# frozen_string_literal: true require 'spec_helper' describe SnippetsController do let(:user) { create(:user) } describe 'GET #index' do let(:user) { create(:user) } context 'when username parameter is present' do it_behaves_like 'paginated collection' do let(:collection) { Snippet.all } let(:params) { { username: user.username } } before do create(:personal_snippet, :public, author: user) end end it 'renders snippets of a user when username is present' do get :index, params: { username: user.username } expect(response).to render_template(:index) end end context 'when username parameter is not present' do it 'redirects to explore snippets page when user is not logged in' do get :index expect(response).to redirect_to(explore_snippets_path) end it 'redirects to snippets dashboard page when user is logged in' do sign_in(user) get :index expect(response).to redirect_to(dashboard_snippets_path) end end end describe 'GET #new' do context 'when signed in' do before do sign_in(user) end it 'responds with status 200' do get :new expect(response).to have_gitlab_http_status(200) end context 'when user is not allowed to create a personal snippet' do let(:user) { create(:user, :external) } it 'responds with status 404' do get :new expect(response).to have_gitlab_http_status(404) end end end context 'when not signed in' do it 'redirects to the sign in page' do get :new expect(response).to redirect_to(new_user_session_path) end end end describe 'GET #show' do context 'when the personal snippet is private' do let(:personal_snippet) { create(:personal_snippet, :private, author: user) } context 'when signed in' do before do sign_in(user) end context 'when signed in user is not the author' do let(:other_author) { create(:author) } let(:other_personal_snippet) { create(:personal_snippet, :private, author: other_author) } it 'responds with status 404' do get :show, params: { id: other_personal_snippet.to_param } expect(response).to have_gitlab_http_status(404) end end context 'when signed in user is the author' do it 'renders the snippet' do get :show, params: { id: personal_snippet.to_param } expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end it 'responds with status 404 when embeddable content is requested' do get :show, params: { id: personal_snippet.to_param }, format: :js expect(response).to have_gitlab_http_status(404) end end end context 'when not signed in' do it 'redirects to the sign in page' do get :show, params: { id: personal_snippet.to_param } expect(response).to redirect_to(new_user_session_path) end end end context 'when the personal snippet is internal' do let(:personal_snippet) { create(:personal_snippet, :internal, author: user) } context 'when signed in' do before do sign_in(user) end it 'renders the snippet' do get :show, params: { id: personal_snippet.to_param } expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end it 'responds with status 404 when embeddable content is requested' do get :show, params: { id: personal_snippet.to_param }, format: :js expect(response).to have_gitlab_http_status(404) end end context 'when not signed in' do it 'redirects to the sign in page' do get :show, params: { id: personal_snippet.to_param } expect(response).to redirect_to(new_user_session_path) end end end context 'when the personal snippet is public' do let(:personal_snippet) { create(:personal_snippet, :public, author: user) } context 'when signed in' do before do sign_in(user) end it 'renders the snippet' do get :show, params: { id: personal_snippet.to_param } expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end it 'responds with status 200 when embeddable content is requested' do get :show, params: { id: personal_snippet.to_param }, format: :js expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end end context 'when not signed in' do it 'renders the snippet' do get :show, params: { id: personal_snippet.to_param } expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end end end context 'when the personal snippet does not exist' do context 'when signed in' do before do sign_in(user) end it 'responds with status 404' do get :show, params: { id: 'doesntexist' } expect(response).to have_gitlab_http_status(404) end end context 'when not signed in' do it 'responds with status 404' do get :show, params: { id: 'doesntexist' } expect(response).to redirect_to(new_user_session_path) end end end end describe 'POST #create' do def create_snippet(snippet_params = {}, additional_params = {}) sign_in(user) post :create, params: { personal_snippet: { title: 'Title', content: 'Content', description: 'Description' }.merge(snippet_params) }.merge(additional_params) Snippet.last end it 'creates the snippet correctly' do snippet = create_snippet(visibility_level: Snippet::PRIVATE) expect(snippet.title).to eq('Title') expect(snippet.content).to eq('Content') expect(snippet.description).to eq('Description') end context 'when user is not allowed to create a personal snippet' do let(:user) { create(:user, :external) } it 'responds with status 404' do aggregate_failures do expect do create_snippet(visibility_level: Snippet::PUBLIC) end.not_to change { Snippet.count } expect(response).to have_gitlab_http_status(404) end end end context 'when the snippet description contains a file' do include FileMoverHelpers let(:picture_file) { "/-/system/user/#{user.id}/secret56/picture.jpg" } let(:text_file) { "/-/system/user/#{user.id}/secret78/text.txt" } let(:description) do "Description with picture: ![picture](/uploads#{picture_file}) and "\ "text: [text.txt](/uploads#{text_file})" end before do allow(FileUtils).to receive(:mkdir_p) allow(FileUtils).to receive(:move) stub_file_mover(text_file) stub_file_mover(picture_file) end subject { create_snippet({ description: description }, { files: [picture_file, text_file] }) } it 'creates the snippet' do expect { subject }.to change { Snippet.count }.by(1) end it 'stores the snippet description correctly' do snippet = subject expected_description = "Description with picture: "\ "![picture](/uploads/-/system/personal_snippet/#{snippet.id}/secret56/picture.jpg) and "\ "text: [text.txt](/uploads/-/system/personal_snippet/#{snippet.id}/secret78/text.txt)" expect(snippet.description).to eq(expected_description) end end context 'when the snippet is spam' do before do allow_next_instance_of(AkismetService) do |instance| allow(instance).to receive(:spam?).and_return(true) end end context 'when the snippet is private' do it 'creates the snippet' do expect { create_snippet(visibility_level: Snippet::PRIVATE) } .to change { Snippet.count }.by(1) end end context 'when the snippet is public' do it 'rejects the shippet' do expect { create_snippet(visibility_level: Snippet::PUBLIC) } .not_to change { Snippet.count } end it 'creates a spam log' do expect { create_snippet(visibility_level: Snippet::PUBLIC) } .to log_spam(title: 'Title', user: user, noteable_type: 'PersonalSnippet') end it 'renders :new with recaptcha disabled' do stub_application_setting(recaptcha_enabled: false) create_snippet(visibility_level: Snippet::PUBLIC) expect(response).to render_template(:new) end context 'recaptcha enabled' do before do stub_application_setting(recaptcha_enabled: true) end it 'renders :verify with recaptcha enabled' do create_snippet(visibility_level: Snippet::PUBLIC) expect(response).to render_template(:verify) end it 'renders snippet page when recaptcha verified' do spammy_title = 'Whatever' spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title) snippet = create_snippet({ title: spammy_title }, { spam_log_id: spam_logs.last.id, recaptcha_verification: true }) expect(response).to redirect_to(snippet_path(snippet)) end end end end end describe 'PUT #update' do let(:project) { create :project } let(:snippet) { create :personal_snippet, author: user, project: project, visibility_level: visibility_level } def update_snippet(snippet_params = {}, additional_params = {}) sign_in(user) put :update, params: { id: snippet.id, personal_snippet: { title: 'Title', content: 'Content' }.merge(snippet_params) }.merge(additional_params) snippet.reload end context 'when the snippet is spam' do before do allow_next_instance_of(AkismetService) do |instance| allow(instance).to receive(:spam?).and_return(true) end end context 'when the snippet is private' do let(:visibility_level) { Snippet::PRIVATE } it 'updates the snippet' do expect { update_snippet(title: 'Foo') } .to change { snippet.reload.title }.to('Foo') end end context 'when a private snippet is made public' do let(:visibility_level) { Snippet::PRIVATE } it 'rejects the snippet' do expect { update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) } .not_to change { snippet.reload.title } end it 'creates a spam log' do expect { update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) } .to log_spam(title: 'Foo', user: user, noteable_type: 'PersonalSnippet') end it 'renders :edit with recaptcha disabled' do stub_application_setting(recaptcha_enabled: false) update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) expect(response).to render_template(:edit) end context 'recaptcha enabled' do before do stub_application_setting(recaptcha_enabled: true) end it 'renders :verify with recaptcha enabled' do update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) expect(response).to render_template(:verify) end it 'renders snippet page when recaptcha verified' do spammy_title = 'Whatever' spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title) snippet = update_snippet({ title: spammy_title, visibility_level: Snippet::PUBLIC }, { spam_log_id: spam_logs.last.id, recaptcha_verification: true }) expect(response).to redirect_to(snippet_path(snippet)) end end end context 'when the snippet is public' do let(:visibility_level) { Snippet::PUBLIC } it 'rejects the shippet' do expect { update_snippet(title: 'Foo') } .not_to change { snippet.reload.title } end it 'creates a spam log' do expect {update_snippet(title: 'Foo') } .to log_spam(title: 'Foo', user: user, noteable_type: 'PersonalSnippet') end it 'renders :edit with recaptcha disabled' do stub_application_setting(recaptcha_enabled: false) update_snippet(title: 'Foo') expect(response).to render_template(:edit) end context 'recaptcha enabled' do before do stub_application_setting(recaptcha_enabled: true) end it 'renders :verify with recaptcha enabled' do update_snippet(title: 'Foo') expect(response).to render_template(:verify) end it 'renders snippet page when recaptcha verified' do spammy_title = 'Whatever' spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title) snippet = update_snippet({ title: spammy_title }, { spam_log_id: spam_logs.last.id, recaptcha_verification: true }) expect(response).to redirect_to(snippet_path(snippet)) end end end end end describe 'POST #mark_as_spam' do let(:snippet) { create(:personal_snippet, :public, author: user) } before do allow_next_instance_of(AkismetService) do |instance| allow(instance).to receive_messages(submit_spam: true) end stub_application_setting(akismet_enabled: true) end def mark_as_spam admin = create(:admin) create(:user_agent_detail, subject: snippet) sign_in(admin) post :mark_as_spam, params: { id: snippet.id } end it 'updates the snippet' do mark_as_spam expect(snippet.reload).not_to be_submittable_as_spam end end describe "GET #raw" do context 'when the personal snippet is private' do let(:personal_snippet) { create(:personal_snippet, :private, author: user) } context 'when signed in' do before do sign_in(user) end context 'when signed in user is not the author' do let(:other_author) { create(:author) } let(:other_personal_snippet) { create(:personal_snippet, :private, author: other_author) } it 'responds with status 404' do get :raw, params: { id: other_personal_snippet.to_param } expect(response).to have_gitlab_http_status(404) end end context 'when signed in user is the author' do before do get :raw, params: { id: personal_snippet.to_param } end it 'responds with status 200' do expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end it 'has expected headers' do expect(response.header['Content-Type']).to eq('text/plain; charset=utf-8') expect(response.header['Content-Disposition']).to match(/inline/) end it "sets #{Gitlab::Workhorse::DETECT_HEADER} header" do expect(response).to have_gitlab_http_status(200) expect(response.header[Gitlab::Workhorse::DETECT_HEADER]).to eq "true" end end end context 'when not signed in' do it 'redirects to the sign in page' do get :raw, params: { id: personal_snippet.to_param } expect(response).to redirect_to(new_user_session_path) end end end context 'when the personal snippet is internal' do let(:personal_snippet) { create(:personal_snippet, :internal, author: user) } context 'when signed in' do before do sign_in(user) end it 'responds with status 200' do get :raw, params: { id: personal_snippet.to_param } expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end end context 'when not signed in' do it 'redirects to the sign in page' do get :raw, params: { id: personal_snippet.to_param } expect(response).to redirect_to(new_user_session_path) end end end context 'when the personal snippet is public' do let(:personal_snippet) { create(:personal_snippet, :public, author: user) } context 'when signed in' do before do sign_in(user) end it 'responds with status 200' do get :raw, params: { id: personal_snippet.to_param } expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end context 'CRLF line ending' do let(:personal_snippet) do create(:personal_snippet, :public, author: user, content: "first line\r\nsecond line\r\nthird line") end it 'returns LF line endings by default' do get :raw, params: { id: personal_snippet.to_param } expect(response.body).to eq("first line\nsecond line\nthird line") end it 'does not convert line endings when parameter present' do get :raw, params: { id: personal_snippet.to_param, line_ending: :raw } expect(response.body).to eq("first line\r\nsecond line\r\nthird line") end end end context 'when not signed in' do it 'responds with status 200' do get :raw, params: { id: personal_snippet.to_param } expect(assigns(:snippet)).to eq(personal_snippet) expect(response).to have_gitlab_http_status(200) end end end context 'when the personal snippet does not exist' do context 'when signed in' do before do sign_in(user) end it 'responds with status 404' do get :raw, params: { id: 'doesntexist' } expect(response).to have_gitlab_http_status(404) end end context 'when not signed in' do it 'redirects to the sign in path' do get :raw, params: { id: 'doesntexist' } expect(response).to redirect_to(new_user_session_path) end end end end context 'award emoji on snippets' do let(:personal_snippet) { create(:personal_snippet, :public, author: user) } let(:another_user) { create(:user) } before do sign_in(another_user) end describe 'POST #toggle_award_emoji' do it "toggles the award emoji" do expect do post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" }) end.to change { personal_snippet.award_emoji.count }.from(0).to(1) expect(response.status).to eq(200) end it "removes the already awarded emoji" do post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" }) expect do post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" }) end.to change { personal_snippet.award_emoji.count }.from(1).to(0) expect(response.status).to eq(200) end end end describe 'POST #preview_markdown' do let(:snippet) { create(:personal_snippet, :public) } it 'renders json in a correct format' do sign_in(user) post :preview_markdown, params: { id: snippet, text: '*Markdown* text' } expect(json_response.keys).to match_array(%w(body references)) end end describe 'DELETE #destroy' do let!(:snippet) { create :personal_snippet, author: user } context 'when current user has ability to destroy the snippet' do before do sign_in(user) end it 'removes the snippet' do delete :destroy, params: { id: snippet.to_param } expect { snippet.reload }.to raise_error(ActiveRecord::RecordNotFound) end context 'when snippet is succesfuly destroyed' do it 'redirects to the project snippets page' do delete :destroy, params: { id: snippet.to_param } expect(response).to redirect_to(dashboard_snippets_path) end end context 'when snippet is not destroyed' do before do allow(snippet).to receive(:destroy).and_return(false) controller.instance_variable_set(:@snippet, snippet) end it 'renders the snippet page with errors' do delete :destroy, params: { id: snippet.to_param } expect(flash[:alert]).to eq('Failed to remove snippet.') expect(response).to redirect_to(snippet_path(snippet)) end end end context 'when current_user does not have ability to destroy the snippet' do let(:another_user) { create(:user) } before do sign_in(another_user) end it 'responds with status 404' do delete :destroy, params: { id: snippet.to_param } expect(response).to have_gitlab_http_status(404) end end end end