Skip to content
Snippets Groups Projects
Commit fb06a4d8 authored by Gabriel Mazetto's avatar Gabriel Mazetto
Browse files

Rename more path_with_namespace -> full_path or disk_path

parent c6dee998
No related branches found
No related tags found
No related merge requests found
Showing
with 73 additions and 69 deletions
Loading
Loading
@@ -7,7 +7,7 @@
 
.git-access-header
Clone repository
%strong= @project_wiki.path_with_namespace
%strong= @project_wiki.full_path
 
= render "shared/clone_panel", project: @project_wiki
 
Loading
Loading
Loading
Loading
@@ -42,7 +42,7 @@ module Backup
path_to_wiki_bundle = path_to_bundle(wiki)
 
if File.exist?(path_to_wiki_repo)
progress.print " * #{wiki.path_with_namespace} ... "
progress.print " * #{wiki.full_path} ... "
if empty_repo?(wiki)
progress.puts " [SKIPPED]".color(:cyan)
else
Loading
Loading
@@ -104,7 +104,7 @@ module Backup
path_to_wiki_bundle = path_to_bundle(wiki)
 
if File.exist?(path_to_wiki_bundle)
progress.print " * #{wiki.path_with_namespace} ... "
progress.print " * #{wiki.full_path} ... "
 
# If a wiki bundle exists, first remove the empty repo
# that was initialized with ProjectWiki.new() and then
Loading
Loading
@@ -192,7 +192,7 @@ module Backup
project_or_wiki.repository.expire_exists_cache # protect backups from stale cache
project_or_wiki.repository.empty_repo?
rescue => e
progress.puts "Ignoring repository error and continuing backing up project: #{project_or_wiki.path_with_namespace} - #{e.message}".color(:orange)
progress.puts "Ignoring repository error and continuing backing up project: #{project_or_wiki.full_path} - #{e.message}".color(:orange)
 
false
end
Loading
Loading
Loading
Loading
@@ -51,7 +51,7 @@ module Banzai
 
uri.path = [
relative_url_root,
context[:project].path_with_namespace,
context[:project].full_path,
uri_type(file_path),
Addressable::URI.escape(ref),
Addressable::URI.escape(file_path)
Loading
Loading
Loading
Loading
@@ -254,7 +254,7 @@ module Gitlab
def import_wiki
unless project.wiki.repository_exists?
wiki = WikiFormatter.new(project)
gitlab_shell.import_repository(project.repository_storage_path, wiki.path_with_namespace, wiki.import_url)
gitlab_shell.import_repository(project.repository_storage_path, wiki.disk_path, wiki.import_url)
end
rescue Gitlab::Shell::Error => e
# GitHub error message when the wiki repo has not been created,
Loading
Loading
Loading
Loading
@@ -7,8 +7,8 @@ module Gitlab
@project = project
end
 
def path_with_namespace
"#{project.full_path}.wiki"
def disk_path
"#{project.disk_path}.wiki"
end
 
def import_url
Loading
Loading
Loading
Loading
@@ -527,7 +527,7 @@ namespace :gitlab do
repo_dirs = user.authorized_projects.map do |p|
File.join(
p.repository_storage_path,
"#{p.path_with_namespace}.git"
"#{p.disk_path}.git"
)
end
 
Loading
Loading
Loading
Loading
@@ -9,7 +9,7 @@ namespace :gitlab do
scope = scope.where('id IN (?) OR namespace_id in (?)', project_ids, namespace_ids)
end
scope.find_each do |project|
base = File.join(project.repository_storage_path, project.path_with_namespace)
base = File.join(project.repository_storage_path, project.disk_path)
puts base + '.git'
puts base + '.wiki.git'
end
Loading
Loading
Loading
Loading
@@ -80,7 +80,7 @@ namespace :gitlab do
print '-'
else
if Gitlab::Shell.new.add_repository(project.repository_storage_path,
project.path_with_namespace)
project.disk_path)
print '.'
else
print 'F'
Loading
Loading
Loading
Loading
@@ -20,7 +20,7 @@ describe 'Projects > Wiki > User views Git access wiki page' do
visit project_wiki_path(project, wiki_page)
 
click_link 'Clone repository'
expect(page).to have_text("Clone repository #{project.wiki.path_with_namespace}")
expect(page).to have_text("Clone repository #{project.wiki.full_path}")
expect(page).to have_text(project.wiki.http_url_to_repo)
end
end
Loading
Loading
@@ -52,21 +52,21 @@ describe Banzai::Filter::UploadLinkFilter do
it 'rebuilds relative URL for a link' do
doc = filter(link('/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg'))
expect(doc.at_css('a')['href'])
.to eq "#{Gitlab.config.gitlab.url}/#{project.path_with_namespace}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
.to eq "#{Gitlab.config.gitlab.url}/#{project.full_path}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
 
doc = filter(nested_link('/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg'))
expect(doc.at_css('a')['href'])
.to eq "#{Gitlab.config.gitlab.url}/#{project.path_with_namespace}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
.to eq "#{Gitlab.config.gitlab.url}/#{project.full_path}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
end
 
it 'rebuilds relative URL for an image' do
doc = filter(image('/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg'))
expect(doc.at_css('img')['src'])
.to eq "#{Gitlab.config.gitlab.url}/#{project.path_with_namespace}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
.to eq "#{Gitlab.config.gitlab.url}/#{project.full_path}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
 
doc = filter(nested_image('/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg'))
expect(doc.at_css('img')['src'])
.to eq "#{Gitlab.config.gitlab.url}/#{project.path_with_namespace}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
.to eq "#{Gitlab.config.gitlab.url}/#{project.full_path}/uploads/e90decf88d8f96fe9e1389afc2e4a91f/test.jpg"
end
 
it 'does not modify absolute URL' do
Loading
Loading
@@ -85,7 +85,7 @@ describe Banzai::Filter::UploadLinkFilter do
.to receive(:image?).with(path).and_return(true)
 
doc = filter(image(escaped))
expect(doc.at_css('img')['src']).to match "#{Gitlab.config.gitlab.url}/#{project.path_with_namespace}/uploads/%ED%95%9C%EA%B8%80.png"
expect(doc.at_css('img')['src']).to match "#{Gitlab.config.gitlab.url}/#{project.full_path}/uploads/%ED%95%9C%EA%B8%80.png"
end
end
 
Loading
Loading
Loading
Loading
@@ -3,7 +3,7 @@ require 'spec_helper'
describe Gitlab::GitalyClient::CommitService do
let(:project) { create(:project, :repository) }
let(:storage_name) { project.repository_storage }
let(:relative_path) { project.path_with_namespace + '.git' }
let(:relative_path) { project.disk_path + '.git' }
let(:repository) { project.repository }
let(:repository_message) { repository.gitaly_repository }
let(:revision) { '913c66a37b4a45b9769037c55c2d238bd0942d2e' }
Loading
Loading
Loading
Loading
@@ -9,9 +9,9 @@ describe Gitlab::GithubImport::WikiFormatter do
 
subject(:wiki) { described_class.new(project) }
 
describe '#path_with_namespace' do
describe '#disk_path' do
it 'appends .wiki to project path' do
expect(wiki.path_with_namespace).to eq 'gitlabhq/gitlabhq.wiki'
expect(wiki.disk_path).to eq project.disk_path + '.wiki'
end
end
 
Loading
Loading
Loading
Loading
@@ -15,19 +15,23 @@ describe ProjectWiki do
 
describe "#path_with_namespace" do
it "returns the project path with namespace with the .wiki extension" do
expect(subject.path_with_namespace).to eq(project.path_with_namespace + ".wiki")
expect(subject.path_with_namespace).to eq(project.full_path + '.wiki')
end
it 'returns the same value as #full_path' do
expect(subject.path_with_namespace).to eq(subject.full_path)
end
end
 
describe '#web_url' do
it 'returns the full web URL to the wiki' do
expect(subject.web_url).to eq("#{Gitlab.config.gitlab.url}/#{project.path_with_namespace}/wikis/home")
expect(subject.web_url).to eq("#{Gitlab.config.gitlab.url}/#{project.full_path}/wikis/home")
end
end
 
describe "#url_to_repo" do
it "returns the correct ssh url to the repo" do
expect(subject.url_to_repo).to eq(gitlab_shell.url_to_repo(subject.path_with_namespace))
expect(subject.url_to_repo).to eq(gitlab_shell.url_to_repo(subject.full_path))
end
end
 
Loading
Loading
@@ -41,7 +45,7 @@ describe ProjectWiki do
let(:project) { create :empty_project }
 
it 'returns the full http url to the repo' do
expected_url = "#{Gitlab.config.gitlab.url}/#{subject.path_with_namespace}.git"
expected_url = "#{Gitlab.config.gitlab.url}/#{subject.full_path}.git"
 
expect(project_wiki.http_url_to_repo).to eq(expected_url)
expect(project_wiki.http_url_to_repo).not_to include('@')
Loading
Loading
@@ -50,7 +54,7 @@ describe ProjectWiki do
 
describe "#wiki_base_path" do
it "returns the wiki base path" do
wiki_base_path = "#{Gitlab.config.gitlab.relative_url_root}/#{project.path_with_namespace}/wikis"
wiki_base_path = "#{Gitlab.config.gitlab.relative_url_root}/#{project.full_path}/wikis"
 
expect(subject.wiki_base_path).to eq(wiki_base_path)
end
Loading
Loading
@@ -77,7 +81,7 @@ describe ProjectWiki do
allow_any_instance_of(Gitlab::Shell).to receive(:add_repository) do
create_temp_repo("#{Rails.root}/tmp/test-git-base-path/non-existant.wiki.git")
end
allow(project).to receive(:path_with_namespace).and_return("non-existant")
allow(project).to receive(:full_path).and_return("non-existant")
end
 
describe '#empty?' do
Loading
Loading
@@ -269,7 +273,7 @@ describe ProjectWiki do
describe '#create_repo!' do
it 'creates a repository' do
expect(subject).to receive(:init_repo)
.with(subject.path_with_namespace)
.with(subject.full_path)
.and_return(true)
 
expect(subject.repository).to receive(:after_create)
Loading
Loading
Loading
Loading
@@ -123,7 +123,7 @@ describe 'Git HTTP requests' do
 
context "when requesting the Wiki" do
let(:wiki) { ProjectWiki.new(project) }
let(:path) { "/#{wiki.repository.path_with_namespace}.git" }
let(:path) { "/#{wiki.repository.full_path}.git" }
 
context "when the project is public" do
let(:project) { create(:project, :repository, :public, :wiki_enabled) }
Loading
Loading
@@ -139,7 +139,7 @@ describe 'Git HTTP requests' do
download(path) do |response|
json_body = ActiveSupport::JSON.decode(response.body)
 
expect(json_body['RepoPath']).to include(wiki.repository.path_with_namespace)
expect(json_body['RepoPath']).to include(wiki.repository.full_path)
end
end
end
Loading
Loading
@@ -222,7 +222,7 @@ describe 'Git HTTP requests' do
end
 
context "when the project exists" do
let(:path) { "#{project.path_with_namespace}.git" }
let(:path) { "#{project.full_path}.git" }
 
context "when the project is public" do
let(:project) { create(:project, :repository, :public) }
Loading
Loading
@@ -286,7 +286,7 @@ describe 'Git HTTP requests' do
context 'when the request is not from gitlab-workhorse' do
it 'raises an exception' do
expect do
get("/#{project.path_with_namespace}.git/info/refs?service=git-upload-pack")
get("/#{project.full_path}.git/info/refs?service=git-upload-pack")
end.to raise_error(JWT::DecodeError)
end
end
Loading
Loading
@@ -294,7 +294,7 @@ describe 'Git HTTP requests' do
context 'when the repo is public' do
context 'but the repo is disabled' do
let(:project) { create(:project, :public, :repository, :repository_disabled) }
let(:path) { "#{project.path_with_namespace}.git" }
let(:path) { "#{project.full_path}.git" }
let(:env) { {} }
 
it_behaves_like 'pulls require Basic HTTP Authentication'
Loading
Loading
@@ -303,7 +303,7 @@ describe 'Git HTTP requests' do
 
context 'but the repo is enabled' do
let(:project) { create(:project, :public, :repository, :repository_enabled) }
let(:path) { "#{project.path_with_namespace}.git" }
let(:path) { "#{project.full_path}.git" }
let(:env) { {} }
 
it_behaves_like 'pulls are allowed'
Loading
Loading
@@ -421,7 +421,7 @@ describe 'Git HTTP requests' do
@token = Doorkeeper::AccessToken.create!(application_id: application.id, resource_owner_id: user.id, scopes: "api")
end
 
let(:path) { "#{project.path_with_namespace}.git" }
let(:path) { "#{project.full_path}.git" }
let(:env) { { user: 'oauth2', password: @token.token } }
 
it_behaves_like 'pulls are allowed'
Loading
Loading
@@ -431,7 +431,7 @@ describe 'Git HTTP requests' do
context 'when user has 2FA enabled' do
let(:user) { create(:user, :two_factor) }
let(:access_token) { create(:personal_access_token, user: user) }
let(:path) { "#{project.path_with_namespace}.git" }
let(:path) { "#{project.full_path}.git" }
 
before do
project.team << [user, :master]
Loading
Loading
@@ -580,7 +580,7 @@ describe 'Git HTTP requests' do
end
 
context 'when build created by system is authenticated' do
let(:path) { "#{project.path_with_namespace}.git" }
let(:path) { "#{project.full_path}.git" }
let(:env) { { user: 'gitlab-ci-token', password: build.token } }
 
it_behaves_like 'pulls are allowed'
Loading
Loading
@@ -602,7 +602,7 @@ describe 'Git HTTP requests' do
# We are "authenticated" as CI using a valid token here. But we are
# not authorized to see any other project, so return "not found".
it "rejects pulls for other project with 404 Not Found" do
clone_get("#{other_project.path_with_namespace}.git", env)
clone_get("#{other_project.full_path}.git", env)
 
expect(response).to have_http_status(:not_found)
expect(response.body).to eq(git_access_error(:project_not_found))
Loading
Loading
@@ -616,7 +616,7 @@ describe 'Git HTTP requests' do
end
 
shared_examples 'can download code only' do
let(:path) { "#{project.path_with_namespace}.git" }
let(:path) { "#{project.full_path}.git" }
let(:env) { { user: 'gitlab-ci-token', password: build.token } }
 
it_behaves_like 'pulls are allowed'
Loading
Loading
@@ -646,7 +646,7 @@ describe 'Git HTTP requests' do
it_behaves_like 'can download code only'
 
it 'downloads from other project get status 403' do
clone_get "#{other_project.path_with_namespace}.git", user: 'gitlab-ci-token', password: build.token
clone_get "#{other_project.full_path}.git", user: 'gitlab-ci-token', password: build.token
 
expect(response).to have_http_status(:forbidden)
end
Loading
Loading
@@ -658,7 +658,7 @@ describe 'Git HTTP requests' do
it_behaves_like 'can download code only'
 
it 'downloads from other project get status 404' do
clone_get "#{other_project.path_with_namespace}.git", user: 'gitlab-ci-token', password: build.token
clone_get "#{other_project.full_path}.git", user: 'gitlab-ci-token', password: build.token
 
expect(response).to have_http_status(:not_found)
end
Loading
Loading
@@ -671,7 +671,7 @@ describe 'Git HTTP requests' do
let(:project) { create(:project, :repository, :public, path: 'project.git-project') }
 
context "GET info/refs" do
let(:path) { "/#{project.path_with_namespace}/info/refs" }
let(:path) { "/#{project.full_path}/info/refs" }
 
context "when no params are added" do
before do
Loading
Loading
@@ -679,7 +679,7 @@ describe 'Git HTTP requests' do
end
 
it "redirects to the .git suffix version" do
expect(response).to redirect_to("/#{project.path_with_namespace}.git/info/refs")
expect(response).to redirect_to("/#{project.full_path}.git/info/refs")
end
end
 
Loading
Loading
@@ -691,7 +691,7 @@ describe 'Git HTTP requests' do
end
 
it "redirects to the .git suffix version" do
expect(response).to redirect_to("/#{project.path_with_namespace}.git/info/refs?service=#{params[:service]}")
expect(response).to redirect_to("/#{project.full_path}.git/info/refs?service=#{params[:service]}")
end
end
 
Loading
Loading
@@ -703,7 +703,7 @@ describe 'Git HTTP requests' do
end
 
it "redirects to the .git suffix version" do
expect(response).to redirect_to("/#{project.path_with_namespace}.git/info/refs?service=#{params[:service]}")
expect(response).to redirect_to("/#{project.full_path}.git/info/refs?service=#{params[:service]}")
end
end
 
Loading
Loading
@@ -722,13 +722,13 @@ describe 'Git HTTP requests' do
 
context "POST git-upload-pack" do
it "fails to find a route" do
expect { clone_post(project.path_with_namespace) }.to raise_error(ActionController::RoutingError)
expect { clone_post(project.full_path) }.to raise_error(ActionController::RoutingError)
end
end
 
context "POST git-receive-pack" do
it "fails to find a route" do
expect { push_post(project.path_with_namespace) }.to raise_error(ActionController::RoutingError)
expect { push_post(project.full_path) }.to raise_error(ActionController::RoutingError)
end
end
end
Loading
Loading
@@ -744,7 +744,7 @@ describe 'Git HTTP requests' do
Blob.decorate(Gitlab::Git::Blob.find(project.repository, 'master', 'bar/branch-test.txt'), project)
end
 
get "/#{project.path_with_namespace}/blob/master/info/refs"
get "/#{project.full_path}/blob/master/info/refs"
end
 
it "returns the file" do
Loading
Loading
@@ -754,7 +754,7 @@ describe 'Git HTTP requests' do
 
context "when the file does not exist" do
before do
get "/#{project.path_with_namespace}/blob/master/info/refs"
get "/#{project.full_path}/blob/master/info/refs"
end
 
it "returns not found" do
Loading
Loading
Loading
Loading
@@ -701,7 +701,7 @@ describe 'Git LFS API and storage' do
expect(json_response['objects']).to be_kind_of(Array)
expect(json_response['objects'].first['oid']).to eq("91eff75a492a3ed0dfcb544d7f31326bc4014c8551849c192fd1e48d4dd2c897")
expect(json_response['objects'].first['size']).to eq(1575078)
expect(json_response['objects'].first['actions']['upload']['href']).to eq("#{Gitlab.config.gitlab.url}/#{project.path_with_namespace}.git/gitlab-lfs/objects/91eff75a492a3ed0dfcb544d7f31326bc4014c8551849c192fd1e48d4dd2c897/1575078")
expect(json_response['objects'].first['actions']['upload']['href']).to eq("#{Gitlab.config.gitlab.url}/#{project.full_path}.git/gitlab-lfs/objects/91eff75a492a3ed0dfcb544d7f31326bc4014c8551849c192fd1e48d4dd2c897/1575078")
expect(json_response['objects'].first['actions']['upload']['header']).to eq('Authorization' => authorization)
end
end
Loading
Loading
Loading
Loading
@@ -15,7 +15,7 @@ describe 'Request Profiler' do
it 'creates a profile of the request' do
project = create(:project, namespace: user.namespace)
time = Time.now
path = "/#{project.path_with_namespace}"
path = "/#{project.full_path}"
 
Timecop.freeze(time) do
get path, nil, 'X-Profile-Token' => Gitlab::RequestProfiler.profile_token
Loading
Loading
Loading
Loading
@@ -46,7 +46,7 @@ describe Auth::ContainerRegistryAuthenticationService do
shared_examples 'an accessible' do
let(:access) do
[{ 'type' => 'repository',
'name' => project.path_with_namespace,
'name' => project.full_path,
'actions' => actions }]
end
 
Loading
Loading
@@ -97,7 +97,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
describe '#full_access_token' do
let(:project) { create(:empty_project) }
let(:token) { described_class.full_access_token(project.path_with_namespace) }
let(:token) { described_class.full_access_token(project.full_path) }
 
subject { { token: token } }
 
Loading
Loading
@@ -124,7 +124,7 @@ describe Auth::ContainerRegistryAuthenticationService do
end
 
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:push" }
{ scope: "repository:#{project.full_path}:push" }
end
 
it_behaves_like 'a pushable'
Loading
Loading
@@ -138,7 +138,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'when pulling from root level repository' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull" }
{ scope: "repository:#{project.full_path}:pull" }
end
 
it_behaves_like 'a pullable'
Loading
Loading
@@ -152,7 +152,7 @@ describe Auth::ContainerRegistryAuthenticationService do
end
 
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:push,pull" }
{ scope: "repository:#{project.full_path}:push,pull" }
end
 
it_behaves_like 'a pullable'
Loading
Loading
@@ -165,7 +165,7 @@ describe Auth::ContainerRegistryAuthenticationService do
end
 
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull,push" }
{ scope: "repository:#{project.full_path}:pull,push" }
end
 
it_behaves_like 'an inaccessible'
Loading
Loading
@@ -178,7 +178,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'allow anyone to pull images' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull" }
{ scope: "repository:#{project.full_path}:pull" }
end
 
it_behaves_like 'a pullable'
Loading
Loading
@@ -187,7 +187,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'disallow anyone to push images' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:push" }
{ scope: "repository:#{project.full_path}:push" }
end
 
it_behaves_like 'an inaccessible'
Loading
Loading
@@ -210,7 +210,7 @@ describe Auth::ContainerRegistryAuthenticationService do
context 'for internal user' do
context 'allow anyone to pull images' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull" }
{ scope: "repository:#{project.full_path}:pull" }
end
 
it_behaves_like 'a pullable'
Loading
Loading
@@ -219,7 +219,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'disallow anyone to push images' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:push" }
{ scope: "repository:#{project.full_path}:push" }
end
 
it_behaves_like 'an inaccessible'
Loading
Loading
@@ -230,7 +230,7 @@ describe Auth::ContainerRegistryAuthenticationService do
context 'for external user' do
let(:current_user) { create(:user, external: true) }
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull,push" }
{ scope: "repository:#{project.full_path}:pull,push" }
end
 
it_behaves_like 'an inaccessible'
Loading
Loading
@@ -255,7 +255,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'allow to pull and push images' do
let(:current_params) do
{ scope: "repository:#{current_project.path_with_namespace}:pull,push" }
{ scope: "repository:#{current_project.full_path}:pull,push" }
end
 
it_behaves_like 'a pullable and pushable' do
Loading
Loading
@@ -270,7 +270,7 @@ describe Auth::ContainerRegistryAuthenticationService do
context 'for other projects' do
context 'when pulling' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull" }
{ scope: "repository:#{project.full_path}:pull" }
end
 
context 'allow for public' do
Loading
Loading
@@ -337,7 +337,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'when pushing' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:push" }
{ scope: "repository:#{project.full_path}:push" }
end
 
context 'disallow for all' do
Loading
Loading
@@ -371,7 +371,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'disallow when pulling' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull" }
{ scope: "repository:#{project.full_path}:pull" }
end
 
it_behaves_like 'an inaccessible'
Loading
Loading
@@ -399,7 +399,7 @@ describe Auth::ContainerRegistryAuthenticationService do
let(:project) { create(:empty_project, :private) }
 
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull" }
{ scope: "repository:#{project.full_path}:pull" }
end
 
it_behaves_like 'a forbidden'
Loading
Loading
@@ -410,7 +410,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'when pulling and pushing' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:pull,push" }
{ scope: "repository:#{project.full_path}:pull,push" }
end
 
it_behaves_like 'a pullable'
Loading
Loading
@@ -419,7 +419,7 @@ describe Auth::ContainerRegistryAuthenticationService do
 
context 'when pushing' do
let(:current_params) do
{ scope: "repository:#{project.path_with_namespace}:push" }
{ scope: "repository:#{project.full_path}:push" }
end
 
it_behaves_like 'a forbidden'
Loading
Loading
Loading
Loading
@@ -873,7 +873,7 @@ describe SystemNoteService do
describe "existing reference" do
before do
allow(JIRA::Resource::Remotelink).to receive(:all).and_return([])
message = "[#{author.name}|http://localhost/#{author.username}] mentioned this issue in [a commit of #{project.full_path}|http://localhost/#{project.path_with_namespace}/commit/#{commit.id}]:\n'#{commit.title.chomp}'"
message = "[#{author.name}|http://localhost/#{author.username}] mentioned this issue in [a commit of #{project.full_path}|http://localhost/#{project.full_path}/commit/#{commit.id}]:\n'#{commit.title.chomp}'"
allow_any_instance_of(JIRA::Resource::Issue).to receive(:comments).and_return([OpenStruct.new(body: message)])
end
 
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment