6d37fe952b
Fix missing access checks on issue lookup using IssuableFinder Split from !2024 to partially solve https://gitlab.com/gitlab-org/gitlab-ce/issues/23867 ⚠️ - Potentially untested 💣 - No test coverage 🚥 - Test coverage of some sort exists (a test failed when error raised) 🚦 - Test coverage of return value (a test failed when nil used) ✅ - Permissions check tested - [x] ✅ app/controllers/projects/branches_controller.rb:39 - `before_action :authorize_push_code!` helpes limit/prevent exploitation. Always checks for reporter access so fine with confidential issues, issues only visible to team, etc. - [x] 🚥 app/models/cycle_analytics/summary.rb:9 [`.count`] - [x] ✅ app/controllers/projects/todos_controller.rb:19 - [x] Potential double render in app/controllers/projects/todos_controller.rb - https://dev.gitlab.org/gitlab/gitlabhq/merge_requests/2024/diffs#cedccb227af9bfdf88802767cb58d43c2b977439_24_24 See merge request !2030
210 lines
5.6 KiB
Ruby
210 lines
5.6 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe Projects::BranchesController do
|
|
let(:project) { create(:project) }
|
|
let(:user) { create(:user) }
|
|
let(:developer) { create(:user) }
|
|
|
|
before do
|
|
project.team << [user, :master]
|
|
project.team << [user, :developer]
|
|
|
|
allow(project).to receive(:branches).and_return(['master', 'foo/bar/baz'])
|
|
allow(project).to receive(:tags).and_return(['v1.0.0', 'v2.0.0'])
|
|
controller.instance_variable_set(:@project, project)
|
|
end
|
|
|
|
describe "POST create" do
|
|
render_views
|
|
|
|
context "on creation of a new branch" do
|
|
before do
|
|
sign_in(user)
|
|
|
|
post :create,
|
|
namespace_id: project.namespace.to_param,
|
|
project_id: project.to_param,
|
|
branch_name: branch,
|
|
ref: ref
|
|
end
|
|
|
|
context "valid branch name, valid source" do
|
|
let(:branch) { "merge_branch" }
|
|
let(:ref) { "master" }
|
|
it 'redirects' do
|
|
expect(subject).
|
|
to redirect_to("/#{project.path_with_namespace}/tree/merge_branch")
|
|
end
|
|
end
|
|
|
|
context "invalid branch name, valid ref" do
|
|
let(:branch) { "<script>alert('merge');</script>" }
|
|
let(:ref) { "master" }
|
|
it 'redirects' do
|
|
expect(subject).
|
|
to redirect_to("/#{project.path_with_namespace}/tree/alert('merge');")
|
|
end
|
|
end
|
|
|
|
context "valid branch name, invalid ref" do
|
|
let(:branch) { "merge_branch" }
|
|
let(:ref) { "<script>alert('ref');</script>" }
|
|
it { is_expected.to render_template('new') }
|
|
end
|
|
|
|
context "invalid branch name, invalid ref" do
|
|
let(:branch) { "<script>alert('merge');</script>" }
|
|
let(:ref) { "<script>alert('ref');</script>" }
|
|
it { is_expected.to render_template('new') }
|
|
end
|
|
|
|
context "valid branch name with encoded slashes" do
|
|
let(:branch) { "feature%2Ftest" }
|
|
let(:ref) { "<script>alert('ref');</script>" }
|
|
it { is_expected.to render_template('new') }
|
|
it { project.repository.branch_names.include?('feature/test') }
|
|
end
|
|
end
|
|
|
|
describe "created from the new branch button on issues" do
|
|
let(:branch) { "1-feature-branch" }
|
|
let!(:issue) { create(:issue, project: project) }
|
|
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'redirects' do
|
|
post :create,
|
|
namespace_id: project.namespace.to_param,
|
|
project_id: project.to_param,
|
|
branch_name: branch,
|
|
issue_iid: issue.iid
|
|
|
|
expect(subject).
|
|
to redirect_to("/#{project.path_with_namespace}/tree/1-feature-branch")
|
|
end
|
|
|
|
it 'posts a system note' do
|
|
expect(SystemNoteService).to receive(:new_issue_branch).with(issue, project, user, "1-feature-branch")
|
|
|
|
post :create,
|
|
namespace_id: project.namespace.to_param,
|
|
project_id: project.to_param,
|
|
branch_name: branch,
|
|
issue_iid: issue.iid
|
|
end
|
|
|
|
context 'without issue feature access' do
|
|
before do
|
|
project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC)
|
|
project.project_feature.update!(issues_access_level: ProjectFeature::PRIVATE)
|
|
project.team.truncate
|
|
end
|
|
|
|
it "doesn't post a system note" do
|
|
expect(SystemNoteService).not_to receive(:new_issue_branch)
|
|
|
|
post :create,
|
|
namespace_id: project.namespace.to_param,
|
|
project_id: project.to_param,
|
|
branch_name: branch,
|
|
issue_iid: issue.iid
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe "POST destroy with HTML format" do
|
|
render_views
|
|
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'returns 303' do
|
|
post :destroy,
|
|
format: :html,
|
|
id: 'foo/bar/baz',
|
|
namespace_id: project.namespace.to_param,
|
|
project_id: project.to_param
|
|
|
|
expect(response).to have_http_status(303)
|
|
end
|
|
end
|
|
|
|
describe "POST destroy" do
|
|
render_views
|
|
|
|
before do
|
|
sign_in(user)
|
|
|
|
post :destroy,
|
|
format: :js,
|
|
id: branch,
|
|
namespace_id: project.namespace.to_param,
|
|
project_id: project.to_param
|
|
end
|
|
|
|
context "valid branch name, valid source" do
|
|
let(:branch) { "feature" }
|
|
|
|
it { expect(response).to have_http_status(200) }
|
|
end
|
|
|
|
context "valid branch name with unencoded slashes" do
|
|
let(:branch) { "improve/awesome" }
|
|
|
|
it { expect(response).to have_http_status(200) }
|
|
end
|
|
|
|
context "valid branch name with encoded slashes" do
|
|
let(:branch) { "improve%2Fawesome" }
|
|
|
|
it { expect(response).to have_http_status(200) }
|
|
end
|
|
context "invalid branch name, valid ref" do
|
|
let(:branch) { "no-branch" }
|
|
|
|
it { expect(response).to have_http_status(404) }
|
|
end
|
|
end
|
|
|
|
describe "DELETE destroy_all_merged" do
|
|
def destroy_all_merged
|
|
delete :destroy_all_merged,
|
|
namespace_id: project.namespace.to_param,
|
|
project_id: project.to_param
|
|
end
|
|
|
|
context 'when user is allowed to push' do
|
|
before do
|
|
sign_in(user)
|
|
end
|
|
|
|
it 'redirects to branches' do
|
|
destroy_all_merged
|
|
|
|
expect(response).to redirect_to namespace_project_branches_path(project.namespace, project)
|
|
end
|
|
|
|
it 'starts worker to delete merged branches' do
|
|
expect_any_instance_of(DeleteMergedBranchesService).to receive(:async_execute)
|
|
|
|
destroy_all_merged
|
|
end
|
|
end
|
|
|
|
context 'when user is not allowed to push' do
|
|
before do
|
|
sign_in(developer)
|
|
end
|
|
|
|
it 'responds with status 404' do
|
|
destroy_all_merged
|
|
|
|
expect(response).to have_http_status(404)
|
|
end
|
|
end
|
|
end
|
|
end
|