Files
gitlab-foss/spec/models/protected_branch_spec.rb
2025-04-10 00:07:30 +00:00

637 lines
23 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe ProtectedBranch, feature_category: :source_code_management do
it_behaves_like 'protected ref', :protected_branch
it_behaves_like 'protected ref with access levels for', :merge
it_behaves_like 'protected ref with access levels for', :push
subject { build_stubbed(:protected_branch) }
describe 'Associations' do
it { is_expected.to belong_to(:group) }
it { is_expected.to have_many(:merge_access_levels).inverse_of(:protected_branch) }
it { is_expected.to have_many(:push_access_levels).inverse_of(:protected_branch) }
end
describe 'Validation' do
context 'uniqueness' do
let(:protected_branch) { build(:protected_branch) }
subject { protected_branch }
it { is_expected.to validate_uniqueness_of(:name).scoped_to([:project_id, :namespace_id]) }
context 'when the protected_branch was saved previously' do
before do
protected_branch.save!
end
it { is_expected.not_to validate_uniqueness_of(:name) }
context 'and name is changed' do
before do
protected_branch.name = "#{protected_branch.name} + something else"
end
it { is_expected.to validate_uniqueness_of(:name).scoped_to([:project_id, :namespace_id]) }
end
end
end
describe '#validate_either_project_or_top_group' do
context 'when protected branch does not have project or group association' do
it 'validate failed' do
subject.assign_attributes(project: nil, group: nil)
subject.validate
expect(subject.errors).to include(:base)
end
end
context 'when protected branch is associated with both project and group' do
it 'validate failed' do
subject.assign_attributes(project: build(:project), group: build(:group))
subject.validate
expect(subject.errors).to include(:base)
end
end
context 'when protected branch is associated with a subgroup' do
it 'validate failed' do
subject.assign_attributes(project: nil, group: build(:group, :nested))
subject.validate
expect(subject.errors).to include(:base)
end
end
end
end
describe 'set a group' do
context 'when associated with group' do
it 'create successfully' do
expect { subject.group = build(:group) }.not_to raise_error
end
end
context 'when associated with other namespace' do
it 'create failed with `ActiveRecord::AssociationTypeMismatch`' do
expect { subject.group = build(:namespace) }.to raise_error(ActiveRecord::AssociationTypeMismatch)
end
end
end
describe '.protected_refs' do
let(:project) { build_stubbed(:project) }
subject { described_class.protected_refs(project) }
it 'call `all_protected_branches`' do
expect(project).to receive(:all_protected_branches)
subject
end
end
describe '.protected_ref_accessible_to?' do
let_it_be(:project) { create(:project) }
let_it_be(:guest) { create(:user) }
let_it_be(:reporter) { create(:user) }
let_it_be(:developer) { create(:user) }
let_it_be(:maintainer) { create(:user) }
let_it_be(:owner) { create(:user) }
let_it_be(:admin) { create(:user, :admin) }
before do
project.add_guest(guest)
project.add_reporter(reporter)
project.add_developer(developer)
project.add_maintainer(maintainer)
project.add_owner(owner)
end
subject { described_class.protected_ref_accessible_to?(anything, current_user, project: project, action: :push) }
context 'with guest' do
let(:current_user) { guest }
it { is_expected.to eq(false) }
end
context 'with reporter' do
let(:current_user) { reporter }
it { is_expected.to eq(false) }
end
context 'with developer' do
let(:current_user) { developer }
it { is_expected.to eq(false) }
end
context 'with maintainer' do
let(:current_user) { maintainer }
it { is_expected.to eq(true) }
end
context 'with owner' do
let(:current_user) { owner }
it { is_expected.to eq(true) }
end
context 'with admin' do
let(:current_user) { admin }
it { is_expected.to eq(true) }
end
context 'when project is an empty repository' do
before do
allow(project).to receive(:empty_repo?).and_return(true)
end
context 'when user is an admin' do
let(:current_user) { admin }
it { is_expected.to eq(true) }
end
context 'when user is maintainer' do
let(:current_user) { maintainer }
it { is_expected.to eq(true) }
end
context 'when user is developer and initial push is allowed' do
let(:current_user) { developer }
before do
allow(project).to receive(:initial_push_to_default_branch_allowed_for_developer?).and_return(true)
end
it { is_expected.to eq(true) }
end
context 'when user is developer and initial push is not allowed' do
let(:current_user) { developer }
before do
allow(project).to receive(:initial_push_to_default_branch_allowed_for_developer?).and_return(false)
end
it { is_expected.to eq(false) }
end
end
end
describe '.by_name' do
let!(:protected_branch) { create(:protected_branch, name: 'master') }
let!(:another_protected_branch) { create(:protected_branch, name: 'stable') }
it 'returns protected branches with a matching name' do
expect(described_class.by_name(protected_branch.name))
.to eq([protected_branch])
end
it 'returns protected branches with a partially matching name' do
expect(described_class.by_name(protected_branch.name[0..2]))
.to eq([protected_branch])
end
it 'returns protected branches with a matching name regardless of the casing' do
expect(described_class.by_name(protected_branch.name.upcase))
.to eq([protected_branch])
end
it 'returns nothing when nothing matches' do
expect(described_class.by_name('unknown')).to be_empty
end
it 'return nothing when query is blank' do
expect(described_class.by_name('')).to be_empty
end
end
describe '.get_ids_by_name' do
let(:branch_name) { 'branch_name' }
let!(:protected_branch) { create(:protected_branch, name: branch_name) }
let(:branch_id) { protected_branch.id }
it 'returns the id for each protected branch matching name' do
expect(described_class.get_ids_by_name([branch_name]))
.to match_array([branch_id])
end
end
describe '.downcase_humanized_name' do
it 'returns downcase humanized name' do
expect(described_class.downcase_humanized_name).to eq 'protected branch'
end
end
describe '.default_branch_for' do
let(:project) { create(:project) }
context 'when project has no default branch' do
before do
allow(project).to receive(:default_branch).and_return(nil)
end
it 'returns nil' do
expect(described_class.default_branch_for(project)).to be_nil
end
end
context 'when project has a default branch' do
let(:default_branch_name) { 'main' }
before do
allow(project).to receive(:default_branch).and_return(default_branch_name)
end
context 'when the default branch is protected' do
let!(:protected_branch) { create(:protected_branch, project: project, name: default_branch_name) }
it 'returns the protected branch record' do
expect(described_class.default_branch_for(project)).to eq(protected_branch)
end
end
context 'when the default branch is not protected' do
before do
create(:protected_branch, project: project, name: 'some-other-branch')
end
it 'returns nil' do
expect(described_class.default_branch_for(project)).to be_nil
end
end
end
end
describe '#default_branch?' do
context 'when group level' do
subject { build_stubbed(:protected_branch, project: nil, group: build(:group)) }
it { is_expected.not_to be_default_branch }
end
context 'when project level' do
before do
allow(subject.project).to receive(:default_branch).and_return(branch)
end
context 'when the name matches the default branch' do
let(:branch) { subject.name }
it { is_expected.to be_default_branch }
end
context 'when the name does not match the default branch' do
let(:branch) { "#{subject.name}qwerty" }
it { is_expected.not_to be_default_branch }
end
context 'when a wildcard name matches the default branch' do
let(:branch) { "#{subject.name}*" }
it { is_expected.not_to be_default_branch }
end
end
end
describe '#group_level?' do
context 'when entity is a Group' do
before do
subject.assign_attributes(project: nil, group: build(:group))
end
it { is_expected.to be_group_level }
end
context 'when entity is a Project' do
before do
subject.assign_attributes(project: build(:project), group: nil)
end
it { is_expected.not_to be_group_level }
end
end
describe "#matches?" do
context "when the protected branch setting is not a wildcard" do
let(:protected_branch) { build(:protected_branch, name: "production/some-branch") }
it "returns true for branch names that are an exact match" do
expect(protected_branch.matches?("production/some-branch")).to be true
end
it "returns false for branch names that are not an exact match" do
expect(protected_branch.matches?("staging/some-branch")).to be false
end
end
context "when the protected branch name contains wildcard(s)" do
context "when there is a single '*'" do
let(:protected_branch) { build(:protected_branch, name: "production/*") }
it "returns true for branch names matching the wildcard" do
expect(protected_branch.matches?("production/some-branch")).to be true
expect(protected_branch.matches?("production/")).to be true
end
it "returns false for branch names not matching the wildcard" do
expect(protected_branch.matches?("staging/some-branch")).to be false
expect(protected_branch.matches?("production")).to be false
end
end
context "when the wildcard contains regex symbols other than a '*'" do
let(:protected_branch) { build(:protected_branch, name: "pro.duc.tion/*") }
it "returns true for branch names matching the wildcard" do
expect(protected_branch.matches?("pro.duc.tion/some-branch")).to be true
end
it "returns false for branch names not matching the wildcard" do
expect(protected_branch.matches?("production/some-branch")).to be false
expect(protected_branch.matches?("proXducYtion/some-branch")).to be false
end
end
context "when there are '*'s at either end" do
let(:protected_branch) { build(:protected_branch, name: "*/production/*") }
it "returns true for branch names matching the wildcard" do
expect(protected_branch.matches?("gitlab/production/some-branch")).to be true
expect(protected_branch.matches?("/production/some-branch")).to be true
expect(protected_branch.matches?("gitlab/production/")).to be true
expect(protected_branch.matches?("/production/")).to be true
end
it "returns false for branch names not matching the wildcard" do
expect(protected_branch.matches?("gitlabproductionsome-branch")).to be false
expect(protected_branch.matches?("production/some-branch")).to be false
expect(protected_branch.matches?("gitlab/production")).to be false
expect(protected_branch.matches?("production")).to be false
end
end
context "when there are arbitrarily placed '*'s" do
let(:protected_branch) { build(:protected_branch, name: "pro*duction/*/gitlab/*") }
it "returns true for branch names matching the wildcard" do
expect(protected_branch.matches?("production/some-branch/gitlab/second-branch")).to be true
expect(protected_branch.matches?("proXYZduction/some-branch/gitlab/second-branch")).to be true
expect(protected_branch.matches?("proXYZduction/gitlab/gitlab/gitlab")).to be true
expect(protected_branch.matches?("proXYZduction//gitlab/")).to be true
expect(protected_branch.matches?("proXYZduction/some-branch/gitlab/")).to be true
expect(protected_branch.matches?("proXYZduction//gitlab/some-branch")).to be true
end
it "returns false for branch names not matching the wildcard" do
expect(protected_branch.matches?("production/some-branch/not-gitlab/second-branch")).to be false
expect(protected_branch.matches?("prodXYZuction/some-branch/gitlab/second-branch")).to be false
expect(protected_branch.matches?("proXYZduction/gitlab/some-branch/gitlab")).to be false
expect(protected_branch.matches?("proXYZduction/gitlab//")).to be false
expect(protected_branch.matches?("proXYZduction/gitlab/")).to be false
expect(protected_branch.matches?("proXYZduction//some-branch/gitlab")).to be false
end
end
end
end
describe "#matching" do
context "for direct matches" do
it "returns a list of protected branches matching the given branch name" do
production = create(:protected_branch, name: "production")
staging = create(:protected_branch, name: "staging")
expect(described_class.matching("production")).to include(production)
expect(described_class.matching("production")).not_to include(staging)
end
it "accepts a list of protected branches to search from, so as to avoid a DB call" do
production = build(:protected_branch, name: "production")
staging = build(:protected_branch, name: "staging")
expect(described_class.matching("production")).to be_empty
expect(described_class.matching("production", protected_refs: [production, staging])).to include(production)
expect(described_class.matching("production", protected_refs: [production, staging])).not_to include(staging)
end
end
context "for wildcard matches" do
it "returns a list of protected branches matching the given branch name" do
production = create(:protected_branch, name: "production/*")
staging = create(:protected_branch, name: "staging/*")
expect(described_class.matching("production/some-branch")).to include(production)
expect(described_class.matching("production/some-branch")).not_to include(staging)
end
it "accepts a list of protected branches to search from, so as to avoid a DB call" do
production = build(:protected_branch, name: "production/*")
staging = build(:protected_branch, name: "staging/*")
expect(described_class.matching("production/some-branch")).to be_empty
expect(described_class.matching("production/some-branch", protected_refs: [production, staging])).to include(production)
expect(described_class.matching("production/some-branch", protected_refs: [production, staging])).not_to include(staging)
end
end
end
describe '#protected?' do
context 'existing project' do
let(:project) { create(:project, :repository) }
it 'returns true when the branch matches a protected branch via direct match' do
create(:protected_branch, project: project, name: "foo")
expect(described_class.protected?(project, 'foo')).to eq(true)
end
it 'returns true when the branch matches a protected branch via wildcard match' do
create(:protected_branch, project: project, name: "production/*")
expect(described_class.protected?(project, 'production/some-branch')).to eq(true)
end
it 'returns false when the branch does not match a protected branch via direct match' do
expect(described_class.protected?(project, 'foo')).to eq(false)
end
it 'returns false when the branch does not match a protected branch via wildcard match' do
create(:protected_branch, project: project, name: "production/*")
expect(described_class.protected?(project, 'staging/some-branch')).to eq(false)
end
it 'returns false when branch name is nil' do
expect(described_class.protected?(project, nil)).to eq(false)
end
context 'with caching', :use_clean_rails_redis_caching do
let_it_be(:project) { create(:project, :repository) }
let_it_be(:protected_branch) { create(:protected_branch, project: project, name: "“jawn”") }
before do
allow(described_class).to receive(:matching).and_call_original
# the original call works and warms the cache
described_class.protected?(project, protected_branch.name)
end
it 'correctly invalidates a cache' do
expect(described_class).to receive(:matching).with(protected_branch.name, protected_refs: anything).exactly(3).times.and_call_original
create_params = { name: 'bar', merge_access_levels_attributes: [{ access_level: Gitlab::Access::DEVELOPER }] }
branch = ProtectedBranches::CreateService.new(project, project.owner, create_params).execute
expect(described_class.protected?(project, protected_branch.name)).to eq(true)
ProtectedBranches::UpdateService.new(project, project.owner, name: 'ber').execute(branch)
expect(described_class.protected?(project, protected_branch.name)).to eq(true)
ProtectedBranches::DestroyService.new(project, project.owner).execute(branch)
expect(described_class.protected?(project, protected_branch.name)).to eq(true)
end
context 'when project is updated' do
it 'does not invalidate a cache' do
expect(described_class).not_to receive(:matching).with(protected_branch.name, protected_refs: anything)
project.touch
described_class.protected?(project, protected_branch.name)
end
end
context 'when other project protected branch is updated' do
it 'does not invalidate the current project cache' do
expect(described_class).not_to receive(:matching).with(protected_branch.name, protected_refs: anything)
another_project = create(:project)
ProtectedBranches::CreateService.new(another_project, another_project.owner, name: 'bar').execute
described_class.protected?(project, protected_branch.name)
end
end
it 'correctly uses the cached version' do
expect(described_class).not_to receive(:matching)
expect(described_class.protected?(project, protected_branch.name)).to eq(true)
end
end
end
context 'new project' do
using RSpec::Parameterized::TableSyntax
let(:project) { create(:project) }
context 'when the group has set their own default_branch_protection level' do
where(:default_branch_protection_level, :result) do
Gitlab::Access::BranchProtection.protection_none | false
Gitlab::Access::BranchProtection.protection_partial | false
Gitlab::Access::BranchProtection.protected_against_developer_pushes | true
Gitlab::Access::BranchProtection.protected_fully | true
end
with_them do
it 'protects the default branch based on the default branch protection setting of the group' do
expect(project.namespace).to receive(:default_branch_protection_settings).and_return(default_branch_protection_level)
expect(described_class.protected?(project, 'master')).to eq(result)
end
end
end
context 'when the group has not set their own default_branch_protection level' do
where(:default_branch_protection_level, :result) do
Gitlab::Access::BranchProtection.protection_none | false
Gitlab::Access::BranchProtection.protection_partial | false
Gitlab::Access::BranchProtection.protected_against_developer_pushes | true
Gitlab::Access::BranchProtection.protected_fully | true
end
with_them do
before do
stub_application_setting(default_branch_protection_defaults: default_branch_protection_level)
end
it 'protects the default branch based on the instance level default branch protection setting' do
expect(described_class.protected?(project, 'master')).to eq(result)
end
end
end
end
end
describe "#allow_force_push?" do
using RSpec::Parameterized::TableSyntax
let_it_be(:group) { create(:group) }
let_it_be(:project) { create(:project, group: group) }
where(:group_level_value, :project_level_value, :result) do
true | false | true
false | true | true
true | nil | true
false | nil | false
nil | nil | false
end
with_them do
before do
unless group_level_value.nil?
create(:protected_branch, allow_force_push: group_level_value, name: "foo", project: nil, group: group)
end
unless project_level_value.nil?
create(:protected_branch, allow_force_push: project_level_value, name: "foo", project: project)
end
end
it "returns result" do
expect(described_class.allow_force_push?(project, "foo")).to eq(result)
end
end
end
describe '#any_protected?' do
context 'existing project' do
let(:project) { create(:project, :repository) }
it 'returns true when any of the branch names match a protected branch via direct match' do
create(:protected_branch, project: project, name: 'foo')
expect(described_class.any_protected?(project, ['foo', 'production/some-branch'])).to eq(true)
end
it 'returns true when any of the branch matches a protected branch via wildcard match' do
create(:protected_branch, project: project, name: 'production/*')
expect(described_class.any_protected?(project, ['foo', 'production/some-branch'])).to eq(true)
end
it 'returns false when none of branches does not match a protected branch via direct match' do
expect(described_class.any_protected?(project, ['foo'])).to eq(false)
end
it 'returns false when none of the branches does not match a protected branch via wildcard match' do
create(:protected_branch, project: project, name: 'production/*')
expect(described_class.any_protected?(project, ['staging/some-branch'])).to eq(false)
end
end
end
end