipeline' do
let!(:project2) { create(:project, :repository) }
2015-12-10 12:04:40 -05:00
let(:options) do
{
token: trigger_token
}
end
before do
stub_ci_pipeline_to_return_yaml_file
2015-12-10 12:04:40 -05:00
end
context 'Handles errors' do
it 'returns bad request if token is missing' do
post api("/projects/#{project.id}/trigger/pipeline"), params: { ref: 'master' }
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:bad_request)
2015-12-10 12:04:40 -05:00
end
it 'returns not found if project is not found' do
post api('/projects/0/trigger/pipeline'), params: options.merge(ref: 'master')
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:not_found)
2015-12-10 12:04:40 -05:00
end
end
context 'Have a commit' do
2018-12-05 09:39:15 -05:00
let(:pipeline) { project.ci_pipelines.last }
2015-12-10 12:04:40 -05:00
2017-03-05 14:58:08 -05:00
it 'creates pipeline' do
post api("/projects/#{project.id}/trigger/pipeline"), params: options.merge(ref: 'master')
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:created)
2017-03-05 14:58:08 -05:00
expect(json_response).to include('id' => pipeline.id)
pipeline.builds.reload
expect(pipeline.builds.pending.size).to eq(2)
expect(pipeline.builds.size).to eq(5)
2015-12-10 12:04:40 -05:00
end
it 'stores payload as a variable' do
post api("/projects/#{project.id}/trigger/pipeline"), params: options.merge(ref: 'master')
expect(response).to have_gitlab_http_status(:created)
expect(pipeline.variables.find { |v| v.key == 'TRIGGER_PAYLOAD' }.value).to eq(
"{\"ref\":\"master\",\"id\":\"#{project.id}\",\"variables\":{}}"
)
end
2017-03-05 14:58:08 -05:00
it 'returns bad request with no pipeline created if there\'s no commit for that ref' do
post api("/projects/#{project.id}/trigger/pipeline"), params: options.merge(ref: 'other-branch')
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:bad_request)
2017-07-26 05:31:09 -04:00
expect(json_response['message']).to eq('base' => ["Reference not found"])
2015-12-10 12:04:40 -05:00
end
context 'Validates variables' do
let(:variables) do
{ 'TRIGGER_KEY' => 'TRIGGER_VALUE' }
end
it 'validates variables to be a hash' do
post api("/projects/#{project.id}/trigger/pipeline"), params: options.merge(variables: 'value', ref: 'master')
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:bad_request)
2016-11-09 10:47:39 -05:00
expect(json_response['error']).to eq('variables is invalid')
2015-12-10 12:04:40 -05:00
end
it 'validates variables needs to be a map of key-valued strings' do
post api("/projects/#{project.id}/trigger/pipeline"), params: options.merge(variables: { key: %w(1 2) }, ref: 'master')
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:bad_request)
2015-12-10 12:04:40 -05:00
expect(json_response['message']).to eq('variables needs to be a map of key-valued strings')
end
it 'creates trigger request with variables' do
post api("/projects/#{project.id}/trigger/pipeline"), params: options.merge(variables: variables, ref: 'master')
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:created)
expect(pipeline.variables.find { |v| v.key == 'TRIGGER_KEY' }.value).to eq('TRIGGER_VALUE')
2015-12-10 12:04:40 -05:00
end
end
2017-08-28 02:35:26 -04:00
end
context 'when triggering a pipeline from a trigger token' do
2017-07-26 05:31:09 -04:00
it 'does not leak the presence of project when token is for different project' do
post api("/projects/#{project2.id}/ref/master/trigger/pipeline?token=#{trigger_token}"), params: { ref: 'refs/heads/other-branch' }
2017-07-26 05:31:09 -04:00
expect(response).to have_gitlab_http_status(:not_found)
2017-07-26 05:31:09 -04:00
end
it 'creates builds from the ref given in the URL, not in the body' do
expect do
post api("/projects/#{project.id}/ref/master/trigger/pipeline?token=#{trigger_token}"), params: { ref: 'refs/heads/other-branch' }
end.to change(project.builds, :count).by(5)
expect(response).to have_gitlab_http_status(:created)
end
context 'when ref contains a dot' do
it 'creates builds from the ref given in the URL, not in the body' do
project.repository.create_file(user, '.gitlab/gitlabhq/new_feature.md', 'something valid', message: 'new_feature', branch_name: 'v.1-branch')
expect do
post api("/projects/#{project.id}/ref/v.1-branch/trigger/pipeline?token=#{trigger_token}"), params: { ref: 'refs/heads/other-branch' }
end.to change(project.builds, :count).by(4)
expect(response).to have_gitlab_http_status(:created)
end
end
end
context 'when is triggered by a pipeline hook' do
it 'does not create a new pipeline' do
expect do
post api("/projects/#{project.id}/ref/master/trigger/pipeline?token=#{trigger_token}"),
params: { ref: 'refs/heads/other-branch' },
headers: { WebHookService::GITLAB_EVENT_HEADER => 'Pipeline Hook' }
end.not_to change(Ci::Pipeline, :count)
expect(response).to have_gitlab_http_status(:forbidden)
end
end
2015-12-10 12:04:40 -05:00
end
2016-01-04 10:38:32 -05:00
describe 'GET /projects/:id/triggers' do
context 'authenticated user who can access triggers' do
it 'returns a list of triggers with tokens exposed correctly' do
2016-01-04 10:38:32 -05:00
get api("/projects/#{project.id}/triggers", user)
expect(response).to have_gitlab_http_status(:ok)
2017-01-24 15:49:10 -05:00
expect(response).to include_pagination_headers
2016-01-04 10:38:32 -05:00
expect(json_response).to be_a(Array)
expect(json_response.size).to eq 2
expect(json_response.dig(0, 'token')).to eq trigger_token
expect(json_response.dig(1, 'token')).to eq trigger_token_2[0..3]
2016-01-04 10:38:32 -05:00
end
end
context 'authenticated user with invalid permissions' do
it 'does not return triggers list' do
2016-01-04 10:38:32 -05:00
get api("/projects/#{project.id}/triggers", user2)
expect(response).to have_gitlab_http_status(:forbidden)
2016-01-04 10:38:32 -05:00
end
end
2016-01-13 06:16:27 -05:00
context 'unauthenticated user' do
it 'does not return triggers list' do
2016-01-04 10:38:32 -05:00
get api("/projects/#{project.id}/triggers")
expect(response).to have_gitlab_http_status(:unauthorized)
2016-01-04 10:38:32 -05:00
end
end
end
2016-01-05 05:27:38 -05:00
2017-03-05 14:58:08 -05:00
describe 'GET /projects/:id/triggers/:trigger_id' do
context 'authenticated user with valid permissions' do
it 'returns trigger details' do
2017-03-05 14:58:08 -05:00
get api("/projects/#{project.id}/triggers/#{trigger.id}", user)
expect(response).to have_gitlab_http_status(:ok)
expect(json_response).to be_a(Hash)
end
it 'responds with 404 Not Found if requesting non-existing trigger' do
2017-03-05 14:58:08 -05:00
get api("/projects/#{project.id}/triggers/-5", user)
expect(response).to have_gitlab_http_status(:not_found)
end
end
context 'authenticated user with invalid permissions' do
it 'does not return triggers list' do
2017-03-05 14:58:08 -05:00
get api("/projects/#{project.id}/triggers/#{trigger.id}", user2)
expect(response).to have_gitlab_http_status(:forbidden)
end
end
2016-01-13 06:16:27 -05:00
context 'unauthenticated user' do
it 'does not return triggers list' do
2017-03-05 14:58:08 -05:00
get api("/projects/#{project.id}/triggers/#{trigger.id}")
expect(response).to have_gitlab_http_status(:unauthorized)
end
end
end
describe 'POST /projects/:id/triggers' do
2016-01-05 05:44:10 -05:00
context 'authenticated user with valid permissions' do
2017-03-05 14:58:08 -05:00
context 'with required parameters' do
it 'creates trigger' do
expect do
post api("/projects/#{project.id}/triggers", user),
params: { description: 'trigger' }
end.to change {project.triggers.count}.by(1)
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:created)
2017-03-05 14:58:08 -05:00
expect(json_response).to include('description' => 'trigger')
end
end
context 'without required parameters' do
2017-03-06 05:48:33 -05:00
it 'does not create trigger' do
2016-01-05 05:44:10 -05:00
post api("/projects/#{project.id}/triggers", user)
expect(response).to have_gitlab_http_status(:bad_request)
2017-03-05 14:58:08 -05:00
end
2016-01-05 05:44:10 -05:00
end
end
context 'authenticated user with invalid permissions' do
it 'does not create trigger' do
2017-03-05 14:58:08 -05:00
post api("/projects/#{project.id}/triggers", user2),
params: { description: 'trigger' }
2016-01-05 05:44:10 -05:00
expect(response).to have_gitlab_http_status(:forbidden)
2016-01-05 05:44:10 -05:00
end
end
2016-01-13 06:16:27 -05:00
context 'unauthenticated user' do
it 'does not create trigger' do
2017-03-05 14:58:08 -05:00
post api("/projects/#{project.id}/triggers"),
params: { description: 'trigger' }
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:unauthorized)
2017-03-05 14:58:08 -05:00
end
end
end
describe 'PUT /projects/:id/triggers/:trigger_id' do
context 'user is maintainer of the project' do
context 'the trigger belongs to user' do
let(:new_description) { 'new description' }
2017-03-05 14:58:08 -05:00
it 'updates description' do
put api("/projects/#{project.id}/triggers/#{trigger.id}", user),
params: { description: new_description }
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:ok)
expect(json_response).to include('description' => new_description)
expect(trigger.reload.description).to eq(new_description)
end
end
context 'the trigger does not belong to user' do
it 'does not update trigger' do
put api("/projects/#{project.id}/triggers/#{trigger2.id}", user)
expect(response).to have_gitlab_http_status(:forbidden)
end
2017-03-05 14:58:08 -05:00
end
end
context 'user is developer of the project' do
context 'the trigger belongs to user' do
it 'does not update trigger' do
put api("/projects/#{project.id}/triggers/#{trigger2.id}", user2)
2017-03-05 14:58:08 -05:00
expect(response).to have_gitlab_http_status(:forbidden)
end
end
context 'the trigger does not belong to user' do
it 'does not update trigger' do
put api("/projects/#{project.id}/triggers/#{trigger.id}", user2)
expect(response).to have_gitlab_http_status(:forbidden)
end
2017-03-05 14:58:08 -05:00
end
end
context 'unauthenticated user' do
it 'does not update trigger' do
put api("/projects/#{project.id}/triggers/#{trigger.id}")
expect(response).to have_gitlab_http_status(:unauthorized)
2017-03-05 14:58:08 -05:00
end
end
end
describe 'DELETE /projects/:id/triggers/:trigger_id' do
2016-01-05 05:27:38 -05:00
context 'authenticated user with valid permissions' do
it 'deletes trigger' do
2016-01-05 05:27:38 -05:00
expect do
2017-03-05 14:58:08 -05:00
delete api("/projects/#{project.id}/triggers/#{trigger.id}", user)
2017-02-20 13:18:12 -05:00
expect(response).to have_gitlab_http_status(:no_content)
end.to change {project.triggers.count}.by(-1)
2016-01-05 05:27:38 -05:00
end
it 'responds with 404 Not Found if requesting non-existing trigger' do
2017-03-05 14:58:08 -05:00
delete api("/projects/#{project.id}/triggers/-5", user)
2016-01-05 05:27:38 -05:00
expect(response).to have_gitlab_http_status(:not_found)
2016-01-05 05:27:38 -05:00
end
2017-08-24 12:03:39 -04:00
it_behaves_like '412 response' do
let(:request) { api("/projects/#{project.id}/triggers/#{trigger.id}", user) }
end
2016-01-05 05:27:38 -05:00
end
context 'authenticated user with invalid permissions' do
it 'does not delete trigger' do
2017-03-05 14:58:08 -05:00
delete api("/projects/#{project.id}/triggers/#{trigger.id}", user2)
2016-01-05 05:27:38 -05:00
expect(response).to have_gitlab_http_status(:forbidden)
2016-01-05 05:27:38 -05:00
end
end
2016-01-13 06:16:27 -05:00
context 'unauthenticated user' do
it 'does not delete trigger' do
2017-03-05 14:58:08 -05:00
delete api("/projects/#{project.id}/triggers/#{trigger.id}")
2016-01-05 05:27:38 -05:00
expect(response).to have_gitlab_http_status(:unauthorized)
2016-01-05 05:27:38 -05:00
end
end
end
2015-12-10 12:04:40 -05:00
end