Skip to content
Snippets Groups Projects
Select Git revision
  • move-gl-dropdown
  • improve-table-pagination-spec
  • move-markdown-preview
  • winh-fix-merge-request-spec
  • master default
  • index-namespaces-lower-name
  • winh-single-karma-test
  • 10-3-stable
  • 36782-replace-team-user-role-with-add_role-user-in-specs
  • winh-modal-internal-state
  • tz-ide-file-icons
  • 38869-milestone-select
  • update-autodevops-template
  • jivl-activate-repo-cookie-preferences
  • qa-add-deploy-key
  • docs-move-article-ldap
  • 40780-choose-file
  • 22643-manual-job-page
  • refactor-cluster-show-page-conservative
  • dm-sidekiq-versioning
  • v10.4.0.pre
  • v10.3.0
  • v10.3.0-rc5
  • v10.3.0-rc4
  • v10.3.0-rc3
  • v10.3.0-rc2
  • v10.2.5
  • v10.3.0-rc1
  • v10.0.7
  • v10.1.5
  • v10.2.4
  • v10.2.3
  • v10.2.2
  • v10.2.1
  • v10.3.0.pre
  • v10.2.0
  • v10.2.0-rc4
  • v10.2.0-rc3
  • v10.1.4
  • v10.2.0-rc2
40 results

branches_spec.rb

Blame
  • Forked from GitLab.org / GitLab FOSS
    19917 commits behind the upstream repository.
    branches_spec.rb 10.41 KiB
    require 'spec_helper'
    require 'mime/types'
    
    describe API::API, api: true  do
      include ApiHelpers
    
      let(:user) { create(:user) }
      let(:user2) { create(:user) }
      let!(:project) { create(:project, creator_id: user.id) }
      let!(:master) { create(:project_member, :master, user: user, project: project) }
      let!(:guest) { create(:project_member, :guest, user: user2, project: project) }
      let!(:branch_name) { 'feature' }
      let!(:branch_sha) { '0b4bc9a49b562e85de7cc9e834518ea6828729b9' }
    
      describe "GET /projects/:id/repository/branches" do
        it "should return an array of project branches" do
          project.repository.expire_cache
    
          get api("/projects/#{project.id}/repository/branches", user)
          expect(response).to have_http_status(200)
          expect(json_response).to be_an Array
          branch_names = json_response.map { |x| x['name'] }
          expect(branch_names).to match_array(project.repository.branch_names)
        end
      end
    
      describe "GET /projects/:id/repository/branches/:branch" do
        it "should return the branch information for a single branch" do
          get api("/projects/#{project.id}/repository/branches/#{branch_name}", user)
          expect(response).to have_http_status(200)
    
          expect(json_response['name']).to eq(branch_name)
          expect(json_response['commit']['id']).to eq(branch_sha)
          expect(json_response['protected']).to eq(false)
          expect(json_response['developers_can_push']).to eq(false)
          expect(json_response['developers_can_merge']).to eq(false)
        end
    
        it "should return a 403 error if guest" do
          get api("/projects/#{project.id}/repository/branches", user2)
          expect(response).to have_http_status(403)
        end
    
        it "should return a 404 error if branch is not available" do
          get api("/projects/#{project.id}/repository/branches/unknown", user)
          expect(response).to have_http_status(404)
        end
      end
    
      describe 'PUT /projects/:id/repository/branches/:branch/protect' do
        it 'protects a single branch' do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user)
    
          expect(response).to have_http_status(200)
          expect(json_response['name']).to eq(branch_name)
          expect(json_response['commit']['id']).to eq(branch_sha)
          expect(json_response['protected']).to eq(true)
          expect(json_response['developers_can_push']).to eq(false)
          expect(json_response['developers_can_merge']).to eq(false)
        end
    
        it 'protects a single branch and developers can push' do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user),
            developers_can_push: true
    
          expect(response).to have_http_status(200)
          expect(json_response['name']).to eq(branch_name)
          expect(json_response['commit']['id']).to eq(branch_sha)
          expect(json_response['protected']).to eq(true)
          expect(json_response['developers_can_push']).to eq(true)
          expect(json_response['developers_can_merge']).to eq(false)
        end
    
        it 'protects a single branch and developers can merge' do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user),
            developers_can_merge: true
    
          expect(response).to have_http_status(200)
          expect(json_response['name']).to eq(branch_name)
          expect(json_response['commit']['id']).to eq(branch_sha)
          expect(json_response['protected']).to eq(true)
          expect(json_response['developers_can_push']).to eq(false)
          expect(json_response['developers_can_merge']).to eq(true)
        end
    
        it 'protects a single branch and developers can push and merge' do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user),
            developers_can_push: true, developers_can_merge: true
    
          expect(response).to have_http_status(200)
          expect(json_response['name']).to eq(branch_name)
          expect(json_response['commit']['id']).to eq(branch_sha)
          expect(json_response['protected']).to eq(true)
          expect(json_response['developers_can_push']).to eq(true)
          expect(json_response['developers_can_merge']).to eq(true)
        end
    
        it 'protects a single branch and developers cannot push and merge' do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user),
            developers_can_push: 'tru', developers_can_merge: 'tr'
    
          expect(response).to have_http_status(200)
          expect(json_response['name']).to eq(branch_name)
          expect(json_response['commit']['id']).to eq(branch_sha)
          expect(json_response['protected']).to eq(true)
          expect(json_response['developers_can_push']).to eq(false)
          expect(json_response['developers_can_merge']).to eq(false)
        end
    
        context 'on a protected branch' do
          let(:protected_branch) { 'foo' }
    
          before do
            project.repository.add_branch(user, protected_branch, 'master')
            create(:protected_branch, project: project, name: protected_branch, developers_can_push: true, developers_can_merge: true)
          end
    
          it 'updates that a developer can push' do
            put api("/projects/#{project.id}/repository/branches/#{protected_branch}/protect", user),
              developers_can_push: false, developers_can_merge: false
    
            expect(response).to have_http_status(200)
            expect(json_response['name']).to eq(protected_branch)
            expect(json_response['protected']).to eq(true)
            expect(json_response['developers_can_push']).to eq(false)
            expect(json_response['developers_can_merge']).to eq(false)
          end
    
          it 'does not update that a developer can push' do
            put api("/projects/#{project.id}/repository/branches/#{protected_branch}/protect", user),
              developers_can_push: 'foobar', developers_can_merge: 'foo'
    
            expect(response).to have_http_status(200)
            expect(json_response['name']).to eq(protected_branch)
            expect(json_response['protected']).to eq(true)
            expect(json_response['developers_can_push']).to eq(true)
            expect(json_response['developers_can_merge']).to eq(true)
          end
        end
    
        it "should return a 404 error if branch not found" do
          put api("/projects/#{project.id}/repository/branches/unknown/protect", user)
          expect(response).to have_http_status(404)
        end
    
        it "should return a 403 error if guest" do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user2)
          expect(response).to have_http_status(403)
        end
    
        it "should return success when protect branch again" do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user)
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/protect", user)
          expect(response).to have_http_status(200)
        end
      end
    
      describe "PUT /projects/:id/repository/branches/:branch/unprotect" do
        it "should unprotect a single branch" do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/unprotect", user)
          expect(response).to have_http_status(200)
    
          expect(json_response['name']).to eq(branch_name)
          expect(json_response['commit']['id']).to eq(branch_sha)
          expect(json_response['protected']).to eq(false)
        end
    
        it "should return success when unprotect branch" do
          put api("/projects/#{project.id}/repository/branches/unknown/unprotect", user)
          expect(response).to have_http_status(404)
        end
    
        it "should return success when unprotect branch again" do
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/unprotect", user)
          put api("/projects/#{project.id}/repository/branches/#{branch_name}/unprotect", user)
          expect(response).to have_http_status(200)
        end
      end
    
      describe "POST /projects/:id/repository/branches" do
        it "should create a new branch" do
          post api("/projects/#{project.id}/repository/branches", user),
               branch_name: 'feature1',
               ref: branch_sha
    
          expect(response).to have_http_status(201)
    
          expect(json_response['name']).to eq('feature1')
          expect(json_response['commit']['id']).to eq(branch_sha)
        end
    
        it "should deny for user without push access" do
          post api("/projects/#{project.id}/repository/branches", user2),
               branch_name: branch_name,
               ref: branch_sha
          expect(response).to have_http_status(403)
        end
    
        it 'should return 400 if branch name is invalid' do
          post api("/projects/#{project.id}/repository/branches", user),
               branch_name: 'new design',
               ref: branch_sha
          expect(response).to have_http_status(400)
          expect(json_response['message']).to eq('Branch name is invalid')
        end
    
        it 'should return 400 if branch already exists' do
          post api("/projects/#{project.id}/repository/branches", user),
               branch_name: 'new_design1',
               ref: branch_sha
          expect(response).to have_http_status(201)
    
          post api("/projects/#{project.id}/repository/branches", user),
               branch_name: 'new_design1',
               ref: branch_sha
          expect(response).to have_http_status(400)
          expect(json_response['message']).to eq('Branch already exists')
        end
    
        it 'should return 400 if ref name is invalid' do
          post api("/projects/#{project.id}/repository/branches", user),
               branch_name: 'new_design3',
               ref: 'foo'
          expect(response).to have_http_status(400)
          expect(json_response['message']).to eq('Invalid reference name')
        end
      end
    
      describe "DELETE /projects/:id/repository/branches/:branch" do
        before do
          allow_any_instance_of(Repository).to receive(:rm_branch).and_return(true)
        end
    
        it "should remove branch" do
          delete api("/projects/#{project.id}/repository/branches/#{branch_name}", user)
          expect(response).to have_http_status(200)
          expect(json_response['branch_name']).to eq(branch_name)
        end
    
        it 'should return 404 if branch not exists' do
          delete api("/projects/#{project.id}/repository/branches/foobar", user)
          expect(response).to have_http_status(404)
        end
    
        it "should remove protected branch" do
          project.protected_branches.create(name: branch_name)
          delete api("/projects/#{project.id}/repository/branches/#{branch_name}", user)
          expect(response).to have_http_status(405)
          expect(json_response['message']).to eq('Protected branch cant be removed')
        end
    
        it "should not remove HEAD branch" do
          delete api("/projects/#{project.id}/repository/branches/master", user)
          expect(response).to have_http_status(405)
          expect(json_response['message']).to eq('Cannot remove HEAD branch')
        end
      end
    end