# frozen_string_literal: true require 'spec_helper' RSpec.describe GroupsController, :with_current_organization, factory_default: :keep, feature_category: :code_review_workflow do include ExternalAuthorizationServiceHelpers include AdminModeHelper include Namespaces::DeletableHelper let_it_be(:group_organization) { current_organization } let_it_be_with_refind(:group) { create_default(:group, :public, organization: group_organization) } let_it_be_with_refind(:project) { create(:project, namespace: group) } let_it_be(:user) { create(:user) } let_it_be(:admin_with_admin_mode) { create(:admin) } let_it_be(:admin_without_admin_mode) { create(:admin) } let_it_be(:group_member) { create(:group_member, group: group, user: user) } let_it_be(:owner) { group.add_owner(create(:user)).user } let_it_be(:maintainer) { group.add_maintainer(create(:user)).user } let_it_be(:developer) { group.add_developer(create(:user)).user } let_it_be(:guest) { group.add_guest(create(:user)).user } before_all do group_organization.users = User.all end before do enable_admin_mode!(admin_with_admin_mode) end shared_examples 'member with ability to create subgroups' do it 'renders the new page' do sign_in(member) get :new, params: { parent_id: group.id } expect(response).to render_template(:new) end end shared_examples 'member without ability to create subgroups' do it 'renders the 404 page' do sign_in(member) get :new, params: { parent_id: group.id } expect(response).not_to render_template(:new) expect(response).to have_gitlab_http_status(:not_found) end end shared_examples 'details view as atom' do let!(:event) { create(:event, project: project) } let(:format) { :atom } it { is_expected.to render_template('groups/show') } it 'assigns events for all the projects in the group' do subject expect(assigns(:events).map(&:id)).to contain_exactly(event.id) end end describe 'GET #show' do before do sign_in(user) end let(:format) { :html } subject { get :show, params: { id: group.to_param }, format: format } context 'when the group is not importing' do it { is_expected.to render_template('groups/show') } it_behaves_like 'details view as atom' it 'tracks page views', :snowplow do subject expect_snowplow_event( category: 'group_overview', action: 'render', user: user, namespace: group ) end end context 'when the group is importing' do before do create(:group_import_state, group: group) end it 'redirects to the import status page' do expect(subject).to redirect_to group_import_path(group) end it 'does not track page views', :snowplow do subject expect_no_snowplow_event( category: 'group_overview', action: 'render', user: user, namespace: group ) end end context 'adjourned deletion' do render_views let_it_be(:subgroup) { create(:group, :private, parent: group) } let(:ancestor_notice_regex) do /This group will be deleted on .* because its parent group is scheduled for deletion\./ end subject(:get_show) { get :show, params: { id: subgroup.to_param } } context 'when the parent group has not been scheduled for deletion' do it 'does not show the notice' do subject expect(response.body).not_to match(ancestor_notice_regex) end end context 'when the parent group has been scheduled for deletion' do before do create(:group_deletion_schedule, group: subgroup.parent, marked_for_deletion_on: Date.current, deleting_user: user ) end it 'shows the notice that the parent group has been scheduled for deletion' do subject expect(response.body).to match(ancestor_notice_regex) end context 'when the group itself has also been scheduled for deletion' do before do create(:group_deletion_schedule, group: subgroup, marked_for_deletion_on: Date.current, deleting_user: user ) end it 'does not show the notice that the parent group has been scheduled for deletion' do subject expect(response.body).not_to match(ancestor_notice_regex) # However, shows the notice that the project has been marked for deletion. expect(response.body).to match( /This group and its subgroups and projects are pending deletion, and will be deleted on .*./ ) end end end end end describe 'GET #details' do before do sign_in(user) end let(:format) { :html } subject { get :details, params: { id: group.to_param }, format: format } it { is_expected.to redirect_to(group_path(group)) } it_behaves_like 'details view as atom' end describe 'GET edit' do it 'sets the badge API endpoint' do sign_in(owner) get :edit, params: { id: group.to_param } expect(assigns(:badge_api_endpoint)).not_to be_nil end end describe 'GET #new' do context 'when creating subgroups' do context 'when user does not have `:create_subgroup` permissions' do before do sign_in(user) allow(controller).to receive(:can?).with(user, :create_subgroup, group).and_return(false) end it 'returns a 404' do get :new, params: { parent_id: group.id } expect(response).to have_gitlab_http_status(:not_found) end end context 'when user has `:create_subgroup` permissions' do before do sign_in(user) allow(controller).to receive(:can?).with(user, :create_subgroup, group).and_return(true) end it 'renders `new` template' do get :new, params: { parent_id: group.id } expect(response).to have_gitlab_http_status(:ok) expect(response).to render_template(:new) end end [true, false].each do |can_create_group_status| context "and can_create_group is #{can_create_group_status}" do before do User.where(id: [admin_with_admin_mode, admin_without_admin_mode, owner, maintainer, developer, guest]).update_all(can_create_group: can_create_group_status) end [:admin_with_admin_mode, :owner, :maintainer].each do |member_type| context "and logged in as #{member_type.capitalize}" do it_behaves_like 'member with ability to create subgroups' do let(:member) { send(member_type) } end end end [:guest, :developer, :admin_without_admin_mode].each do |member_type| context "and logged in as #{member_type.capitalize}" do it_behaves_like 'member without ability to create subgroups' do let(:member) { send(member_type) } end end end end end end end describe 'GET #activity' do context 'as json' do before do sign_in(user) end it 'includes events from all projects in group and subgroups', :sidekiq_might_not_need_inline do 2.times do project = create(:project, group: group) create(:event, project: project) end subgroup = create(:group, parent: group, organization: group.organization) project = create(:project, group: subgroup) create(:event, project: project) get :activity, params: { id: group.to_param }, format: :json expect(response).to have_gitlab_http_status(:ok) expect(json_response['count']).to eq(3) expect(assigns(:projects).limit_value).to be_nil end end context 'when user has no permission to see the event' do let(:project_with_restricted_access) do create(:project, :public, issues_access_level: ProjectFeature::PRIVATE, group: group) end before do create(:event, project: project) create(:event, :created, project: project_with_restricted_access, target: create(:issue)) group.add_guest(user) sign_in(user) end it 'filters out invisible event' do get :activity, params: { id: group.to_param }, format: :json expect(json_response['count']).to eq(1) end end end describe 'POST #create' do it 'allows creating a group' do sign_in(user) expect do post :create, params: { group: { name: 'new_group', path: 'new_group' } } end.to change { Group.count }.by(1) expect(response).to have_gitlab_http_status(:found) end context 'authorization' do it 'allows an admin to create a group' do sign_in(admin_without_admin_mode) expect do post :create, params: { group: { name: 'new_group', path: 'new_group' } } end.to change { Group.count }.by(1) expect(response).to have_gitlab_http_status(:found) end end context 'when creating chat team' do before do stub_mattermost_setting(enabled: true) end it 'triggers Mattermost::CreateTeamService' do sign_in(user) expect_next_instance_of(::Mattermost::CreateTeamService) do |service| expect(service).to receive(:execute).and_return({ name: 'test-chat-team', id: 1 }) end post :create, params: { group: { name: 'new_group', path: 'new_group', create_chat_team: 1 } } expect(response).to have_gitlab_http_status(:found) end end context 'when creating subgroups' do [true, false].each do |can_create_group_status| context "and can_create_group is #{can_create_group_status}" do context 'and logged in as Owner' do it 'creates the subgroup' do owner.update_attribute(:can_create_group, can_create_group_status) sign_in(owner) post :create, params: { group: { parent_id: group.id, path: 'subgroup' } } expect(response).to be_redirect expect(response.location).to eq("http://test.host/#{group.path}/subgroup") expect(Group.last.organization.id).to eq(group_organization.id) end end context 'and logged in as Developer' do it 'renders the new template' do developer.update_attribute(:can_create_group, can_create_group_status) sign_in(developer) previous_group_count = Group.count post :create, params: { group: { parent_id: group.id, path: 'subgroup' } } expect(response).to render_template(:new) expect(Group.count).to eq(previous_group_count) end end end end end context 'when creating a top level group' do before do sign_in(developer) end context 'and can_create_group is enabled' do before do developer.update_attribute(:can_create_group, true) end it 'creates the Group' do original_group_count = Group.count post :create, params: { group: { path: 'subgroup' } } expect(Group.count).to eq(original_group_count + 1) expect(response).to be_redirect expect(Group.last.organization.id).to eq(Current.organization.id) end end context 'and can_create_group is disabled' do before do developer.update_attribute(:can_create_group, false) end it 'does not create the Group' do original_group_count = Group.count post :create, params: { group: { path: 'subgroup' } } expect(Group.count).to eq(original_group_count) expect(response).to render_template(:new) end end end context "malicious group name" do subject { post :create, params: { group: { name: "", path: "invalid_group_url" } } } before do sign_in(user) end it { expect { subject }.not_to change { Group.count } } it { expect(subject).to render_template(:new) } end context 'when creating a group with `default_branch_protection` attribute' do before do sign_in(user) end subject do post :create, params: { group: { name: 'new_group', path: 'new_group', default_branch_protection: Gitlab::Access::PROTECTION_NONE } } end context 'for users who have the ability to create a group with `default_branch_protection`' do it 'creates group with the specified branch protection level' do subject expect(response).to have_gitlab_http_status(:found) expect(Group.last.default_branch_protection).to eq(Gitlab::Access::PROTECTION_NONE) end end context 'for users who do not have the ability to create a group with `default_branch_protection`' do it 'does not create the group with the specified branch protection level' do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(user, :create_group_with_default_branch_protection) { false } subject expect(response).to have_gitlab_http_status(:found) expect(Group.last.default_branch_protection).not_to eq(Gitlab::Access::PROTECTION_NONE) end end end context 'when creating a group with `default_branch_protection_defaults` attribute' do let(:protection_defaults) do { "allowed_to_push" => [{ 'access_level' => Gitlab::Access::MAINTAINER.to_s }], "allowed_to_merge" => [{ 'access_level' => Gitlab::Access::DEVELOPER.to_s }], "allow_force_push" => "false", "developer_can_initial_push" => "false" } end before do sign_in(user) end context 'when user has ability to write update_default_branch_protection' do before do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(user, :update_default_branch_protection, an_instance_of(Group)).and_return(true) end context 'for users who have the ability to create a group with `default_branch_protection_defaults`' do it 'creates group with the specified default branch protection level' do post :create, params: { group: { name: 'new_group', path: 'new_group', default_branch_protected: "true", default_branch_protection_defaults: protection_defaults } }, as: :json expect(response).to have_gitlab_http_status(:found) expect(Group.last.default_branch_protection_defaults).to eq(::Gitlab::Access::BranchProtection.protected_against_developer_pushes.stringify_keys) end it 'ignores default_branch_protection_defaults if default_branch_protected is set to false' do post :create, params: { group: { name: 'new_group', path: 'new_group', default_branch_protected: "false", default_branch_protection_defaults: protection_defaults } }, as: :json expect(response).to have_gitlab_http_status(:found) expect(Group.last.default_branch_protection_defaults).to eq(::Gitlab::Access::BranchProtection.protection_none.stringify_keys) end end end context 'for users who do not have the ability to create a group with `default_branch_protection`' do it 'does not create the group with the specified branch protection level' do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(user, :create_group_with_default_branch_protection) { false } subject expect(response).to have_gitlab_http_status(:success) expect(Group.last.default_branch_protection_defaults).not_to eq(::Gitlab::Access::BranchProtection.protected_against_developer_pushes.stringify_keys) end end end context 'when creating a group with the `jobs_to_be_done` attribute present' do it 'sets the groups `jobs_to_be_done` value' do sign_in(user) post :create, params: { group: { name: 'new_group', path: 'new_group', jobs_to_be_done: 'other' } } expect(Group.last.jobs_to_be_done).to eq('other') end end end describe 'GET #index' do context 'as a user' do it 'redirects to Groups Dashboard' do sign_in(user) get :index expect(response).to redirect_to(dashboard_groups_path) end end context 'as a guest' do it 'redirects to Explore Groups' do get :index expect(response).to redirect_to(explore_groups_path) end end end describe 'GET #issues' do before do sign_in(user) end it 'saves the sort order to user preferences' do get :issues, params: { id: group.to_param, sort: 'priority' } expect(user.reload.user_preference.issues_sort).to eq('priority') end end describe 'GET #merge_requests', :sidekiq_might_not_need_inline do let(:merge_request_1) { create(:merge_request, source_project: project) } let(:merge_request_2) { create(:merge_request, :simple, source_project: project) } before do create_list(:award_emoji, 3, awardable: merge_request_2) create_list(:award_emoji, 2, awardable: merge_request_1) create_list(:award_emoji, 2, :downvote, awardable: merge_request_2) sign_in(user) end it 'renders merge requests index template' do get :merge_requests, params: { id: group.to_param } expect(response).to render_template('groups/merge_requests') end end describe 'DELETE #destroy' do let(:format) { :html } let(:params) { {} } subject { delete :destroy, format: format, params: { id: group.to_param, **params } } context 'when authenticated user can admin the group' do let_it_be(:user) { owner } before do sign_in(user) end context 'success' do it 'marks the group for delayed deletion' do expect { subject }.to change { group.reload.self_deletion_scheduled? }.from(false).to(true) end it 'does not immediately delete the group' do Sidekiq::Testing.fake! do expect { subject }.not_to change { GroupDestroyWorker.jobs.size } end end context 'for a html request' do it 'redirects to group path' do subject expect(response).to redirect_to(group_path(group)) end end context 'for a json request', :freeze_time do let(:format) { :json } it 'returns json with message' do subject expect(json_response['message']) .to eq( "'#{group.name}' has been scheduled for deletion and will be deleted on " \ "#{permanent_deletion_date_formatted(group)}.") end end end context 'failure' do before do allow(::Groups::MarkForDeletionService).to receive_message_chain(:new, :execute).and_return({ status: :error, message: 'error' }) end it 'does not mark the group for deletion' do expect { subject }.not_to change { group.reload.self_deletion_scheduled? }.from(false) end context 'for a html request' do it 'redirects to group edit page' do subject expect(response).to redirect_to(edit_group_path(group)) expect(flash[:alert]).to include 'error' end end context 'for a json request' do let(:format) { :json } it 'returns json with message' do subject expect(json_response['message']).to eq("error") end end end context 'when group is already marked for deletion' do before do create(:group_deletion_schedule, group: group, marked_for_deletion_on: Date.current) end context 'when permanently_remove param is set' do let(:params) { { permanently_remove: true } } context 'for a html request' do it 'deletes the group immediately and redirects to root path' do expect(GroupDestroyWorker).to receive(:perform_async) subject expect(response).to redirect_to(root_path) expect(flash[:toast]).to include "Group '#{group.name}' is being deleted." end end context 'for a json request' do let(:format) { :json } it 'deletes the group immediately and returns json with message' do expect(GroupDestroyWorker).to receive(:perform_async) subject expect(json_response['message']).to eq("Group '#{group.name}' is being deleted.") end end end context 'when permanently_remove param is not set' do context 'for a html request' do it 'redirects to edit path with error' do subject expect(response).to redirect_to(edit_group_path(group)) expect(flash[:alert]).to include "Group has been already marked for deletion" end end context 'for a json request' do let(:format) { :json } it 'returns json with message' do subject expect(json_response['message']).to eq("Group has been already marked for deletion") end end end end end context 'when authenticated user cannot admin the group' do before do sign_in(create(:user)) end it 'returns 404' do subject expect(response).to have_gitlab_http_status(:not_found) end end end describe 'POST #restore' do let_it_be(:group) do create(:group_with_deletion_schedule, marked_for_deletion_on: 1.day.ago, deleting_user: user) end subject { post :restore, params: { group_id: group.to_param } } context 'when authenticated user can admin the group' do before do group.add_owner(user) sign_in(user) end context 'when the restore succeeds' do it 'restores the group' do expect { subject }.to change { group.reload.self_deletion_scheduled? }.from(true).to(false) end it 'renders success notice upon restoring' do subject expect(response).to redirect_to(edit_group_path(group)) expect(flash[:notice]).to include "Group '#{group.name}' has been successfully restored." end end context 'when the restore fails' do before do allow(::Groups::RestoreService).to receive_message_chain(:new, :execute).and_return({ status: :error, message: 'error' }) end it 'does not restore the group' do expect { subject }.not_to change { group.reload.self_deletion_scheduled? }.from(true) end it 'redirects to group edit page' do subject expect(response).to redirect_to(edit_group_path(group)) expect(flash[:alert]).to include 'error' end end end context 'when authenticated user cannot admin the group' do before do sign_in(create(:user)) end it 'returns 404' do subject expect(response).to have_gitlab_http_status(:not_found) end end end describe 'PUT update' do before do sign_in(user) end it 'updates the path successfully' do post :update, params: { id: group.to_param, group: { path: 'new_path' } } expect(response).to have_gitlab_http_status(:found) expect(controller).to set_flash[:notice] end it 'updates the project_creation_level successfully' do post :update, params: { id: group.to_param, group: { project_creation_level: ::Gitlab::Access::MAINTAINER_PROJECT_ACCESS } } expect(response).to have_gitlab_http_status(:found) expect(group.reload.project_creation_level).to eq(::Gitlab::Access::MAINTAINER_PROJECT_ACCESS) end context 'updating default_branch_protection' do subject do put :update, params: { id: group.to_param, group: { default_branch_protection: ::Gitlab::Access::PROTECTION_DEV_CAN_MERGE } } end context 'for users who have the ability to update default_branch_protection' do it 'updates the attribute' do subject expect(response).to have_gitlab_http_status(:found) expect(group.reload.default_branch_protection).to eq(::Gitlab::Access::PROTECTION_DEV_CAN_MERGE) end end context 'for users who do not have the ability to update default_branch_protection' do it 'does not update the attribute' do allow(Ability).to receive(:allowed?).and_call_original allow(Ability).to receive(:allowed?).with(user, :update_default_branch_protection, group) { false } subject expect(response).to have_gitlab_http_status(:found) expect(group.reload.default_branch_protection).not_to eq(::Gitlab::Access::PROTECTION_DEV_CAN_MERGE) end end end context "updating default_branch_name" do let(:example_branch_name) { "example_branch_name" } subject(:update_action) do put :update, params: { id: group.to_param, group: { default_branch_name: example_branch_name } } end it "updates the attribute" do expect { subject } .to change { group.namespace_settings.reload.default_branch_name } .from(nil) .to(example_branch_name) expect(response).to have_gitlab_http_status(:found) end context "to empty string" do let(:example_branch_name) { '' } it "does not update the attribute" do subject expect(group.namespace_settings.reload.default_branch_name).not_to eq('') end end end context 'when there is a conflicting group path' do let!(:conflict_group) { create(:group, path: SecureRandom.hex(12)) } let!(:old_name) { group.name } it 'does not render references to the conflicting group' do put :update, params: { id: group.to_param, group: { path: conflict_group.path } } expect(response).to have_gitlab_http_status(:ok) expect(group.reload.name).to eq(old_name) expect(response.body).not_to include(conflict_group.path) end end context 'when a project inside the group has container repositories' do before do stub_container_registry_config(enabled: true) stub_container_registry_tags(repository: /image/, tags: %w[rc1]) create(:container_repository, project: project, name: :image) end it 'does allow the group to be renamed' do post :update, params: { id: group.to_param, group: { name: 'new_name' } } expect(controller).to set_flash[:notice] expect(response).to have_gitlab_http_status(:found) expect(group.reload.name).to eq('new_name') end it 'does not allow to path of the group to be changed' do post :update, params: { id: group.to_param, group: { path: 'new_path' } } expect(assigns(:group).errors[:base].first).to match(/Docker images in their container registry/) expect(response).to have_gitlab_http_status(:ok) end end end context "updating :resource_access_token_creation_allowed" do subject do put :update, params: { id: group.to_param, group: { resource_access_token_creation_allowed: false } } end context 'when user is a group owner' do before do group.add_owner(user) sign_in(user) end it "updates the attribute" do expect { subject } .to change { group.namespace_settings.reload.resource_access_token_creation_allowed } .from(true) .to(false) expect(response).to have_gitlab_http_status(:found) end end context 'when not a group owner' do before do group.add_developer(user) sign_in(user) end it "does not update the attribute" do expect { subject }.not_to change { group.namespace_settings.reload.resource_access_token_creation_allowed } end end end describe 'updating :prevent_sharing_groups_outside_hierarchy' do subject do put :update, params: { id: group.to_param, group: { prevent_sharing_groups_outside_hierarchy: true } } end context 'when user is a group owner' do before do group.add_owner(user) sign_in(user) end it 'updates the attribute' do expect { subject } .to change { group.namespace_settings.reload.prevent_sharing_groups_outside_hierarchy } .from(false) .to(true) expect(response).to have_gitlab_http_status(:found) end end context 'when not a group owner' do before do group.add_maintainer(user) sign_in(user) end it 'does not update the attribute' do expect { subject }.not_to change { group.reload.prevent_sharing_groups_outside_hierarchy } expect(response).to have_gitlab_http_status(:not_found) end end end describe '#ensure_canonical_path' do before do sign_in(user) end context 'for a GET request' do context 'when requesting groups at the root path' do before do allow(request).to receive(:original_fullpath).and_return("/#{group_full_path}") get :show, params: { id: group_full_path } end context 'when requesting the canonical path with different casing' do let(:group_full_path) { group.to_param.upcase } it 'redirects to the correct casing' do expect(response).to redirect_to(group) expect(controller).not_to set_flash[:notice] end end context 'when requesting a redirected path' do let(:redirect_route) { group.redirect_routes.create!(path: 'old-path') } let(:group_full_path) { redirect_route.path } it 'redirects to the canonical path' do expect(response).to redirect_to(group) expect(controller).to set_flash[:notice].to(group_moved_message(redirect_route, group)) end context 'when the old group path is a substring of the scheme or host' do let(:redirect_route) { group.redirect_routes.create!(path: 'http') } it 'does not modify the requested host' do expect(response).to redirect_to(group) expect(controller).to set_flash[:notice].to(group_moved_message(redirect_route, group)) end end context 'when the old group path is substring of groups' do # I.e. /groups/oups should not become /grfoo/oups let(:redirect_route) { group.redirect_routes.create!(path: 'oups') } it 'does not modify the /groups part of the path' do expect(response).to redirect_to(group) expect(controller).to set_flash[:notice].to(group_moved_message(redirect_route, group)) end end end end context 'when requesting groups under the /groups path' do context 'when requesting the canonical path' do context 'non-show path' do context 'with exactly matching casing' do it 'does not redirect' do get :issues, params: { id: group.to_param } expect(response).not_to have_gitlab_http_status(:moved_permanently) end end context 'with different casing' do it 'redirects to the correct casing' do get :issues, params: { id: group.to_param.upcase } expect(response).to redirect_to(issues_group_path(group.to_param)) expect(controller).not_to set_flash[:notice] end end end context 'show path' do context 'with exactly matching casing' do it 'does not redirect' do get :show, params: { id: group.to_param } expect(response).not_to have_gitlab_http_status(:moved_permanently) end end context 'with different casing' do it 'redirects to the correct casing at the root path' do get :show, params: { id: group.to_param.upcase } expect(response).to redirect_to(group) expect(controller).not_to set_flash[:notice] end end end end context 'when requesting a redirected path' do let(:redirect_route) { group.redirect_routes.create!(path: 'old-path') } it 'redirects to the canonical path' do get :issues, params: { id: redirect_route.path } expect(response).to redirect_to(issues_group_path(group.to_param)) expect(controller).to set_flash[:notice].to(group_moved_message(redirect_route, group)) end context 'when the old group path is a substring of the scheme or host' do let(:redirect_route) { group.redirect_routes.create!(path: 'http') } it 'does not modify the requested host' do get :issues, params: { id: redirect_route.path } expect(response).to redirect_to(issues_group_path(group.to_param)) expect(controller).to set_flash[:notice].to(group_moved_message(redirect_route, group)) end end context 'when the old group path is substring of groups' do # I.e. /groups/oups should not become /grfoo/oups let(:redirect_route) { group.redirect_routes.create!(path: 'oups') } it 'does not modify the /groups part of the path' do get :issues, params: { id: redirect_route.path } expect(response).to redirect_to(issues_group_path(group.to_param)) expect(controller).to set_flash[:notice].to(group_moved_message(redirect_route, group)) end end context 'when the old group path is substring of groups plus the new path' do # I.e. /groups/oups/oup should not become /grfoos let(:redirect_route) { group.redirect_routes.create!(path: 'oups/oup') } it 'does not modify the /groups part of the path' do get :issues, params: { id: redirect_route.path } expect(response).to redirect_to(issues_group_path(group.to_param)) expect(controller).to set_flash[:notice].to(group_moved_message(redirect_route, group)) end end end end context 'for a POST request' do context 'when requesting the canonical path with different casing' do it 'does not 404' do post :update, params: { id: group.to_param.upcase, group: { path: 'new_path' } } expect(response).not_to have_gitlab_http_status(:not_found) end it 'does not redirect to the correct casing' do post :update, params: { id: group.to_param.upcase, group: { path: 'new_path' } } expect(response).not_to have_gitlab_http_status(:moved_permanently) end end context 'when requesting a redirected path' do let(:redirect_route) { group.redirect_routes.create!(path: 'old-path') } it 'returns not found' do post :update, params: { id: redirect_route.path, group: { path: 'new_path' } } expect(response).to have_gitlab_http_status(:not_found) end end end context 'for a DELETE request' do context 'when requesting the canonical path with different casing' do it 'does not 404' do delete :destroy, params: { id: group.to_param.upcase } expect(response).not_to have_gitlab_http_status(:not_found) end it 'does not redirect to the correct casing' do delete :destroy, params: { id: group.to_param.upcase } expect(response).not_to have_gitlab_http_status(:moved_permanently) end end context 'when requesting a redirected path' do let(:redirect_route) { group.redirect_routes.create!(path: 'old-path') } it 'returns not found' do delete :destroy, params: { id: redirect_route.path } expect(response).to have_gitlab_http_status(:not_found) end end end end def group_moved_message(redirect_route, group) "Group '#{redirect_route.path}' was moved to '#{group.full_path}'. Please update any links and bookmarks that may still have the old path." end end describe 'PUT transfer' do before do sign_in(user) end context 'when transferring to a subgroup goes right' do let(:new_parent_group) { create(:group, :public) } let(:group) { create(:group, :public) } let!(:group_member) { create(:group_member, :owner, group: group, user: user) } let!(:new_parent_group_member) { create(:group_member, :owner, group: new_parent_group, user: user) } before do put :transfer, params: { id: group.to_param, new_parent_group_id: new_parent_group.id } end it 'returns a notice and redirects to the new path' do expect(flash[:notice]).to eq("Group '#{group.name}' was successfully transferred.") expect(response).to redirect_to("/#{new_parent_group.path}/#{group.path}") end end context 'when converting to a root group goes right' do let(:group) { create(:group, :public, :nested) } let!(:group_member) { create(:group_member, :owner, group: group, user: user) } before do put :transfer, params: { id: group.to_param, new_parent_group_id: '' } end it 'returns a notice and redirects to the new path' do expect(flash[:notice]).to eq("Group '#{group.name}' was successfully transferred.") expect(response).to redirect_to("/#{group.path}") end end context 'When the transfer goes wrong' do let(:new_parent_group) { create(:group, :public) } let(:group) { create(:group, :public) } let!(:group_member) { create(:group_member, :owner, group: group, user: user) } let!(:new_parent_group_member) { create(:group_member, :owner, group: new_parent_group, user: user) } before do allow_any_instance_of(::Groups::TransferService).to receive(:proceed_to_transfer).and_raise(Gitlab::UpdatePathError, 'namespace directory cannot be moved') put :transfer, params: { id: group.to_param, new_parent_group_id: new_parent_group.id } end it 'returns an alert and redirects to the current path' do expect(flash[:alert]).to eq "Transfer failed: namespace directory cannot be moved" expect(response).to redirect_to(edit_group_path(group)) end end context 'when the user is not allowed to transfer the group' do let(:new_parent_group) { create(:group, :public) } let(:group) { create(:group, :public) } let!(:group_member) { create(:group_member, :guest, group: group, user: user) } let!(:new_parent_group_member) { create(:group_member, :guest, group: new_parent_group, user: user) } before do put :transfer, params: { id: group.to_param, new_parent_group_id: new_parent_group.id } end it 'is denied' do expect(response).to have_gitlab_http_status(:not_found) end end context 'transferring when a project has container images' do let(:group) { create(:group, :public, :nested) } let(:project) { create(:project, namespace: group) } let!(:group_member) { create(:group_member, :owner, group: group, user: user) } before do stub_container_registry_config(enabled: true) stub_container_registry_tags(repository: /image/, tags: %w[rc1]) create(:container_repository, project: project, name: :image) put :transfer, params: { id: group.to_param, new_parent_group_id: '' } end it 'does not allow the group to be transferred' do expect(controller).to set_flash[:alert].to match(/Docker images in their container registry/) expect(response).to redirect_to(edit_group_path(group)) end end end describe 'POST #export' do context 'when the user does not have permission to export the group' do before do sign_in(guest) end it 'returns an error' do post :export, params: { id: group.to_param } expect(response).to have_gitlab_http_status(:not_found) end end context 'when the user has permission to export the group' do before do sign_in(user) end it 'triggers the export job' do expect(GroupExportWorker).to receive(:perform_async).with(user.id, group.id, { exported_by_admin: false }) post :export, params: { id: group.to_param } end it 'redirects to the edit page' do post :export, params: { id: group.to_param } expect(response).to have_gitlab_http_status(:found) end end context 'when user is admin' do before do sign_in(admin_with_admin_mode) end it 'triggers the export job, and passes `exported_by_admin` correctly in the `params` hash' do expect(GroupExportWorker).to receive(:perform_async).with(admin_with_admin_mode.id, group.id, { exported_by_admin: true }) post :export, params: { id: group.to_param } end end context 'when the endpoint receives requests above the rate limit' do before do sign_in(user) allow_next_instance_of(Gitlab::ApplicationRateLimiter::BaseStrategy) do |strategy| allow(strategy) .to receive(:increment) .and_return(Gitlab::ApplicationRateLimiter.rate_limits[:group_export][:threshold].call + 1) end end it 'throttles the endpoint' do post :export, params: { id: group.to_param } expect(response.body).to eq('This endpoint has been requested too many times. Try again later.') expect(response).to have_gitlab_http_status :too_many_requests end end end describe 'GET #download_export' do let(:admin) { create(:admin) } let(:export_file) { fixture_file_upload('spec/fixtures/group_export.tar.gz') } before do enable_admin_mode!(admin) end context 'when there is a file available to download' do before do sign_in(admin) create(:import_export_upload, group: group, export_file: export_file, user: admin) end it 'sends the file' do get :download_export, params: { id: group.to_param } expect(response.body).to eq export_file.tempfile.read end end context 'when the file is no longer present on disk' do before do sign_in(admin) create(:import_export_upload, group: group, export_file: export_file, user: admin) group.export_file(admin).file.delete end it 'returns not found' do get :download_export, params: { id: group.to_param } expect(flash[:alert]).to include('file containing the export is not available yet') expect(response).to redirect_to(edit_group_path(group)) end end context 'when there is no file available to download' do before do sign_in(admin) end it 'returns not found' do get :download_export, params: { id: group.to_param } expect(flash[:alert]) .to eq 'Group export link has expired. Please generate a new export from your group settings.' expect(response).to redirect_to(edit_group_path(group)) end end context 'when the user does not have the required permissions' do before do sign_in(guest) end it 'returns not_found' do get :download_export, params: { id: group.to_param } expect(response).to have_gitlab_http_status(:not_found) end end context 'when the endpoint receives requests above the rate limit' do before do sign_in(admin) allow_next_instance_of(Gitlab::ApplicationRateLimiter::BaseStrategy) do |strategy| allow(strategy) .to receive(:increment) .and_return(Gitlab::ApplicationRateLimiter.rate_limits[:group_download_export][:threshold].call + 1) end end it 'throttles the endpoint' do get :download_export, params: { id: group.to_param } expect(response.body).to eq('This endpoint has been requested too many times. Try again later.') expect(response).to have_gitlab_http_status :too_many_requests end end end describe 'external authorization' do before do group.add_owner(user) sign_in(user) end context 'with external authorization service enabled' do before do enable_external_authorization_service_check end describe 'GET #show' do it 'is successful' do get :show, params: { id: group.to_param } expect(response).to have_gitlab_http_status(:ok) end it 'does not allow other formats' do get :show, params: { id: group.to_param }, format: :atom expect(response).to have_gitlab_http_status(:forbidden) end end describe 'GET #edit' do it 'is successful' do get :edit, params: { id: group.to_param } expect(response).to have_gitlab_http_status(:ok) end end describe 'GET #new' do it 'is successful' do get :new expect(response).to have_gitlab_http_status(:ok) end end describe 'GET #index' do it 'is successful' do get :index # Redirects to the dashboard expect(response).to have_gitlab_http_status(:found) end end describe 'POST #create' do it 'creates a group' do expect do post :create, params: { group: { name: 'a name', path: 'a-name' } } end.to change { Group.count }.by(1) end end describe 'PUT #update' do it 'updates a group' do expect do put :update, params: { id: group.to_param, group: { name: 'world' } } end.to change { group.reload.name } end context "malicious group name" do subject { put :update, params: { id: group.to_param, group: { name: "" } } } it { is_expected.to render_template(:edit) } it 'does not update name' do expect { subject }.not_to change { group.reload.name } end end context 'when default branch name is invalid' do subject { put :update, params: { id: group.to_param, group: { default_branch_name: "***" } } } it 'renders an error message' do expect { subject }.not_to change { group.reload.name } expect(flash[:alert]).to eq('Default branch name is invalid.') end end end describe 'DELETE #destroy' do it 'deletes the group' do delete :destroy, params: { id: group.to_param } expect(response).to have_gitlab_http_status(:found) end end end describe 'GET #activity' do subject { get :activity, params: { id: group.to_param } } it_behaves_like 'disabled when using an external authorization service' end describe "GET #activity as JSON" do include DesignManagementTestHelpers let(:other_project) { create(:project, :public, group: group) } def get_activity get :activity, params: { format: :json, id: group.to_param } end before do enable_design_management issue = create(:issue, project: project) create(:event, :created, project: project, target: issue) create(:design_event, project: project) create(:design_event, project: other_project) sign_in(user) request.cookies[:event_filter] = 'all' end it 'returns count' do get_activity expect(json_response['count']).to eq(3) end end describe 'GET #issues' do subject { get :issues, params: { id: group.to_param } } it_behaves_like 'disabled when using an external authorization service' end describe 'GET #merge_requests' do subject { get :merge_requests, params: { id: group.to_param } } it_behaves_like 'disabled when using an external authorization service' end end describe 'GET #unfoldered_environment_names' do it 'shows the environment names of a public project to an anonymous user' do public_project = create(:project, :public, namespace: group) create(:environment, project: public_project, name: 'foo') get( :unfoldered_environment_names, params: { id: group, format: :json } ) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to eq(%w[foo]) end it 'does not show environment names of private projects to anonymous users' do create(:environment, project: project, name: 'foo') get( :unfoldered_environment_names, params: { id: group, format: :json } ) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to be_empty end it 'shows environment names of a private project to a group member' do create(:environment, project: project, name: 'foo') sign_in(developer) get( :unfoldered_environment_names, params: { id: group, format: :json } ) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to eq(%w[foo]) end it 'does not show environment names of private projects to a logged-in non-member' do alice = create(:user) create(:environment, project: project, name: 'foo') sign_in(alice) get( :unfoldered_environment_names, params: { id: group, format: :json } ) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to be_empty end end end