719 lines
21 KiB
Ruby
719 lines
21 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
describe SnippetsController do
|
|
let(:user) { create(:user) }
|
|
|
|
describe 'GET #index' do
|
|
let(:user) { create(:user) }
|
|
|
|
context 'when username parameter is present' do
|
|
it_behaves_like 'paginated collection' do
|
|
let(:collection) { Snippet.all }
|
|
let(:params) { { username: user.username } }
|
|
|
|
before do
|
|
create(:personal_snippet, :public, author: user)
|
|
end
|
|
end
|
|
|
|
it 'renders snippets of a user when username is present' do
|
|
get :index, params: { username: user.username }
|
|
|
|
expect(response).to render_template(:index)
|
|
end
|
|
end
|
|
|
|
context 'when username parameter is not present' do
|
|
it 'redirects to explore snippets page when user is not logged in' do
|
|
get :index
|
|
|
|
expect(response).to redirect_to(explore_snippets_path)
|
|
end
|
|
|
|
it 'redirects to snippets dashboard page when user is logged in' do
|
|
sign_in(user)
|
|
|
|
get :index
|
|
|
|
expect(response).to redirect_to(dashboard_snippets_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'GET #new' do
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'responds with status 200' do
|
|
get :new
|
|
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
|
|
context 'when user is not allowed to create a personal snippet' do
|
|
let(:user) { create(:user, :external) }
|
|
|
|
it 'responds with status 404' do
|
|
get :new
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'redirects to the sign in page' do
|
|
get :new
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'GET #show' do
|
|
context 'when the personal snippet is private' do
|
|
let(:personal_snippet) { create(:personal_snippet, :private, author: user) }
|
|
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
context 'when signed in user is not the author' do
|
|
let(:other_author) { create(:author) }
|
|
let(:other_personal_snippet) { create(:personal_snippet, :private, author: other_author) }
|
|
|
|
it 'responds with status 404' do
|
|
get :show, params: { id: other_personal_snippet.to_param }
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
|
|
context 'when signed in user is the author' do
|
|
it 'renders the snippet' do
|
|
get :show, params: { id: personal_snippet.to_param }
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
|
|
it 'responds with status 404 when embeddable content is requested' do
|
|
get :show, params: { id: personal_snippet.to_param }, format: :js
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'redirects to the sign in page' do
|
|
get :show, params: { id: personal_snippet.to_param }
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the personal snippet is internal' do
|
|
let(:personal_snippet) { create(:personal_snippet, :internal, author: user) }
|
|
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'renders the snippet' do
|
|
get :show, params: { id: personal_snippet.to_param }
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
|
|
it 'responds with status 404 when embeddable content is requested' do
|
|
get :show, params: { id: personal_snippet.to_param }, format: :js
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'redirects to the sign in page' do
|
|
get :show, params: { id: personal_snippet.to_param }
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the personal snippet is public' do
|
|
let(:personal_snippet) { create(:personal_snippet, :public, author: user) }
|
|
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'renders the snippet' do
|
|
get :show, params: { id: personal_snippet.to_param }
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
|
|
it 'responds with status 200 when embeddable content is requested' do
|
|
get :show, params: { id: personal_snippet.to_param }, format: :js
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'renders the snippet' do
|
|
get :show, params: { id: personal_snippet.to_param }
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the personal snippet does not exist' do
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'responds with status 404' do
|
|
get :show, params: { id: 'doesntexist' }
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'responds with status 404' do
|
|
get :show, params: { id: 'doesntexist' }
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'POST #create' do
|
|
def create_snippet(snippet_params = {}, additional_params = {})
|
|
sign_in(user)
|
|
|
|
post :create, params: {
|
|
personal_snippet: { title: 'Title', content: 'Content', description: 'Description' }.merge(snippet_params)
|
|
}.merge(additional_params)
|
|
|
|
Snippet.last
|
|
end
|
|
|
|
it 'creates the snippet correctly' do
|
|
snippet = create_snippet(visibility_level: Snippet::PRIVATE)
|
|
|
|
expect(snippet.title).to eq('Title')
|
|
expect(snippet.content).to eq('Content')
|
|
expect(snippet.description).to eq('Description')
|
|
end
|
|
|
|
context 'when user is not allowed to create a personal snippet' do
|
|
let(:user) { create(:user, :external) }
|
|
|
|
it 'responds with status 404' do
|
|
aggregate_failures do
|
|
expect do
|
|
create_snippet(visibility_level: Snippet::PUBLIC)
|
|
end.not_to change { Snippet.count }
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the snippet description contains a file' do
|
|
include FileMoverHelpers
|
|
|
|
let(:picture_file) { "/-/system/user/#{user.id}/secret56/picture.jpg" }
|
|
let(:text_file) { "/-/system/user/#{user.id}/secret78/text.txt" }
|
|
let(:description) do
|
|
"Description with picture: ![picture](/uploads#{picture_file}) and "\
|
|
"text: [text.txt](/uploads#{text_file})"
|
|
end
|
|
|
|
before do
|
|
allow(FileUtils).to receive(:mkdir_p)
|
|
allow(FileUtils).to receive(:move)
|
|
stub_file_mover(text_file)
|
|
stub_file_mover(picture_file)
|
|
end
|
|
|
|
subject { create_snippet({ description: description }, { files: [picture_file, text_file] }) }
|
|
|
|
it 'creates the snippet' do
|
|
expect { subject }.to change { Snippet.count }.by(1)
|
|
end
|
|
|
|
it 'stores the snippet description correctly' do
|
|
snippet = subject
|
|
|
|
expected_description = "Description with picture: "\
|
|
"![picture](/uploads/-/system/personal_snippet/#{snippet.id}/secret56/picture.jpg) and "\
|
|
"text: [text.txt](/uploads/-/system/personal_snippet/#{snippet.id}/secret78/text.txt)"
|
|
|
|
expect(snippet.description).to eq(expected_description)
|
|
end
|
|
end
|
|
|
|
context 'when the snippet is spam' do
|
|
before do
|
|
allow_next_instance_of(AkismetService) do |instance|
|
|
allow(instance).to receive(:spam?).and_return(true)
|
|
end
|
|
end
|
|
|
|
context 'when the snippet is private' do
|
|
it 'creates the snippet' do
|
|
expect { create_snippet(visibility_level: Snippet::PRIVATE) }
|
|
.to change { Snippet.count }.by(1)
|
|
end
|
|
end
|
|
|
|
context 'when the snippet is public' do
|
|
it 'rejects the shippet' do
|
|
expect { create_snippet(visibility_level: Snippet::PUBLIC) }
|
|
.not_to change { Snippet.count }
|
|
end
|
|
|
|
it 'creates a spam log' do
|
|
expect { create_snippet(visibility_level: Snippet::PUBLIC) }
|
|
.to log_spam(title: 'Title', user: user, noteable_type: 'PersonalSnippet')
|
|
end
|
|
|
|
it 'renders :new with recaptcha disabled' do
|
|
stub_application_setting(recaptcha_enabled: false)
|
|
|
|
create_snippet(visibility_level: Snippet::PUBLIC)
|
|
|
|
expect(response).to render_template(:new)
|
|
end
|
|
|
|
context 'recaptcha enabled' do
|
|
before do
|
|
stub_application_setting(recaptcha_enabled: true)
|
|
end
|
|
|
|
it 'renders :verify with recaptcha enabled' do
|
|
create_snippet(visibility_level: Snippet::PUBLIC)
|
|
|
|
expect(response).to render_template(:verify)
|
|
end
|
|
|
|
it 'renders snippet page when recaptcha verified' do
|
|
spammy_title = 'Whatever'
|
|
|
|
spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title)
|
|
snippet = create_snippet({ title: spammy_title },
|
|
{ spam_log_id: spam_logs.last.id,
|
|
recaptcha_verification: true })
|
|
|
|
expect(response).to redirect_to(snippet_path(snippet))
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'PUT #update' do
|
|
let(:project) { create :project }
|
|
let(:snippet) { create :personal_snippet, author: user, project: project, visibility_level: visibility_level }
|
|
|
|
def update_snippet(snippet_params = {}, additional_params = {})
|
|
sign_in(user)
|
|
|
|
put :update, params: {
|
|
id: snippet.id,
|
|
personal_snippet: { title: 'Title', content: 'Content' }.merge(snippet_params)
|
|
}.merge(additional_params)
|
|
|
|
snippet.reload
|
|
end
|
|
|
|
context 'when the snippet is spam' do
|
|
before do
|
|
allow_next_instance_of(AkismetService) do |instance|
|
|
allow(instance).to receive(:spam?).and_return(true)
|
|
end
|
|
end
|
|
|
|
context 'when the snippet is private' do
|
|
let(:visibility_level) { Snippet::PRIVATE }
|
|
|
|
it 'updates the snippet' do
|
|
expect { update_snippet(title: 'Foo') }
|
|
.to change { snippet.reload.title }.to('Foo')
|
|
end
|
|
end
|
|
|
|
context 'when a private snippet is made public' do
|
|
let(:visibility_level) { Snippet::PRIVATE }
|
|
|
|
it 'rejects the snippet' do
|
|
expect { update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) }
|
|
.not_to change { snippet.reload.title }
|
|
end
|
|
|
|
it 'creates a spam log' do
|
|
expect { update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC) }
|
|
.to log_spam(title: 'Foo', user: user, noteable_type: 'PersonalSnippet')
|
|
end
|
|
|
|
it 'renders :edit with recaptcha disabled' do
|
|
stub_application_setting(recaptcha_enabled: false)
|
|
|
|
update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC)
|
|
|
|
expect(response).to render_template(:edit)
|
|
end
|
|
|
|
context 'recaptcha enabled' do
|
|
before do
|
|
stub_application_setting(recaptcha_enabled: true)
|
|
end
|
|
|
|
it 'renders :verify with recaptcha enabled' do
|
|
update_snippet(title: 'Foo', visibility_level: Snippet::PUBLIC)
|
|
|
|
expect(response).to render_template(:verify)
|
|
end
|
|
|
|
it 'renders snippet page when recaptcha verified' do
|
|
spammy_title = 'Whatever'
|
|
|
|
spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title)
|
|
snippet = update_snippet({ title: spammy_title, visibility_level: Snippet::PUBLIC },
|
|
{ spam_log_id: spam_logs.last.id,
|
|
recaptcha_verification: true })
|
|
|
|
expect(response).to redirect_to(snippet_path(snippet))
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the snippet is public' do
|
|
let(:visibility_level) { Snippet::PUBLIC }
|
|
|
|
it 'rejects the shippet' do
|
|
expect { update_snippet(title: 'Foo') }
|
|
.not_to change { snippet.reload.title }
|
|
end
|
|
|
|
it 'creates a spam log' do
|
|
expect {update_snippet(title: 'Foo') }
|
|
.to log_spam(title: 'Foo', user: user, noteable_type: 'PersonalSnippet')
|
|
end
|
|
|
|
it 'renders :edit with recaptcha disabled' do
|
|
stub_application_setting(recaptcha_enabled: false)
|
|
|
|
update_snippet(title: 'Foo')
|
|
|
|
expect(response).to render_template(:edit)
|
|
end
|
|
|
|
context 'recaptcha enabled' do
|
|
before do
|
|
stub_application_setting(recaptcha_enabled: true)
|
|
end
|
|
|
|
it 'renders :verify with recaptcha enabled' do
|
|
update_snippet(title: 'Foo')
|
|
|
|
expect(response).to render_template(:verify)
|
|
end
|
|
|
|
it 'renders snippet page when recaptcha verified' do
|
|
spammy_title = 'Whatever'
|
|
|
|
spam_logs = create_list(:spam_log, 2, user: user, title: spammy_title)
|
|
snippet = update_snippet({ title: spammy_title },
|
|
{ spam_log_id: spam_logs.last.id,
|
|
recaptcha_verification: true })
|
|
|
|
expect(response).to redirect_to(snippet_path(snippet))
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'POST #mark_as_spam' do
|
|
let(:snippet) { create(:personal_snippet, :public, author: user) }
|
|
|
|
before do
|
|
allow_next_instance_of(AkismetService) do |instance|
|
|
allow(instance).to receive_messages(submit_spam: true)
|
|
end
|
|
stub_application_setting(akismet_enabled: true)
|
|
end
|
|
|
|
def mark_as_spam
|
|
admin = create(:admin)
|
|
create(:user_agent_detail, subject: snippet)
|
|
sign_in(admin)
|
|
|
|
post :mark_as_spam, params: { id: snippet.id }
|
|
end
|
|
|
|
it 'updates the snippet' do
|
|
mark_as_spam
|
|
|
|
expect(snippet.reload).not_to be_submittable_as_spam
|
|
end
|
|
end
|
|
|
|
describe "GET #raw" do
|
|
context 'when the personal snippet is private' do
|
|
let(:personal_snippet) { create(:personal_snippet, :private, author: user) }
|
|
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
context 'when signed in user is not the author' do
|
|
let(:other_author) { create(:author) }
|
|
let(:other_personal_snippet) { create(:personal_snippet, :private, author: other_author) }
|
|
|
|
it 'responds with status 404' do
|
|
get :raw, params: { id: other_personal_snippet.to_param }
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
|
|
context 'when signed in user is the author' do
|
|
before do
|
|
get :raw, params: { id: personal_snippet.to_param }
|
|
end
|
|
|
|
it 'responds with status 200' do
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
|
|
it 'has expected headers' do
|
|
expect(response.header['Content-Type']).to eq('text/plain; charset=utf-8')
|
|
|
|
expect(response.header['Content-Disposition']).to match(/inline/)
|
|
end
|
|
|
|
it "sets #{Gitlab::Workhorse::DETECT_HEADER} header" do
|
|
expect(response).to have_gitlab_http_status(200)
|
|
expect(response.header[Gitlab::Workhorse::DETECT_HEADER]).to eq "true"
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'redirects to the sign in page' do
|
|
get :raw, params: { id: personal_snippet.to_param }
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the personal snippet is internal' do
|
|
let(:personal_snippet) { create(:personal_snippet, :internal, author: user) }
|
|
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'responds with status 200' do
|
|
get :raw, params: { id: personal_snippet.to_param }
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'redirects to the sign in page' do
|
|
get :raw, params: { id: personal_snippet.to_param }
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the personal snippet is public' do
|
|
let(:personal_snippet) { create(:personal_snippet, :public, author: user) }
|
|
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'responds with status 200' do
|
|
get :raw, params: { id: personal_snippet.to_param }
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
|
|
context 'CRLF line ending' do
|
|
let(:personal_snippet) do
|
|
create(:personal_snippet, :public, author: user, content: "first line\r\nsecond line\r\nthird line")
|
|
end
|
|
|
|
it 'returns LF line endings by default' do
|
|
get :raw, params: { id: personal_snippet.to_param }
|
|
|
|
expect(response.body).to eq("first line\nsecond line\nthird line")
|
|
end
|
|
|
|
it 'does not convert line endings when parameter present' do
|
|
get :raw, params: { id: personal_snippet.to_param, line_ending: :raw }
|
|
|
|
expect(response.body).to eq("first line\r\nsecond line\r\nthird line")
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'responds with status 200' do
|
|
get :raw, params: { id: personal_snippet.to_param }
|
|
|
|
expect(assigns(:snippet)).to eq(personal_snippet)
|
|
expect(response).to have_gitlab_http_status(200)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when the personal snippet does not exist' do
|
|
context 'when signed in' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'responds with status 404' do
|
|
get :raw, params: { id: 'doesntexist' }
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
|
|
context 'when not signed in' do
|
|
it 'redirects to the sign in path' do
|
|
get :raw, params: { id: 'doesntexist' }
|
|
|
|
expect(response).to redirect_to(new_user_session_path)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'award emoji on snippets' do
|
|
let(:personal_snippet) { create(:personal_snippet, :public, author: user) }
|
|
let(:another_user) { create(:user) }
|
|
|
|
before do
|
|
sign_in(another_user)
|
|
end
|
|
|
|
describe 'POST #toggle_award_emoji' do
|
|
it "toggles the award emoji" do
|
|
expect do
|
|
post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" })
|
|
end.to change { personal_snippet.award_emoji.count }.from(0).to(1)
|
|
|
|
expect(response.status).to eq(200)
|
|
end
|
|
|
|
it "removes the already awarded emoji" do
|
|
post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" })
|
|
|
|
expect do
|
|
post(:toggle_award_emoji, params: { id: personal_snippet.to_param, name: "thumbsup" })
|
|
end.to change { personal_snippet.award_emoji.count }.from(1).to(0)
|
|
|
|
expect(response.status).to eq(200)
|
|
end
|
|
end
|
|
end
|
|
|
|
describe 'POST #preview_markdown' do
|
|
let(:snippet) { create(:personal_snippet, :public) }
|
|
|
|
it 'renders json in a correct format' do
|
|
sign_in(user)
|
|
|
|
post :preview_markdown, params: { id: snippet, text: '*Markdown* text' }
|
|
|
|
expect(json_response.keys).to match_array(%w(body references))
|
|
end
|
|
end
|
|
|
|
describe 'DELETE #destroy' do
|
|
let!(:snippet) { create :personal_snippet, author: user }
|
|
|
|
context 'when current user has ability to destroy the snippet' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'removes the snippet' do
|
|
delete :destroy, params: { id: snippet.to_param }
|
|
|
|
expect { snippet.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
end
|
|
|
|
context 'when snippet is succesfuly destroyed' do
|
|
it 'redirects to the project snippets page' do
|
|
delete :destroy, params: { id: snippet.to_param }
|
|
|
|
expect(response).to redirect_to(dashboard_snippets_path)
|
|
end
|
|
end
|
|
|
|
context 'when snippet is not destroyed' do
|
|
before do
|
|
allow(snippet).to receive(:destroy).and_return(false)
|
|
controller.instance_variable_set(:@snippet, snippet)
|
|
end
|
|
|
|
it 'renders the snippet page with errors' do
|
|
delete :destroy, params: { id: snippet.to_param }
|
|
|
|
expect(flash[:alert]).to eq('Failed to remove snippet.')
|
|
expect(response).to redirect_to(snippet_path(snippet))
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when current_user does not have ability to destroy the snippet' do
|
|
let(:another_user) { create(:user) }
|
|
|
|
before do
|
|
sign_in(another_user)
|
|
end
|
|
|
|
it 'responds with status 404' do
|
|
delete :destroy, params: { id: snippet.to_param }
|
|
|
|
expect(response).to have_gitlab_http_status(404)
|
|
end
|
|
end
|
|
end
|
|
end
|