INSTRUCTION
stringlengths 202
35.5k
| RESPONSE
stringlengths 75
161k
|
---|---|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
require 'rubygems/package'
module Packages
module Rubygems
class ProcessGemService
include Gitlab::Utils::StrongMemoize
include ExclusiveLeaseGuard
ExtractionError = Class.new(StandardError)
InvalidMetadataError = Class.new(StandardError)
DEFAULT_LEASE_TIMEOUT = 1.hour.to_i.freeze
def initialize(package_file)
@package_file = package_file
end
def execute
raise ExtractionError, 'Gem was not processed - package_file is not set' unless package_file
return success if process_gem
error('Gem was not processed')
rescue ActiveRecord::StatementInvalid
# TODO: We can remove this rescue block when we fix https://gitlab.com/gitlab-org/gitlab/-/issues/415899
raise InvalidMetadataError, 'Invalid metadata'
end
private
attr_reader :package_file
def process_gem
try_obtain_lease do
package.transaction do
rename_package_and_set_version
rename_package_file
::Packages::Rubygems::MetadataExtractionService.new(package, gemspec).execute
::Packages::Rubygems::CreateGemspecService.new(package, gemspec).execute
::Packages::Rubygems::CreateDependenciesService.new(package, gemspec).execute
cleanup_temp_package
end
end
true
end
def rename_package_and_set_version
package.update!(
name: gemspec.name,
version: gemspec.version,
status: :default
)
end
def rename_package_file
# Updating file_name updates the path where the file is stored.
# We must pass the file again so that CarrierWave can handle the update
package_file.update!(
file_name: "#{gemspec.name}-#{gemspec.version}.gem",
file: package_file.file,
package_id: package.id
)
end
def cleanup_temp_package
temp_package.destroy if package.id != temp_package.id
end
def gemspec
gem.spec
end
strong_memoize_attr :gemspec
def success
ServiceResponse.success(payload: { package: package })
end
def error(message)
ServiceResponse.error(message: message)
end
def temp_package
package_file.package
end
strong_memoize_attr :temp_package
def package
package = temp_package.project
.packages
.rubygems
.with_name(gemspec.name)
.with_version(gemspec.version.to_s)
.not_pending_destruction
.last
package || temp_package
end
strong_memoize_attr :package
def gem
# use_file will set an exclusive lease on the file for as long as
# the resulting gem object is being used. This means we are not
# able to rename the package_file while also using the gem object.
# We need to use a separate AR object to create the gem file to allow
# `package_file` to be free for update so we re-find the file here.
Packages::PackageFile.find(package_file.id).file.use_file do |file_path|
Gem::Package.new(File.open(file_path))
end
rescue StandardError
raise ExtractionError, 'Unable to read gem file'
end
# used by ExclusiveLeaseGuard
def lease_key
"packages:rubygems:process_gem_service:package:#{package.id}"
end
# used by ExclusiveLeaseGuard
def lease_timeout
DEFAULT_LEASE_TIMEOUT
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rubygems::ProcessGemService, feature_category: :package_registry do
include ExclusiveLeaseHelpers
include RubygemsHelpers
let_it_be_with_reload(:package) { create(:rubygems_package, :processing, name: 'temp_name', version: '0.0.0') }
let(:package_file) { create(:package_file, :unprocessed_gem, package: package) }
let(:gem) { gem_from_file(package_file.file) }
let(:gemspec) { gem.spec }
let(:service) { described_class.new(package_file) }
describe '#execute' do
subject { service.execute }
context 'no gem file' do
let(:package_file) { nil }
it 'returns an error' do
expect { subject }.to raise_error(::Packages::Rubygems::ProcessGemService::ExtractionError, 'Gem was not processed - package_file is not set')
end
end
context 'success' do
let(:sub_service) { double }
before do
expect(Packages::Rubygems::MetadataExtractionService).to receive(:new).with(package, gemspec).and_return(sub_service)
expect(Packages::Rubygems::CreateGemspecService).to receive(:new).with(package, gemspec).and_return(sub_service)
expect(Packages::Rubygems::CreateDependenciesService).to receive(:new).with(package, gemspec).and_return(sub_service)
expect(sub_service).to receive(:execute).exactly(3).times.and_return(true)
end
it 'returns successfully', :aggregate_failures do
result = subject
expect(result.success?).to be true
expect(result.payload[:package]).to eq(package)
end
it 'updates the package name and version', :aggregate_failures do
expect(package.name).to eq('temp_name')
expect(package.version).to eq('0.0.0')
expect(package).to be_processing
subject
expect(package.reload.name).to eq('package')
expect(package.version).to eq('0.0.1')
expect(package).to be_default
end
it 'updates the package file name', :aggregate_failures do
expect(package_file.file_name).to eq('package.gem')
subject
expect(package_file.reload.file_name).to eq('package-0.0.1.gem')
end
end
context 'when the package already exists' do
let_it_be(:existing_package) { create(:rubygems_package, name: 'package', version: '0.0.1', project: package.project) }
let(:sub_service) { double }
before do
expect(Packages::Rubygems::MetadataExtractionService).to receive(:new).with(existing_package, gemspec).and_return(sub_service)
expect(Packages::Rubygems::CreateGemspecService).to receive(:new).with(existing_package, gemspec).and_return(sub_service)
expect(Packages::Rubygems::CreateDependenciesService).to receive(:new).with(existing_package, gemspec).and_return(sub_service)
expect(sub_service).to receive(:execute).exactly(3).times.and_return(true)
end
it 'assigns the package_file to the existing package and deletes the temporary package', :aggregate_failures do
expect(package).to receive(:destroy)
expect { subject }.to change { existing_package.package_files.count }.by(1)
expect(package_file.reload.package).to eq(existing_package)
end
end
context 'when the package already exists marked as pending_destruction' do
let_it_be_with_reload(:existing_package) { create(:rubygems_package, name: 'package', version: '0.0.1', project: package.project) }
let(:sub_service) { double }
before do
expect(Packages::Rubygems::MetadataExtractionService).to receive(:new).with(package, gemspec).and_return(sub_service)
expect(Packages::Rubygems::CreateGemspecService).to receive(:new).with(package, gemspec).and_return(sub_service)
expect(Packages::Rubygems::CreateDependenciesService).to receive(:new).with(package, gemspec).and_return(sub_service)
expect(sub_service).to receive(:execute).exactly(3).times.and_return(true)
existing_package.pending_destruction!
end
it 'reuses the processing package' do
expect { subject }
.to not_change { package.project.packages.count }
.and not_change { existing_package.package_files.count }
end
end
context 'sub-service failure' do
before do
expect(Packages::Rubygems::MetadataExtractionService).to receive(:new).with(package, gemspec).and_raise(::Packages::Rubygems::ProcessGemService::ExtractionError.new('failure'))
end
it 'returns an error' do
expect { subject }.to raise_error(::Packages::Rubygems::ProcessGemService::ExtractionError, 'failure')
end
end
context 'bad gem file' do
before do
expect(Gem::Package).to receive(:new).and_raise(ArgumentError)
end
it 'returns an error' do
expect { subject }.to raise_error(::Packages::Rubygems::ProcessGemService::ExtractionError, 'Unable to read gem file')
end
end
context 'without obtaining an exclusive lease' do
let(:lease_key) { "packages:rubygems:process_gem_service:package:#{package.id}" }
before do
stub_exclusive_lease_taken(lease_key, timeout: 1.hour)
end
it 'does not perform the services', :aggregate_failures do
# The #use_file call triggers a separate lease on the package file being opened
# for use with the gem. We don't want to test that here, so we allow the call to proceed
expect(Gitlab::ExclusiveLease).to receive(:new).with("object_storage_migrate:Packages::PackageFile:#{package_file.id}", anything).and_call_original
expect(Packages::Rubygems::MetadataExtractionService).not_to receive(:new)
expect(Packages::Rubygems::CreateGemspecService).not_to receive(:new)
expect(Packages::Rubygems::CreateDependenciesService).not_to receive(:new)
subject
expect(package.reload.name).to eq('temp_name')
expect(package.version).to eq('0.0.0')
expect(package).to be_processing
expect(package_file.reload.file_name).to eq('package.gem')
end
end
context 'with invalid metadata' do
include_context 'with invalid Rubygems metadata'
it 'raises the correct error' do
expect { subject }
.to raise_error(::Packages::Rubygems::ProcessGemService::InvalidMetadataError, 'Invalid metadata')
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rubygems
class MetadataExtractionService
def initialize(package, gemspec)
@package = package
@gemspec = gemspec
end
def execute
write_metadata
end
private
attr_reader :package, :gemspec
# rubocop:disable Metrics/AbcSize
# rubocop:disable Metrics/PerceivedComplexity
# rubocop:disable Metrics/CyclomaticComplexity
def write_metadata
metadatum.update!(
authors: gemspec&.authors,
files: gemspec&.files&.to_json,
summary: gemspec&.summary,
description: gemspec&.description,
email: gemspec&.email,
homepage: gemspec&.homepage,
licenses: gemspec&.licenses&.to_json,
metadata: gemspec&.metadata&.to_json,
author: gemspec&.author,
bindir: gemspec&.bindir,
executables: gemspec&.executables&.to_json,
extensions: gemspec&.extensions&.to_json,
extra_rdoc_files: gemspec&.extra_rdoc_files&.to_json,
platform: gemspec&.platform,
post_install_message: gemspec&.post_install_message,
rdoc_options: gemspec&.rdoc_options&.to_json,
require_paths: gemspec&.require_paths&.to_json,
required_ruby_version: gemspec&.required_ruby_version&.to_s,
required_rubygems_version: gemspec&.required_rubygems_version&.to_s,
requirements: gemspec&.requirements&.to_json,
rubygems_version: gemspec&.rubygems_version
)
end
# rubocop:enable Metrics/AbcSize
# rubocop:enable Metrics/PerceivedComplexity
# rubocop:enable Metrics/CyclomaticComplexity
def metadatum
# safe_find_or_create_by! was originally called here.
# We merely switched to `find_or_create_by!`
# rubocop: disable CodeReuse/ActiveRecord
Packages::Rubygems::Metadatum.find_or_create_by!(package: package)
# rubocop: enable CodeReuse/ActiveRecord
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
require 'rubygems/package'
RSpec.describe Packages::Rubygems::MetadataExtractionService, feature_category: :package_registry do
include RubygemsHelpers
let_it_be(:package) { create(:rubygems_package) }
let_it_be(:package_file) { create(:package_file, :gem) }
let_it_be(:gem) { gem_from_file(package_file.file) }
let_it_be(:gemspec) { gem.spec }
let(:service) { described_class.new(package, gemspec) }
describe '#execute' do
subject { service.execute }
it 'creates the metadata' do
expect { subject }.to change { Packages::Rubygems::Metadatum.count }.by(1)
end
it 'stores the metadata', :aggregate_failures do
subject
metadata = package.rubygems_metadatum
expect(metadata.authors).to eq(gemspec.authors.to_json)
expect(metadata.files).to eq(gemspec.files.to_json)
expect(metadata.summary).to eq(gemspec.summary)
expect(metadata.description).to eq(gemspec.description)
expect(metadata.email).to eq(gemspec.email)
expect(metadata.homepage).to eq(gemspec.homepage)
expect(metadata.licenses).to eq(gemspec.licenses.to_json)
expect(metadata.metadata).to eq(gemspec.metadata.to_json)
expect(metadata.author).to eq(gemspec.author)
expect(metadata.bindir).to eq(gemspec.bindir)
expect(metadata.executables).to eq(gemspec.executables.to_json)
expect(metadata.extensions).to eq(gemspec.extensions.to_json)
expect(metadata.extra_rdoc_files).to eq(gemspec.extra_rdoc_files.to_json)
expect(metadata.platform).to eq(gemspec.platform)
expect(metadata.post_install_message).to eq(gemspec.post_install_message)
expect(metadata.rdoc_options).to eq(gemspec.rdoc_options.to_json)
expect(metadata.require_paths).to eq(gemspec.require_paths.to_json)
expect(metadata.required_ruby_version).to eq(gemspec.required_ruby_version.to_s)
expect(metadata.required_rubygems_version).to eq(gemspec.required_rubygems_version.to_s)
expect(metadata.requirements).to eq(gemspec.requirements.to_json)
expect(metadata.rubygems_version).to eq(gemspec.rubygems_version)
end
context 'with an existing metadatum' do
let_it_be(:metadatum) { create(:rubygems_metadatum, package: package) }
it 'updates it' do
expect { subject }.not_to change { Packages::Rubygems::Metadatum.count }
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rubygems
class CreateDependenciesService
def initialize(package, gemspec)
@package = package
@gemspec = gemspec
end
def execute
set_dependencies
end
private
attr_reader :package, :gemspec
def set_dependencies
Packages::Dependency.transaction do
dependency_type_rows = gemspec.dependencies.map do |dependency|
dependency = Packages::Dependency.safe_find_or_create_by!(
name: dependency.name,
version_pattern: dependency.requirement.to_s
)
{
dependency_id: dependency.id,
package_id: package.id,
dependency_type: :dependencies
}
end
package.dependency_links.upsert_all(
dependency_type_rows,
unique_by: %i[package_id dependency_id dependency_type]
)
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rubygems::CreateDependenciesService, feature_category: :package_registry do
include RubygemsHelpers
let_it_be(:package) { create(:rubygems_package) }
let_it_be(:package_file) { create(:package_file, :gem) }
let_it_be(:gem) { gem_from_file(package_file.file) }
let_it_be(:gemspec) { gem.spec }
let(:service) { described_class.new(package, gemspec) }
describe '#execute' do
subject { service.execute }
it 'creates dependencies', :aggregate_failures do
expect { subject }.to change { Packages::Dependency.count }.by(4)
gemspec.dependencies.each do |dependency|
persisted_dependency = Packages::Dependency.find_by(name: dependency.name)
expect(persisted_dependency.version_pattern).to eq dependency.requirement.to_s
end
end
it 'links dependencies to the package' do
expect { subject }.to change { package.dependency_links.count }.by(4)
expect(package.dependency_links.first).to be_dependencies
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rubygems
class CreateGemspecService
def initialize(package, gemspec)
@package = package
@gemspec = gemspec
end
def execute
write_gemspec_to_file
end
private
attr_reader :package, :gemspec
def write_gemspec_to_file
file = Tempfile.new
begin
content = gemspec.to_ruby
file.write(content)
file.flush
md5 = Gitlab::FIPS.enabled? ? nil : Digest::MD5.hexdigest(content)
package.package_files.create!(
file: file,
size: file.size,
file_name: "#{gemspec.name}.gemspec",
file_sha1: Digest::SHA1.hexdigest(content),
file_md5: md5,
file_sha256: Digest::SHA256.hexdigest(content)
)
ensure
file.close
file.unlink
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rubygems::CreateGemspecService, feature_category: :package_registry do
include RubygemsHelpers
let_it_be(:package_file) { create(:package_file, :gem) }
let_it_be(:gem) { gem_from_file(package_file.file) }
let_it_be(:gemspec) { gem.spec }
let_it_be(:package) { package_file.package }
let(:service) { described_class.new(package, gemspec) }
describe '#execute' do
subject { service.execute }
it 'creates a new package file', :aggregate_failures do
expect { subject }.to change { package.package_files.count }.by(1)
gemspec_file = package.package_files.find_by(file_name: "#{gemspec.name}.gemspec")
expect(gemspec_file.file).not_to be_nil
expect(gemspec_file.size).not_to be_nil
expect(gemspec_file.file_md5).not_to be_nil
expect(gemspec_file.file_sha1).not_to be_nil
expect(gemspec_file.file_sha256).not_to be_nil
end
context 'with FIPS mode', :fips_mode do
it 'does not generate file_md5' do
expect { subject }.to change { package.package_files.count }.by(1)
gemspec_file = package.package_files.find_by(file_name: "#{gemspec.name}.gemspec")
expect(gemspec_file.file).not_to be_nil
expect(gemspec_file.size).not_to be_nil
expect(gemspec_file.file_md5).to be_nil
expect(gemspec_file.file_sha1).not_to be_nil
expect(gemspec_file.file_sha256).not_to be_nil
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Cleanup
class UpdatePolicyService < BaseProjectService
ALLOWED_ATTRIBUTES = %i[keep_n_duplicated_package_files].freeze
def execute
return ServiceResponse.error(message: 'Access denied') unless allowed?
if policy.update(policy_params)
ServiceResponse.success(payload: { packages_cleanup_policy: policy })
else
ServiceResponse.error(message: policy.errors.full_messages.to_sentence || 'Bad request')
end
end
private
def policy
project.packages_cleanup_policy
end
strong_memoize_attr :policy
def allowed?
can?(current_user, :admin_package, project)
end
def policy_params
params.slice(*ALLOWED_ATTRIBUTES)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Cleanup::UpdatePolicyService, feature_category: :package_registry do
using RSpec::Parameterized::TableSyntax
let_it_be_with_reload(:project) { create(:project) }
let_it_be(:current_user) { create(:user) }
let(:params) { { keep_n_duplicated_package_files: 50 } }
describe '#execute' do
subject { described_class.new(project: project, current_user: current_user, params: params).execute }
shared_examples 'creating the policy' do
it 'creates a new one' do
expect { subject }.to change { ::Packages::Cleanup::Policy.count }.from(0).to(1)
expect(subject.payload[:packages_cleanup_policy]).to be_present
expect(subject.success?).to be_truthy
expect(project.packages_cleanup_policy).to be_persisted
expect(project.packages_cleanup_policy.keep_n_duplicated_package_files).to eq('50')
end
context 'with invalid parameters' do
let(:params) { { keep_n_duplicated_package_files: 100 } }
it 'does not create one' do
expect { subject }.not_to change { ::Packages::Cleanup::Policy.count }
expect(subject.status).to eq(:error)
expect(subject.message).to eq('Keep n duplicated package files is invalid')
end
end
end
shared_examples 'updating the policy' do
it 'updates the existing one' do
expect { subject }.not_to change { ::Packages::Cleanup::Policy.count }
expect(subject.payload[:packages_cleanup_policy]).to be_present
expect(subject.success?).to be_truthy
expect(project.packages_cleanup_policy.keep_n_duplicated_package_files).to eq('50')
end
context 'with invalid parameters' do
let(:params) { { keep_n_duplicated_package_files: 100 } }
it 'does not update one' do
expect { subject }.not_to change { policy.keep_n_duplicated_package_files }
expect(subject.status).to eq(:error)
expect(subject.message).to eq('Keep n duplicated package files is invalid')
end
end
end
shared_examples 'denying access' do
it 'returns an error' do
subject
expect(subject.message).to eq('Access denied')
expect(subject.status).to eq(:error)
end
end
context 'with existing container expiration policy' do
let_it_be(:policy) { create(:packages_cleanup_policy, project: project) }
where(:user_role, :shared_examples_name) do
:maintainer | 'updating the policy'
:developer | 'denying access'
:reporter | 'denying access'
:guest | 'denying access'
:anonymous | 'denying access'
end
with_them do
before do
project.send("add_#{user_role}", current_user) unless user_role == :anonymous
end
it_behaves_like params[:shared_examples_name]
end
end
context 'without existing container expiration policy' do
where(:user_role, :shared_examples_name) do
:maintainer | 'creating the policy'
:developer | 'denying access'
:reporter | 'denying access'
:guest | 'denying access'
:anonymous | 'denying access'
end
with_them do
before do
project.send("add_#{user_role}", current_user) unless user_role == :anonymous
end
it_behaves_like params[:shared_examples_name]
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Cleanup
class ExecutePolicyService
include Gitlab::Utils::StrongMemoize
MAX_EXECUTION_TIME = 250.seconds
DUPLICATED_FILES_BATCH_SIZE = 10_000
MARK_PACKAGE_FILES_FOR_DESTRUCTION_SERVICE_BATCH_SIZE = 200
def initialize(policy)
@policy = policy
@counts = {
marked_package_files_total_count: 0,
unique_package_id_and_file_name_total_count: 0
}
end
def execute
cleanup_duplicated_files
end
private
def cleanup_duplicated_files
return if @policy.keep_n_duplicated_package_files_disabled?
result = installable_package_files.each_batch(of: DUPLICATED_FILES_BATCH_SIZE) do |package_files|
break :timeout if cleanup_duplicated_files_on(package_files) == :timeout
end
response_success(timeout: result == :timeout)
end
def cleanup_duplicated_files_on(package_files)
unique_package_id_and_file_name_from(package_files).each do |package_id, file_name|
result = remove_duplicated_files_for(package_id: package_id, file_name: file_name)
@counts[:marked_package_files_total_count] += result.payload[:marked_package_files_count]
@counts[:unique_package_id_and_file_name_total_count] += 1
break :timeout unless result.success?
end
end
def unique_package_id_and_file_name_from(package_files)
# This is a highly custom query for this service, that's why it's not in the model.
# rubocop: disable CodeReuse/ActiveRecord
package_files.group(:package_id, :file_name)
.having("COUNT(*) > #{@policy.keep_n_duplicated_package_files}")
.pluck(:package_id, :file_name)
# rubocop: enable CodeReuse/ActiveRecord
end
def remove_duplicated_files_for(package_id:, file_name:)
base = ::Packages::PackageFile.for_package_ids(package_id)
.installable
.with_file_name(file_name)
ids_to_keep = base.recent
.limit(@policy.keep_n_duplicated_package_files)
.pluck_primary_key
duplicated_package_files = base.id_not_in(ids_to_keep)
::Packages::MarkPackageFilesForDestructionService.new(duplicated_package_files)
.execute(batch_deadline: batch_deadline, batch_size: MARK_PACKAGE_FILES_FOR_DESTRUCTION_SERVICE_BATCH_SIZE)
end
def project
@policy.project
end
def installable_package_files
::Packages::PackageFile.installable
.for_package_ids(
::Packages::Package.installable
.for_projects(project.id)
)
end
def batch_deadline
MAX_EXECUTION_TIME.from_now
end
strong_memoize_attr :batch_deadline
def response_success(timeout:)
ServiceResponse.success(
message: "Packages cleanup policy executed for project #{project.id}",
payload: {
timeout: timeout,
counts: @counts
}
)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Cleanup::ExecutePolicyService, feature_category: :package_registry do
let_it_be(:project) { create(:project) }
let_it_be_with_reload(:policy) { create(:packages_cleanup_policy, project: project) }
let(:service) { described_class.new(policy) }
describe '#execute' do
subject(:execute) { service.execute }
context 'with the keep_n_duplicated_files parameter' do
let_it_be(:package1) { create(:package, project: project) }
let_it_be(:package2) { create(:package, project: project) }
let_it_be(:package3) { create(:package, project: project) }
let_it_be(:package4) { create(:package, :pending_destruction, project: project) }
let_it_be(:package_file1_1) { create(:package_file, package: package1, file_name: 'file_name1') }
let_it_be(:package_file1_2) { create(:package_file, package: package1, file_name: 'file_name1') }
let_it_be(:package_file1_3) { create(:package_file, package: package1, file_name: 'file_name1') }
let_it_be(:package_file1_4) { create(:package_file, package: package1, file_name: 'file_name2') }
let_it_be(:package_file1_5) { create(:package_file, package: package1, file_name: 'file_name2') }
let_it_be(:package_file1_6) { create(:package_file, package: package1, file_name: 'file_name2') }
let_it_be(:package_file1_7) do
create(:package_file, :pending_destruction, package: package1, file_name: 'file_name2')
end
let_it_be(:package_file2_1) { create(:package_file, package: package2, file_name: 'file_name1') }
let_it_be(:package_file2_2) { create(:package_file, package: package2, file_name: 'file_name1') }
let_it_be(:package_file2_3) { create(:package_file, package: package2, file_name: 'file_name1') }
let_it_be(:package_file2_4) { create(:package_file, package: package2, file_name: 'file_name1') }
let_it_be(:package_file3_1) { create(:package_file, package: package3, file_name: 'file_name_test') }
let_it_be(:package_file4_1) { create(:package_file, package: package4, file_name: 'file_name1') }
let_it_be(:package_file4_2) { create(:package_file, package: package4, file_name: 'file_name1') }
let(:package_files_1) { package1.package_files.installable }
let(:package_files_2) { package2.package_files.installable }
let(:package_files_3) { package3.package_files.installable }
context 'set to less than the total number of duplicated files' do
before do
# for each package file duplicate, we keep only the most recent one
policy.update!(keep_n_duplicated_package_files: '1')
end
shared_examples 'keeping the most recent package files' do
let(:response_payload) do
{
counts: {
marked_package_files_total_count: 7,
unique_package_id_and_file_name_total_count: 3
},
timeout: false
}
end
it 'only keeps the most recent package files' do
expect { execute }.to change { ::Packages::PackageFile.installable.count }.by(-7)
expect(package_files_1).to contain_exactly(package_file1_3, package_file1_6)
expect(package_files_2).to contain_exactly(package_file2_4)
expect(package_files_3).to contain_exactly(package_file3_1)
expect(execute).to be_success
expect(execute.message).to eq("Packages cleanup policy executed for project #{project.id}")
expect(execute.payload).to eq(response_payload)
end
end
it_behaves_like 'keeping the most recent package files'
context 'when the service needs to loop' do
before do
stub_const("#{described_class.name}::DUPLICATED_FILES_BATCH_SIZE", 2)
end
it_behaves_like 'keeping the most recent package files' do
before do
expect(::Packages::MarkPackageFilesForDestructionService)
.to receive(:new).exactly(3).times.and_call_original
end
end
context 'when a timeout is hit' do
let(:response_payload) do
{
counts: {
marked_package_files_total_count: 4,
unique_package_id_and_file_name_total_count: 3
},
timeout: true
}
end
let(:service_timeout_response) do
ServiceResponse.error(
message: 'Timeout while marking package files as pending destruction',
payload: { marked_package_files_count: 0 }
)
end
before do
mock_service_timeout(on_iteration: 3)
end
it 'keeps part of the most recent package files' do
expect { execute }
.to change { ::Packages::PackageFile.installable.count }.by(-4)
.and not_change { package_files_2.count } # untouched because of the timeout
.and not_change { package_files_3.count } # untouched because of the timeout
expect(package_files_1).to contain_exactly(package_file1_3, package_file1_6)
expect(execute).to be_success
expect(execute.message).to eq("Packages cleanup policy executed for project #{project.id}")
expect(execute.payload).to eq(response_payload)
end
def mock_service_timeout(on_iteration:)
execute_call_count = 1
expect_next_instances_of(::Packages::MarkPackageFilesForDestructionService, 3) do |service|
expect(service).to receive(:execute).and_wrap_original do |m, *args, **kwargs|
# timeout if we are on the right iteration
if execute_call_count == on_iteration
service_timeout_response
else
execute_call_count += 1
m.call(*args, **kwargs)
end
end
end
end
end
end
end
context 'set to more than the total number of duplicated files' do
before do
# using the biggest value for keep_n_duplicated_package_files
policy.update!(keep_n_duplicated_package_files: '50')
end
it 'keeps all package files' do
expect { execute }.not_to change { ::Packages::PackageFile.installable.count }
end
end
context 'set to all' do
before do
policy.update!(keep_n_duplicated_package_files: 'all')
end
it 'skips the policy' do
expect(::Packages::MarkPackageFilesForDestructionService).not_to receive(:new)
expect { execute }.not_to change { ::Packages::PackageFile.installable.count }
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Protection
class UpdateRuleService
include Gitlab::Allowable
ALLOWED_ATTRIBUTES = %i[
package_name_pattern
package_type
push_protected_up_to_access_level
].freeze
def initialize(package_protection_rule, current_user:, params:)
if package_protection_rule.blank? || current_user.blank?
raise ArgumentError,
'package_protection_rule and current_user must be set'
end
@package_protection_rule = package_protection_rule
@current_user = current_user
@params = params || {}
end
def execute
unless can?(current_user, :admin_package, package_protection_rule.project)
error_message = _('Unauthorized to update a package protection rule')
return service_response_error(message: error_message)
end
package_protection_rule.update(params.slice(*ALLOWED_ATTRIBUTES))
if package_protection_rule.errors.present?
return service_response_error(message: package_protection_rule.errors.full_messages)
end
ServiceResponse.success(payload: { package_protection_rule: package_protection_rule })
rescue StandardError => e
service_response_error(message: e.message)
end
private
attr_reader :package_protection_rule, :current_user, :params
def service_response_error(message:)
ServiceResponse.error(
message: message,
payload: { package_protection_rule: nil }
)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Protection::UpdateRuleService, '#execute', feature_category: :environment_management do
let_it_be(:project) { create(:project, :repository) }
let_it_be(:current_user) { create(:user, maintainer_projects: [project]) }
let_it_be_with_reload(:package_protection_rule) { create(:package_protection_rule, project: project) }
let(:service) { described_class.new(package_protection_rule, current_user: current_user, params: params) }
let(:params) do
attributes_for(
:package_protection_rule,
package_name_pattern: "#{package_protection_rule.package_name_pattern}-updated",
package_type: 'npm',
push_protected_up_to_access_level: 'owner'
)
end
subject(:service_execute) { service.execute }
shared_examples 'a successful service response' do
let(:expected_attributes) { params }
it { is_expected.to be_success }
it do
is_expected.to have_attributes(
errors: be_blank,
message: be_blank,
payload: { package_protection_rule: be_a(Packages::Protection::Rule).and(have_attributes(expected_attributes)) }
)
end
it { expect { subject }.not_to change { Packages::Protection::Rule.count } }
it { subject.tap { expect(package_protection_rule.reload).to have_attributes expected_attributes } }
end
shared_examples 'an erroneous service response' do
it { is_expected.to be_error }
it do
is_expected.to have_attributes(
errors: be_present,
message: be_present,
payload: { package_protection_rule: nil }
)
end
it { expect { subject }.not_to change { Packages::Protection::Rule.count } }
it { expect { subject }.not_to change { package_protection_rule.reload.updated_at } }
end
it_behaves_like 'a successful service response'
context 'with disallowed params' do
let(:params) { super().merge!(project_id: 1, unsupported_param: 'unsupported_param_value') }
it_behaves_like 'a successful service response' do
let(:expected_attributes) { params.except(:project_id, :unsupported_param) }
end
end
context 'when fields are invalid' do
let(:params) do
{ package_name_pattern: '', package_type: 'unknown_package_type',
push_protected_up_to_access_level: 1000 }
end
it_behaves_like 'an erroneous service response'
it { is_expected.to have_attributes message: /'unknown_package_type' is not a valid package_type/ }
end
context 'with empty params' do
let(:params) { {} }
it_behaves_like 'a successful service response' do
let(:expected_attributes) { package_protection_rule.attributes }
end
it { expect { service_execute }.not_to change { package_protection_rule.reload.updated_at } }
end
context 'with nil params' do
let(:params) { nil }
it_behaves_like 'a successful service response' do
let(:expected_attributes) { package_protection_rule.attributes }
end
it { expect { service_execute }.not_to change { package_protection_rule.reload.updated_at } }
end
context 'when updated field `package_name_pattern` is already taken' do
let_it_be_with_reload(:other_existing_package_protection_rule) do
create(:package_protection_rule, project: project,
package_name_pattern: "#{package_protection_rule.package_name_pattern}-other")
end
let(:params) { { package_name_pattern: other_existing_package_protection_rule.package_name_pattern } }
it_behaves_like 'an erroneous service response'
it do
expect { service_execute }.not_to(
change { other_existing_package_protection_rule.reload.package_name_pattern }
)
end
it do
is_expected.to have_attributes(
errors: match_array([/Package name pattern has already been taken/]),
message: match_array([/Package name pattern has already been taken/])
)
end
end
context 'when current_user does not have permission' do
let_it_be(:developer) { create(:user).tap { |u| project.add_developer(u) } }
let_it_be(:reporter) { create(:user).tap { |u| project.add_reporter(u) } }
let_it_be(:guest) { create(:user).tap { |u| project.add_guest(u) } }
let_it_be(:anonymous) { create(:user) }
where(:current_user) do
[ref(:developer), ref(:reporter), ref(:guest), ref(:anonymous)]
end
with_them do
it_behaves_like 'an erroneous service response'
it { is_expected.to have_attributes errors: match_array(/Unauthorized/), message: /Unauthorized/ }
end
end
context 'without package protection rule' do
let(:package_protection_rule) { nil }
let(:params) { {} }
it { expect { service_execute }.to raise_error(ArgumentError) }
end
context 'without current_user' do
let(:current_user) { nil }
it { expect { service_execute }.to raise_error(ArgumentError) }
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Protection
class CreateRuleService < BaseProjectService
ALLOWED_ATTRIBUTES = %i[
package_name_pattern
package_type
push_protected_up_to_access_level
].freeze
def execute
unless can?(current_user, :admin_package, project)
error_message = _('Unauthorized to create a package protection rule')
return service_response_error(message: error_message)
end
package_protection_rule = project.package_protection_rules.create(params.slice(*ALLOWED_ATTRIBUTES))
unless package_protection_rule.persisted?
return service_response_error(message: package_protection_rule.errors.full_messages)
end
ServiceResponse.success(payload: { package_protection_rule: package_protection_rule })
rescue StandardError => e
service_response_error(message: e.message)
end
private
def service_response_error(message:)
ServiceResponse.error(
message: message,
payload: { package_protection_rule: nil }
)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Protection::CreateRuleService, '#execute', feature_category: :package_registry do
let_it_be(:project) { create(:project, :repository) }
let_it_be(:maintainer) { create(:user).tap { |u| project.add_maintainer(u) } }
let(:service) { described_class.new(project: project, current_user: current_user, params: params) }
let(:current_user) { maintainer }
let(:params) { attributes_for(:package_protection_rule) }
subject { service.execute }
shared_examples 'a successful service response' do
let(:package_protection_rule_count_expected) { 1 }
it { is_expected.to be_success }
it do
is_expected.to have_attributes(
payload: include(
package_protection_rule: be_a(Packages::Protection::Rule)
)
)
end
it { expect(subject.payload).to include(package_protection_rule: be_a(Packages::Protection::Rule)) }
it do
expect { subject }.to change { Packages::Protection::Rule.count }.by(1)
expect(Packages::Protection::Rule.where(project: project).count).to eq package_protection_rule_count_expected
expect(Packages::Protection::Rule.where(project: project,
package_name_pattern: params[:package_name_pattern])).to exist
end
end
shared_examples 'an erroneous service response' do
let(:package_protection_rule_count_expected) { 0 }
it { is_expected.to be_error }
it { is_expected.to have_attributes(payload: include(package_protection_rule: nil)) }
it do
expect { subject }.to change { Packages::Protection::Rule.count }.by(0)
expect(Packages::Protection::Rule.where(project: project).count).to eq package_protection_rule_count_expected
expect(Packages::Protection::Rule.where(project: project,
package_name_pattern: params[:package_name_pattern])).not_to exist
end
end
context 'without existing PackageProtectionRules' do
context 'when fields are valid' do
it_behaves_like 'a successful service response'
end
context 'when fields are invalid' do
let(:params) do
{
package_name_pattern: '',
package_type: 'unknown_package_type',
push_protected_up_to_access_level: 1000
}
end
it_behaves_like 'an erroneous service response'
end
end
context 'with existing PackageProtectionRule' do
let_it_be(:existing_package_protection_rule) { create(:package_protection_rule, project: project) }
context 'when package name pattern is slightly different' do
let(:params) do
attributes_for(
:package_protection_rule,
# The field `package_name_pattern` is unique; this is why we change the value in a minimum way
package_name_pattern: "#{existing_package_protection_rule.package_name_pattern}-unique",
package_type: existing_package_protection_rule.package_type,
push_protected_up_to_access_level: existing_package_protection_rule.push_protected_up_to_access_level
)
end
it_behaves_like 'a successful service response' do
let(:package_protection_rule_count_expected) { 2 }
end
end
context 'when field `package_name_pattern` is taken' do
let(:params) do
attributes_for(
:package_protection_rule,
package_name_pattern: existing_package_protection_rule.package_name_pattern,
package_type: existing_package_protection_rule.package_type,
push_protected_up_to_access_level: existing_package_protection_rule.push_protected_up_to_access_level
)
end
it { is_expected.to be_error }
it do
expect { subject }.to change { Packages::Protection::Rule.count }.by(0)
expect(Packages::Protection::Rule.where(project: project).count).to eq 1
expect(
Packages::Protection::Rule.where(
project: project,
package_name_pattern: params[:package_name_pattern]
)
).to exist
end
end
end
context 'when disallowed params are passed' do
let(:params) do
attributes_for(:package_protection_rule)
.merge(
project_id: 1,
unsupported_param: 'unsupported_param_value'
)
end
it_behaves_like 'a successful service response'
end
context 'with forbidden user access level (project developer role)' do
# Because of the access level hierarchy, we can assume that
# other access levels below developer role will also not be able to
# create package protection rules.
let_it_be(:developer) { create(:user).tap { |u| project.add_developer(u) } }
let(:current_user) { developer }
it_behaves_like 'an erroneous service response'
it { is_expected.to have_attributes(message: match(/Unauthorized/)) }
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Protection
class DeleteRuleService
include Gitlab::Allowable
def initialize(package_protection_rule, current_user:)
if package_protection_rule.blank? || current_user.blank?
raise ArgumentError,
'package_protection_rule and current_user must be set'
end
@package_protection_rule = package_protection_rule
@current_user = current_user
end
def execute
unless can?(current_user, :admin_package, package_protection_rule.project)
error_message = _('Unauthorized to delete a package protection rule')
return service_response_error(message: error_message)
end
deleted_package_protection_rule = package_protection_rule.destroy!
ServiceResponse.success(payload: { package_protection_rule: deleted_package_protection_rule })
rescue StandardError => e
service_response_error(message: e.message)
end
private
attr_reader :package_protection_rule, :current_user
def service_response_error(message:)
ServiceResponse.error(
message: message,
payload: { package_protection_rule: nil }
)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Protection::DeleteRuleService, '#execute', feature_category: :package_registry do
let_it_be(:project) { create(:project) }
let_it_be(:current_user) { create(:user, maintainer_projects: [project]) }
let_it_be_with_refind(:package_protection_rule) { create(:package_protection_rule, project: project) }
subject { described_class.new(package_protection_rule, current_user: current_user).execute }
shared_examples 'a successful service response' do
it { is_expected.to be_success }
it {
is_expected.to have_attributes(
errors: be_blank,
message: be_blank,
payload: { package_protection_rule: package_protection_rule }
)
}
it { subject.tap { expect { package_protection_rule.reload }.to raise_error ActiveRecord::RecordNotFound } }
end
shared_examples 'an erroneous service response' do
it { is_expected.to be_error }
it { is_expected.to have_attributes(message: be_present, payload: { package_protection_rule: be_blank }) }
it do
expect { subject }.not_to change { Packages::Protection::Rule.count }
expect { package_protection_rule.reload }.not_to raise_error
end
end
it_behaves_like 'a successful service response'
it 'deletes the package protection rule in the database' do
expect { subject }
.to change { project.reload.package_protection_rules }.from([package_protection_rule]).to([])
.and change { ::Packages::Protection::Rule.count }.from(1).to(0)
end
context 'with deleted package protection rule' do
let!(:package_protection_rule) do
create(:package_protection_rule, project: project, package_name_pattern: 'protection_rule_deleted').destroy!
end
it_behaves_like 'a successful service response'
end
context 'when error occurs during delete operation' do
before do
allow(package_protection_rule).to receive(:destroy!).and_raise(StandardError.new('Some error'))
end
it_behaves_like 'an erroneous service response'
it { is_expected.to have_attributes message: /Some error/ }
end
context 'when current_user does not have permission' do
let_it_be(:developer) { create(:user).tap { |u| project.add_developer(u) } }
let_it_be(:reporter) { create(:user).tap { |u| project.add_reporter(u) } }
let_it_be(:guest) { create(:user).tap { |u| project.add_guest(u) } }
let_it_be(:anonymous) { create(:user) }
where(:current_user) do
[ref(:developer), ref(:reporter), ref(:guest), ref(:anonymous)]
end
with_them do
it_behaves_like 'an erroneous service response'
it { is_expected.to have_attributes message: /Unauthorized to delete a package protection rule/ }
end
end
context 'without package protection rule' do
let(:package_protection_rule) { nil }
it { expect { subject }.to raise_error(ArgumentError) }
end
context 'without current_user' do
let(:current_user) { nil }
let(:package_protection_rule) { build_stubbed(:package_protection_rule, project: project) }
it { expect { subject }.to raise_error(ArgumentError) }
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class ExtractRemoteMetadataFileService
include Gitlab::Utils::StrongMemoize
ExtractionError = Class.new(StandardError)
MAX_FILE_SIZE = 4.megabytes.freeze
METADATA_FILE_EXTENSION = '.nuspec'
MAX_FRAGMENTS = 5 # nuspec file is usually in the first 2 fragments but we buffer 5 max
def initialize(remote_url)
@remote_url = remote_url
end
def execute
raise ExtractionError, 'invalid file url' if remote_url.blank?
if nuspec_file_content.blank? || !nuspec_file_content.instance_of?(String)
raise ExtractionError, 'nuspec file not found'
end
ServiceResponse.success(payload: nuspec_file_content)
end
private
attr_reader :remote_url
def nuspec_file_content
fragments = []
Gitlab::HTTP.get(remote_url, stream_body: true, allow_object_storage: true) do |fragment|
break if fragments.size >= MAX_FRAGMENTS
fragments << fragment
joined_fragments = fragments.join
next if joined_fragments.exclude?(METADATA_FILE_EXTENSION)
nuspec_content = extract_nuspec_file(joined_fragments)
break nuspec_content if nuspec_content.present?
end
end
strong_memoize_attr :nuspec_file_content
def extract_nuspec_file(fragments)
StringIO.open(fragments) do |io|
Zip::InputStream.open(io) do |zip|
process_zip_entries(zip)
end
rescue Zip::Error => e
raise ExtractionError, "Error opening zip stream: #{e.message}"
end
end
def process_zip_entries(zip)
while (entry = zip.get_next_entry) # rubocop:disable Lint/AssignmentInCondition
next unless entry.name.end_with?(METADATA_FILE_EXTENSION)
raise ExtractionError, 'nuspec file too big' if entry.size > MAX_FILE_SIZE
return extract_file_content(entry)
end
end
def extract_file_content(entry)
Tempfile.create('extract_remote_metadata_file_service') do |file|
entry.extract(file.path) { true } # allow #extract to overwrite the file
file.read
end
rescue Zip::DecompressionError
'' # Ignore decompression errors and continue reading the next fragment
rescue Zip::EntrySizeError => e
raise ExtractionError, "nuspec file has the wrong entry size: #{e.message}"
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::ExtractRemoteMetadataFileService, feature_category: :package_registry do
let_it_be(:remote_url) { 'http://example.com/package.nupkg' }
let_it_be(:nupkg_filepath) { 'packages/nuget/package.nupkg' }
describe '#execute' do
subject(:service) { described_class.new(remote_url) }
context 'when the remote URL is blank' do
let(:remote_url) { '' }
it { expect { service.execute }.to raise_error(described_class::ExtractionError, 'invalid file url') }
end
context 'when the package file is corrupted' do
before do
allow(Gitlab::HTTP).to receive(:get).with(remote_url, stream_body: true, allow_object_storage: true)
.and_yield('corrupted data')
end
it { expect { service.execute }.to raise_error(described_class::ExtractionError, 'nuspec file not found') }
end
context 'when reaching the maximum received fragments' do
before do
allow(Gitlab::HTTP).to receive(:get).with(remote_url, stream_body: true, allow_object_storage: true)
.and_yield('Fragment 1').and_yield('Fragment 2').and_yield('Fragment 3').and_yield('Fragment 4')
.and_yield('Fragment 5').and_yield(fixture_file(nupkg_filepath))
end
it { expect { service.execute }.to raise_error(described_class::ExtractionError, 'nuspec file not found') }
end
context 'when nuspec file is too big' do
before do
allow(Gitlab::HTTP).to receive(:get).with(remote_url, stream_body: true, allow_object_storage: true)
.and_yield(fixture_file(nupkg_filepath))
allow_next_instance_of(Zip::Entry) do |instance|
allow(instance).to receive(:size).and_return(6.megabytes)
end
end
it { expect { service.execute }.to raise_error(described_class::ExtractionError, 'nuspec file too big') }
end
context 'when nuspec file is fragmented' do
let_it_be(:nuspec_path) { expand_fixture_path('packages/nuget/with_metadata.nuspec') }
let_it_be(:tmp_zip) { Tempfile.new('nuget_zip') }
let_it_be(:zipped_nuspec) { zip_nuspec_file(nuspec_path, tmp_zip.path).get_raw_input_stream.read }
let_it_be(:fragments) { zipped_nuspec.chars.each_slice(zipped_nuspec.size / 2).map(&:join) }
before do
allow(Gitlab::HTTP).to receive(:get).with(remote_url, stream_body: true, allow_object_storage: true)
.and_yield(fragments[0]).and_yield(fragments[1])
end
after do
tmp_zip.unlink
end
it 'ignores the Zip::DecompressionError and constructs the nuspec file from the fragments' do
response = service.execute
expect(response).to be_success
expect(response.payload).to include('<id>DummyProject.WithMetadata</id>')
.and include('<version>1.2.3</version>')
end
end
context 'when the remote URL is valid' do
let(:fragments) { fixture_file(nupkg_filepath).chars.each_slice(1.kilobyte).map(&:join) }
before do
allow(Gitlab::HTTP).to receive(:get).with(remote_url, stream_body: true, allow_object_storage: true)
.and_yield(fragments[0]).and_yield(fragments[1]).and_yield(fragments[2]).and_yield(fragments[3])
end
it 'returns a success response with the nuspec file content' do
response = service.execute
expect(response).to be_success
expect(response.payload).to include('<id>DummyProject.DummyPackage</id>')
.and include('<version>1.0.0</version>')
end
end
context 'with a corrupted nupkg file with a wrong entry size' do
before do
allow(Gitlab::HTTP).to receive(:get).with(remote_url, stream_body: true, allow_object_storage: true)
.and_yield(fixture_file(nupkg_filepath))
allow_next_instance_of(Zip::Entry) do |instance|
allow(instance).to receive(:extract).and_raise(Zip::EntrySizeError)
end
end
it {
expect do
service.execute
end.to raise_error(described_class::ExtractionError, /nuspec file has the wrong entry size/)
}
end
context 'with a Zip::Error exception' do
before do
allow(Gitlab::HTTP).to receive(:get).with(remote_url, stream_body: true, allow_object_storage: true)
.and_yield(fixture_file(nupkg_filepath))
allow(Zip::InputStream).to receive(:open).and_raise(Zip::Error)
end
it {
expect do
service.execute
end.to raise_error(described_class::ExtractionError, /Error opening zip stream/)
}
end
end
def zip_nuspec_file(nuspec_path, zip_path)
Zip::File.open(zip_path, Zip::File::CREATE) do |zipfile|
zipfile.add('package.nuspec', nuspec_path)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class MetadataExtractionService
def initialize(package_zip_file)
@package_zip_file = package_zip_file
end
def execute
ServiceResponse.success(payload: metadata)
end
private
attr_reader :package_zip_file
def metadata
::Packages::Nuget::ExtractMetadataContentService
.new(nuspec_file_content)
.execute
.payload
end
def nuspec_file_content
::Packages::Nuget::ExtractMetadataFileService
.new(package_zip_file)
.execute
.payload
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::MetadataExtractionService, feature_category: :package_registry do
let_it_be(:package_file) { build(:package_file, :nuget) }
let(:package_zip_file) { Zip::File.new(package_file.file) }
let(:service) { described_class.new(package_zip_file) }
describe '#execute' do
subject { service.execute }
let(:nuspec_file_content) do
<<~XML
<?xml version="1.0" encoding="utf-8"?>
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd">
<metadata>
<id>DummyProject.DummyPackage</id>
<version>1.0.0</version>
<title>Dummy package</title>
<authors>Test</authors>
<owners>Test</owners>
<requireLicenseAcceptance>false</requireLicenseAcceptance>
<description>This is a dummy project</description>
<dependencies>
<group targetFramework=".NETCoreApp3.0">
<dependency id="Newtonsoft.Json" version="12.0.3" exclude="Build,Analyzers" />
</group>
</dependencies>
</metadata>
</package>
XML
end
let(:expected_metadata) do
{
package_name: 'DummyProject.DummyPackage',
package_version: '1.0.0',
authors: 'Test',
description: 'This is a dummy project',
package_dependencies: [
{
name: 'Newtonsoft.Json',
target_framework: '.NETCoreApp3.0',
version: '12.0.3'
}
],
package_tags: [],
package_types: []
}
end
it 'calls the necessary services and executes the metadata extraction' do
expect_next_instance_of(Packages::Nuget::ExtractMetadataFileService, package_zip_file) do |service|
expect(service).to receive(:execute).and_return(ServiceResponse.success(payload: nuspec_file_content))
end
expect_next_instance_of(Packages::Nuget::ExtractMetadataContentService, nuspec_file_content) do |service|
expect(service).to receive(:execute).and_call_original
end
expect(subject.payload).to eq(expected_metadata)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class ExtractMetadataFileService
ExtractionError = Class.new(StandardError)
MAX_FILE_SIZE = 4.megabytes.freeze
def initialize(package_zip_file)
@package_zip_file = package_zip_file
end
def execute
ServiceResponse.success(payload: nuspec_file_content)
end
private
attr_reader :package_zip_file
def nuspec_file_content
entry = extract_nuspec_file
raise ExtractionError, 'nuspec file not found' unless entry
raise ExtractionError, 'nuspec file too big' if MAX_FILE_SIZE < entry.size
Tempfile.create('nuget_extraction_package_file') do |file|
entry.extract(file.path) { true } # allow #extract to overwrite the file
file.read
end
rescue Zip::EntrySizeError => e
raise ExtractionError, "nuspec file has the wrong entry size: #{e.message}"
end
def extract_nuspec_file
if package_zip_file.is_a?(Zip::InputStream)
while (entry = package_zip_file.get_next_entry) # rubocop:disable Lint/AssignmentInCondition -- Following https://github.com/rubyzip/rubyzip#notes-on-zipinputstream and that's why the disable rubocop rule
break entry if entry.name.end_with?('.nuspec')
end
else
package_zip_file.glob('*.nuspec').first
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::ExtractMetadataFileService, feature_category: :package_registry do
include PackagesManagerApiSpecHelpers
let_it_be(:package_file) { build(:package_file, :nuget) }
let_it_be(:package_zip_file) { Zip::File.new(package_file.file) }
let(:service) { described_class.new(package_zip_file) }
describe '#execute' do
subject { service.execute }
shared_examples 'raises an error' do |error_message|
it { expect { subject }.to raise_error(described_class::ExtractionError, error_message) }
end
context 'with valid package file' do
expected_metadata = <<~XML.squish
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd">
<metadata>
<id>DummyProject.DummyPackage</id>
<version>1.0.0</version>
<title>Dummy package</title>
<authors>Test</authors>
<owners>Test</owners>
<requireLicenseAcceptance>false</requireLicenseAcceptance>
<description>This is a dummy project</description>
<dependencies>
<group targetFramework=".NETCoreApp3.0">
<dependency id="Newtonsoft.Json" version="12.0.3" exclude="Build,Analyzers" />
</group>
</dependencies>
</metadata>
</package>
XML
it 'returns the nuspec file content' do
expect(subject.payload.squish).to include(expected_metadata)
end
context 'with InputStream zip' do
let(:package_zip_file) do
Zip::InputStream.open(
temp_file('package.nupkg', content: File.open(package_file.file.path))
)
end
it 'returns the nuspec file content' do
expect(subject.payload.squish).to include(expected_metadata)
end
end
end
context 'without the nuspec file' do
before do
allow(package_zip_file).to receive(:glob).and_return([])
end
it_behaves_like 'raises an error', 'nuspec file not found'
end
context 'with a too big nuspec file' do
before do
allow(package_zip_file).to receive(:glob).and_return(
[instance_double(File, size: described_class::MAX_FILE_SIZE + 1)]
)
end
it_behaves_like 'raises an error', 'nuspec file too big'
end
context 'with a corrupted nupkg file with a wrong entry size' do
let(:nupkg_fixture_path) { expand_fixture_path('packages/nuget/corrupted_package.nupkg') }
let(:package_zip_file) { Zip::File.new(nupkg_fixture_path) }
it_behaves_like 'raises an error',
<<~ERROR.squish
nuspec file has the wrong entry size: entry 'DummyProject.DummyPackage.nuspec' should be 255B,
but is larger when inflated.
ERROR
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class ExtractMetadataContentService
ROOT_XPATH = '//xmlns:package/xmlns:metadata/xmlns'
XPATHS = {
package_name: "#{ROOT_XPATH}:id",
package_version: "#{ROOT_XPATH}:version",
authors: "#{ROOT_XPATH}:authors",
description: "#{ROOT_XPATH}:description",
license_url: "#{ROOT_XPATH}:licenseUrl",
project_url: "#{ROOT_XPATH}:projectUrl",
icon_url: "#{ROOT_XPATH}:iconUrl"
}.freeze
XPATH_DEPENDENCIES = "#{ROOT_XPATH}:dependencies/xmlns:dependency".freeze
XPATH_DEPENDENCY_GROUPS = "#{ROOT_XPATH}:dependencies/xmlns:group".freeze
XPATH_TAGS = "#{ROOT_XPATH}:tags".freeze
XPATH_PACKAGE_TYPES = "#{ROOT_XPATH}:packageTypes/xmlns:packageType".freeze
def initialize(nuspec_file_content)
@nuspec_file_content = nuspec_file_content
end
def execute
ServiceResponse.success(payload: extract_metadata(nuspec_file_content))
end
private
attr_reader :nuspec_file_content
def extract_metadata(file)
doc = Nokogiri::XML(file)
XPATHS.transform_values { |query| doc.xpath(query).text.presence }
.compact
.tap do |metadata|
metadata[:package_dependencies] = extract_dependencies(doc)
metadata[:package_tags] = extract_tags(doc)
metadata[:package_types] = extract_package_types(doc)
end
end
def extract_dependencies(doc)
dependencies = []
doc.xpath(XPATH_DEPENDENCIES).each do |node|
dependencies << extract_dependency(node)
end
doc.xpath(XPATH_DEPENDENCY_GROUPS).each do |group_node|
target_framework = group_node.attr('targetFramework')
group_node.xpath('xmlns:dependency').each do |node|
dependencies << extract_dependency(node).merge(target_framework: target_framework)
end
end
dependencies
end
def extract_dependency(node)
{
name: node.attr('id'),
version: node.attr('version')
}.compact
end
def extract_tags(doc)
tags = doc.xpath(XPATH_TAGS).text
return [] if tags.blank?
tags.split(::Packages::Tag::NUGET_TAGS_SEPARATOR)
end
def extract_package_types(doc)
doc.xpath(XPATH_PACKAGE_TYPES).map { |node| node.attr('name') }.uniq
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::ExtractMetadataContentService, feature_category: :package_registry do
let(:nuspec_file_content) { fixture_file(nuspec_filepath) }
let(:service) { described_class.new(nuspec_file_content) }
describe '#execute' do
subject { service.execute.payload }
context 'with nuspec file content' do
context 'with dependencies' do
let(:nuspec_filepath) { 'packages/nuget/with_dependencies.nuspec' }
it { is_expected.to have_key(:package_dependencies) }
it 'extracts dependencies' do
dependencies = subject[:package_dependencies]
expect(dependencies).to include(name: 'Moqi', version: '2.5.6')
expect(dependencies).to include(name: 'Castle.Core')
expect(dependencies).to include(name: 'Test.Dependency', version: '2.3.7',
target_framework: '.NETStandard2.0')
expect(dependencies).to include(name: 'Newtonsoft.Json', version: '12.0.3',
target_framework: '.NETStandard2.0')
end
end
context 'with package types' do
let(:nuspec_filepath) { 'packages/nuget/with_package_types.nuspec' }
it { is_expected.to have_key(:package_types) }
it 'extracts package types' do
expect(subject[:package_types]).to include('SymbolsPackage')
end
end
context 'with a nuspec file with metadata' do
let(:nuspec_filepath) { 'packages/nuget/with_metadata.nuspec' }
it { expect(subject[:package_tags].sort).to eq(%w[foo bar test tag1 tag2 tag3 tag4 tag5].sort) }
end
end
context 'with a nuspec file content with metadata' do
let_it_be(:nuspec_filepath) { 'packages/nuget/with_metadata.nuspec' }
it 'returns the correct metadata' do
expected_metadata = {
authors: 'Author Test',
description: 'Description Test',
license_url: 'https://opensource.org/licenses/MIT',
project_url: 'https://gitlab.com/gitlab-org/gitlab',
icon_url: 'https://opensource.org/files/osi_keyhole_300X300_90ppi_0.png'
}
expect(subject.slice(*expected_metadata.keys)).to eq(expected_metadata)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class SearchService < BaseService
include ::Packages::FinderHelper
include Gitlab::Utils::StrongMemoize
include ActiveRecord::ConnectionAdapters::Quoting
MAX_PER_PAGE = 30
MAX_VERSIONS_PER_PACKAGE = 10
PRE_RELEASE_VERSION_MATCHING_TERM = '%-%'
DEFAULT_OPTIONS = {
include_prerelease_versions: true,
per_page: Kaminari.config.default_per_page,
padding: 0
}.freeze
def initialize(current_user, project_or_group, search_term, options = {})
@current_user = current_user
@project_or_group = project_or_group
@search_term = search_term
@options = DEFAULT_OPTIONS.merge(options)
raise ArgumentError, 'negative per_page' if per_page < 0
raise ArgumentError, 'negative padding' if padding < 0
end
def execute
Result.new(
total_count: non_paginated_matching_package_names.count,
results: search_packages
)
end
private
def search_packages
# custom query to get package names and versions as expected from the nuget search api
# See https://gitlab.com/gitlab-org/gitlab/-/merge_requests/24182#technical-notes
# and https://docs.microsoft.com/en-us/nuget/api/search-query-service-resource
subquery_name = :partition_subquery
arel_table = Arel::Table.new(subquery_name)
column_names = Packages::Package.column_names.map do |cn|
"#{subquery_name}.#{quote_column_name(cn)}"
end
# rubocop: disable CodeReuse/ActiveRecord
pkgs = Packages::Package
pkgs = pkgs.with(project_ids_cte.to_arel) if use_project_ids_cte?
pkgs = pkgs.select(column_names.join(','))
.from(package_names_partition, subquery_name)
.where(arel_table[:row_number].lteq(MAX_VERSIONS_PER_PACKAGE))
return pkgs if include_prerelease_versions?
# we can't use pkgs.without_version_like since we have a custom from
pkgs.where.not(arel_table[:version].matches(PRE_RELEASE_VERSION_MATCHING_TERM))
# rubocop: enable CodeReuse/ActiveRecord
end
def package_names_partition
# rubocop: disable CodeReuse/ActiveRecord
table_name = quote_table_name(Packages::Package.table_name)
name_column = "#{table_name}.#{quote_column_name('name')}"
created_at_column = "#{table_name}.#{quote_column_name('created_at')}"
select_sql = "ROW_NUMBER() OVER (PARTITION BY #{name_column} ORDER BY #{created_at_column} DESC) AS row_number, #{table_name}.*"
nuget_packages.select(select_sql)
.with_name(paginated_matching_package_names)
.where(project_id: project_ids)
# rubocop: enable CodeReuse/ActiveRecord
end
def paginated_matching_package_names
pkgs = base_matching_package_names
pkgs.page(0) # we're using a padding
.per(per_page)
.padding(padding)
end
def non_paginated_matching_package_names
# rubocop: disable CodeReuse/ActiveRecord
pkgs = base_matching_package_names
pkgs = pkgs.with(project_ids_cte.to_arel) if use_project_ids_cte?
pkgs
# rubocop: enable CodeReuse/ActiveRecord
end
def base_matching_package_names
# rubocop: disable CodeReuse/ActiveRecord
pkgs = nuget_packages.order_name
.select_distinct_name
.where(project_id: project_ids)
pkgs = pkgs.without_version_like(PRE_RELEASE_VERSION_MATCHING_TERM) unless include_prerelease_versions?
pkgs = pkgs.search_by_name(@search_term) if @search_term.present?
pkgs
# rubocop: enable CodeReuse/ActiveRecord
end
strong_memoize_attr :base_matching_package_names
def nuget_packages
Packages::Package.nuget
.displayable
.has_version
.without_nuget_temporary_name
end
def project_ids_cte
return unless use_project_ids_cte?
query = projects_visible_to_user(@current_user, within_group: @project_or_group)
Gitlab::SQL::CTE.new(:project_ids, query.select(:id))
end
strong_memoize_attr :project_ids_cte
def project_ids
return @project_or_group.id if project?
if use_project_ids_cte?
# rubocop: disable CodeReuse/ActiveRecord
Project.select(:id)
.from(project_ids_cte.table)
# rubocop: enable CodeReuse/ActiveRecord
end
end
def use_project_ids_cte?
group?
end
def project?
@project_or_group.is_a?(::Project)
end
def group?
@project_or_group.is_a?(::Group)
end
def include_prerelease_versions?
@options[:include_prerelease_versions]
end
def padding
@options[:padding]
end
def per_page
[@options[:per_page], MAX_PER_PAGE].min
end
class Result
include ActiveModel::Model
attr_accessor :results, :total_count
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::SearchService, feature_category: :package_registry do
let_it_be(:user) { create(:user) }
let_it_be(:group) { create(:group) }
let_it_be(:subgroup) { create(:group, parent: group) }
let_it_be(:project) { create(:project, namespace: subgroup) }
let_it_be_with_refind(:package_a) { create(:nuget_package, project: project, name: 'DummyPackageA') }
let_it_be(:packages_b) { create_list(:nuget_package, 5, project: project, name: 'DummyPackageB') }
let_it_be(:packages_c) { create_list(:nuget_package, 5, project: project, name: 'DummyPackageC') }
let_it_be(:package_d) { create(:nuget_package, project: project, name: 'FooBarD') }
let_it_be(:other_package_a) { create(:nuget_package, name: 'DummyPackageA') }
let_it_be(:other_package_a) { create(:nuget_package, name: 'DummyPackageB') }
let(:search_term) { 'ummy' }
let(:per_page) { 5 }
let(:padding) { 0 }
let(:include_prerelease_versions) { true }
let(:options) { { include_prerelease_versions: include_prerelease_versions, per_page: per_page, padding: padding } }
describe '#execute' do
subject { described_class.new(user, target, search_term, options).execute }
shared_examples 'handling all the conditions' do
it { expect_search_results 3, package_a, packages_b, packages_c }
context 'with a smaller per page count' do
let(:per_page) { 2 }
it { expect_search_results 3, package_a, packages_b }
end
context 'with 0 per page count' do
let(:per_page) { 0 }
it { expect_search_results 3, [] }
end
context 'with a negative per page count' do
let(:per_page) { -1 }
it { expect { subject }.to raise_error(ArgumentError, 'negative per_page') }
end
context 'with a padding' do
let(:padding) { 2 }
it { expect_search_results 3, packages_c }
end
context 'with a too big padding' do
let(:padding) { 5 }
it { expect_search_results 3, [] }
end
context 'with a negative padding' do
let(:padding) { -1 }
it { expect { subject }.to raise_error(ArgumentError, 'negative padding') }
end
context 'with search term' do
let(:search_term) { 'umm' }
it { expect_search_results 3, package_a, packages_b, packages_c }
end
context 'with nil search term' do
let(:search_term) { nil }
it { expect_search_results 4, package_a, packages_b, packages_c, package_d }
end
context 'with empty search term' do
let(:search_term) { '' }
it { expect_search_results 4, package_a, packages_b, packages_c, package_d }
end
context 'with non-displayable packages' do
let(:search_term) { '' }
before do
package_a.update_column(:status, 1)
end
it { expect_search_results 3, packages_b, packages_c, package_d }
end
context 'with prefix search term' do
let(:search_term) { 'dummy' }
it { expect_search_results 3, package_a, packages_b, packages_c }
end
context 'with suffix search term' do
let(:search_term) { 'packagec' }
it { expect_search_results 1, packages_c }
end
context 'with pre release packages' do
let_it_be(:package_e) { create(:nuget_package, project: project, name: 'DummyPackageE', version: '3.2.1-alpha') }
context 'including them' do
it { expect_search_results 4, package_a, packages_b, packages_c, package_e }
end
context 'excluding them' do
let(:include_prerelease_versions) { false }
it { expect_search_results 3, package_a, packages_b, packages_c }
context 'when mixed with release versions' do
let_it_be(:package_e_release) { create(:nuget_package, project: project, name: 'DummyPackageE', version: '3.2.1') }
it { expect_search_results 4, package_a, packages_b, packages_c, package_e_release }
end
end
end
end
context 'with project' do
let(:target) { project }
before do
project.add_developer(user)
end
it_behaves_like 'handling all the conditions'
end
context 'with subgroup' do
let(:target) { subgroup }
before do
subgroup.add_developer(user)
end
it_behaves_like 'handling all the conditions'
end
context 'with group' do
let(:target) { group }
before do
group.add_developer(user)
end
it_behaves_like 'handling all the conditions'
end
def expect_search_results(total_count, *results)
search = subject
expect(search.total_count).to eq total_count
expect(search.results).to match_array(Array.wrap(results).flatten)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class SyncMetadatumService
include Gitlab::Utils::StrongMemoize
def initialize(package, metadata)
@package = package
@metadata = metadata
end
def execute
if blank_metadata?
metadatum.destroy! if metadatum.persisted?
else
metadatum.update!(
authors: authors,
description: description,
license_url: license_url,
project_url: project_url,
icon_url: icon_url
)
end
end
private
attr_reader :package, :metadata
def metadatum
package.nuget_metadatum || package.build_nuget_metadatum
end
strong_memoize_attr :metadatum
def blank_metadata?
[authors, description, project_url, license_url, icon_url].all?(&:blank?)
end
def authors
truncate_value(:authors, ::Packages::Nuget::Metadatum::MAX_AUTHORS_LENGTH)
end
strong_memoize_attr :authors
def description
truncate_value(:description, ::Packages::Nuget::Metadatum::MAX_DESCRIPTION_LENGTH)
end
strong_memoize_attr :description
def project_url
metadata[:project_url]
end
def license_url
metadata[:license_url]
end
def icon_url
metadata[:icon_url]
end
def truncate_value(field, max_length)
return unless metadata[field]
if metadata[field].size > max_length
log_info("#{field.capitalize} is too long (maximum is #{max_length} characters)", field)
end
metadata[field].truncate(max_length)
end
def log_info(message, field)
Gitlab::AppLogger.info(
class: self.class.name,
message: message,
package_id: package.id,
project_id: package.project_id,
field => metadata[field]
)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::SyncMetadatumService, feature_category: :package_registry do
let_it_be(:package, reload: true) { create(:nuget_package) }
let_it_be(:metadata) do
{
authors: 'Package authors',
description: 'Package description',
project_url: 'https://test.org/test',
license_url: 'https://test.org/MIT',
icon_url: 'https://test.org/icon.png'
}
end
let(:service) { described_class.new(package, metadata) }
let(:nuget_metadatum) { package.nuget_metadatum }
describe '#execute' do
subject { service.execute }
RSpec.shared_examples 'saving metadatum attributes' do
it 'saves nuget metadatum' do
subject
metadata.each do |attribute, expected_value|
expect(nuget_metadatum.send(attribute)).to eq(expected_value)
end
end
end
it 'creates a nuget metadatum' do
expect { subject }
.to change { package.nuget_metadatum.present? }.from(false).to(true)
end
it_behaves_like 'saving metadatum attributes'
context 'with exisiting nuget metadatum' do
let_it_be(:package) { create(:nuget_package, :with_metadatum) }
it 'does not create a nuget metadatum' do
expect { subject }.to change { ::Packages::Nuget::Metadatum.count }.by(0)
end
it_behaves_like 'saving metadatum attributes'
context 'with empty metadata' do
let_it_be(:metadata) { {} }
it 'destroys the nuget metadatum' do
expect { subject }
.to change { package.reload.nuget_metadatum.present? }.from(true).to(false)
end
end
end
context 'with metadata containing only authors and description' do
let_it_be(:metadata) { { authors: 'Package authors 2', description: 'Package description 2' } }
it 'updates the nuget metadatum' do
subject
expect(nuget_metadatum.authors).to eq('Package authors 2')
expect(nuget_metadatum.description).to eq('Package description 2')
end
end
context 'with too long metadata' do
let(:metadata) { super().merge(authors: 'a' * 260, description: 'a' * 4010) }
let(:max_authors_length) { ::Packages::Nuget::Metadatum::MAX_AUTHORS_LENGTH }
let(:max_description_length) { ::Packages::Nuget::Metadatum::MAX_DESCRIPTION_LENGTH }
it 'truncates authors and description to the maximum length and logs its info' do
%i[authors description].each do |field|
expect(Gitlab::AppLogger).to receive(:info).with(
class: described_class.name,
package_id: package.id,
project_id: package.project_id,
message: "#{field.capitalize} is too long (maximum is #{send("max_#{field}_length")} characters)",
field => metadata[field]
)
end
subject
expect(nuget_metadatum.authors.size).to eq(max_authors_length)
expect(nuget_metadatum.description.size).to eq(max_description_length)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class OdataPackageEntryService
include API::Helpers::RelatedResourcesHelpers
def initialize(project, params)
@project = project
@params = params
end
def execute
ServiceResponse.success(payload: package_entry)
end
private
attr_reader :project, :params
def package_entry
<<-XML.squish
<entry xmlns='http://www.w3.org/2005/Atom' xmlns:d='http://schemas.microsoft.com/ado/2007/08/dataservices' xmlns:georss='http://www.georss.org/georss' xmlns:gml='http://www.opengis.net/gml' xmlns:m='http://schemas.microsoft.com/ado/2007/08/dataservices/metadata' xml:base="#{xml_base}">
<id>#{id_url}</id>
<category term='V2FeedPackage' scheme='http://schemas.microsoft.com/ado/2007/08/dataservices/scheme'/>
<title type='text'>#{params[:package_name]}</title>
<content type='application/zip' src="#{download_url}"/>
<m:properties>
<d:Version>#{params[:package_version]}</d:Version>
</m:properties>
</entry>
XML
end
def id_url
expose_url "#{api_v4_projects_packages_nuget_v2_path(id: project.id)}" \
"/Packages(Id='#{params[:package_name]}',Version='#{params[:package_version]}')"
end
def download_url
if params[:package_version].present?
expose_url api_v4_projects_packages_nuget_download_package_name_package_version_package_filename_path(
{
id: project.id,
package_name: params[:package_name],
package_version: params[:package_version],
package_filename: file_name
},
true
)
else
xml_base
end
end
def xml_base
expose_url api_v4_projects_packages_nuget_v2_path(id: project.id)
end
def file_name
"#{params[:package_name]}.#{params[:package_version]}.nupkg"
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::OdataPackageEntryService, feature_category: :package_registry do
include GrapePathHelpers::NamedRouteMatcher
let_it_be(:project) { build_stubbed(:project) }
let_it_be(:params) { { package_name: 'dummy', package_version: '1.0.0' } }
let(:doc) { Nokogiri::XML(subject.payload) }
subject { described_class.new(project, params).execute }
describe '#execute' do
shared_examples 'returning a package entry with the correct attributes' do |pkg_version = ''|
it 'returns a package entry with the correct attributes' do
expect(doc.root.name).to eq('entry')
expect(doc_node('id').text).to include(
id_url(project.id, params[:package_name], pkg_version)
)
expect(doc_node('title').text).to eq(params[:package_name])
expect(doc_node('content').attr('src')).to include(
content_url(project.id, params[:package_name], pkg_version)
)
expect(doc_node('Version').text).to eq(pkg_version)
end
end
context 'when package_version is present' do
it 'returns a success ServiceResponse' do
expect(subject).to be_success
end
it_behaves_like 'returning a package entry with the correct attributes', '1.0.0'
end
context 'when package_version is not present' do
let(:params) { { package_name: 'dummy', package_version: nil } }
it 'returns a success ServiceResponse' do
expect(subject).to be_success
end
it_behaves_like 'returning a package entry with the correct attributes'
end
end
def doc_node(name)
doc.css('*').detect { |el| el.name == name }
end
def id_url(id, package_name, package_version)
"api/v4/projects/#{id}/packages/nuget/v2/Packages(Id='#{package_name}',Version='#{package_version}')"
end
def content_url(id, package_name, package_version)
if package_version.present?
filename = "#{package_name}.#{package_version}.nupkg"
api_v4_projects_packages_nuget_download_package_name_package_version_package_filename_path(
{ id: id, package_name: package_name, package_version: package_version, package_filename: filename }, true
)
else
api_v4_projects_packages_nuget_v2_path(id: id)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class UpdatePackageFromMetadataService
include Gitlab::Utils::StrongMemoize
include ExclusiveLeaseGuard
# used by ExclusiveLeaseGuard
DEFAULT_LEASE_TIMEOUT = 1.hour.to_i.freeze
SYMBOL_PACKAGE_IDENTIFIER = 'SymbolsPackage'
INVALID_METADATA_ERROR_MESSAGE = 'package name, version, authors and/or description not found in metadata'
INVALID_METADATA_ERROR_SYMBOL_MESSAGE = 'package name, version and/or description not found in metadata'
MISSING_MATCHING_PACKAGE_ERROR_MESSAGE = 'symbol package is invalid, matching package does not exist'
InvalidMetadataError = ZipError = Class.new(StandardError)
def initialize(package_file, package_zip_file)
@package_file = package_file
@package_zip_file = package_zip_file
end
def execute
unless valid_metadata?
error_message = symbol_package? ? INVALID_METADATA_ERROR_SYMBOL_MESSAGE : INVALID_METADATA_ERROR_MESSAGE
raise InvalidMetadataError, error_message
end
try_obtain_lease do
@package_file.transaction do
process_package_update
end
end
rescue ActiveRecord::RecordInvalid => e
raise InvalidMetadataError, e.message
rescue Zip::Error
raise ZipError, 'Could not open the .nupkg file'
end
private
def process_package_update
package_to_destroy = nil
target_package = @package_file.package
if existing_package
package_to_destroy = @package_file.package
target_package = existing_package
else
if symbol_package?
raise InvalidMetadataError, MISSING_MATCHING_PACKAGE_ERROR_MESSAGE
end
update_linked_package
end
build_infos = package_to_destroy&.build_infos || []
update_package(target_package, build_infos)
create_symbol_files
::Packages::UpdatePackageFileService.new(@package_file, package_id: target_package.id, file_name: package_filename)
.execute
package_to_destroy&.destroy!
end
def update_package(package, build_infos)
return if symbol_package?
::Packages::Nuget::SyncMetadatumService
.new(package, metadata.slice(:authors, :description, :project_url, :license_url, :icon_url))
.execute
::Packages::UpdateTagsService
.new(package, package_tags)
.execute
package.build_infos << build_infos if build_infos.any?
rescue StandardError => e
raise InvalidMetadataError, e.message
end
def create_symbol_files
return unless symbol_package?
::Packages::Nuget::Symbols::CreateSymbolFilesService
.new(existing_package, @package_zip_file)
.execute
end
def valid_metadata?
fields = [package_name, package_version, package_description]
fields << package_authors unless symbol_package?
fields.all?(&:present?)
end
def update_linked_package
@package_file.package.update!(
name: package_name,
version: package_version,
status: :default
)
::Packages::Nuget::CreateDependencyService.new(@package_file.package, package_dependencies)
.execute
@package_file.package
end
def existing_package
::Packages::Nuget::PackageFinder
.new(
nil,
@package_file.project,
package_name: package_name,
package_version: package_version
)
.execute
.first
end
strong_memoize_attr :existing_package
def package_name
metadata[:package_name]
end
def package_version
metadata[:package_version]
end
def package_dependencies
metadata.fetch(:package_dependencies, [])
end
def package_tags
metadata.fetch(:package_tags, [])
end
def package_types
metadata.fetch(:package_types, [])
end
def package_authors
metadata[:authors]
end
def package_description
metadata[:description]
end
def symbol_package?
package_types.include?(SYMBOL_PACKAGE_IDENTIFIER)
end
strong_memoize_attr :symbol_package?
def metadata
::Packages::Nuget::MetadataExtractionService.new(@package_zip_file).execute.payload
end
strong_memoize_attr :metadata
def package_filename
"#{package_name.downcase}.#{package_version.downcase}.#{symbol_package? ? 'snupkg' : 'nupkg'}"
end
# used by ExclusiveLeaseGuard
def lease_key
package_id = existing_package ? existing_package.id : @package_file.package_id
"packages:nuget:update_package_from_metadata_service:package:#{package_id}"
end
# used by ExclusiveLeaseGuard
def lease_timeout
DEFAULT_LEASE_TIMEOUT
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::UpdatePackageFromMetadataService, :clean_gitlab_redis_shared_state, feature_category: :package_registry do
include ExclusiveLeaseHelpers
let!(:package) { create(:nuget_package, :processing, :with_symbol_package, :with_build) }
let(:package_file) { package.package_files.first }
let(:package_zip_file) { Zip::File.new(package_file.file) }
let(:service) { described_class.new(package_file, package_zip_file) }
let(:package_name) { 'DummyProject.DummyPackage' }
let(:package_version) { '1.0.0' }
let(:package_file_name) { 'dummyproject.dummypackage.1.0.0.nupkg' }
shared_examples 'raising an' do |error_class, with_message:|
it "raises an #{error_class}" do
expect { subject }.to raise_error(error_class, with_message)
end
end
describe '#execute' do
using RSpec::Parameterized::TableSyntax
subject { service.execute }
shared_examples 'taking the lease' do
before do
allow(service).to receive(:lease_release?).and_return(false)
end
it 'takes the lease' do
expect(service).to receive(:try_obtain_lease).and_call_original
subject
expect(service.exclusive_lease.exists?).to be_truthy
end
end
shared_examples 'not updating the package if the lease is taken' do
context 'without obtaining the exclusive lease' do
let(:lease_key) { "packages:nuget:update_package_from_metadata_service:package:#{package_id}" }
let(:metadata) { { package_name: package_name, package_version: package_version, authors: 'author1, author2', description: 'test description' } }
let(:package_from_package_file) { package_file.package }
before do
stub_exclusive_lease_taken(lease_key, timeout: 1.hour)
# to allow the above stub, we need to stub the metadata function as the
# original implementation will try to get an exclusive lease on the
# file in object storage
allow(service).to receive(:metadata).and_return(metadata)
end
it 'does not update the package', :aggregate_failures do
expect(service).to receive(:try_obtain_lease).and_call_original
expect { subject }
.to change { ::Packages::Package.count }.by(0)
.and change { Packages::DependencyLink.count }.by(0)
expect(package_file.reload.file_name).not_to eq(package_file_name)
expect(package_file.package).to be_processing
expect(package_file.package.reload.name).not_to eq(package_name)
expect(package_file.package.version).not_to eq(package_version)
end
end
end
context 'with no existing package' do
let(:package_id) { package.id }
it 'updates package and package file and creates metadatum', :aggregate_failures do
expect { subject }
.to not_change { ::Packages::Package.count }
.and change { Packages::Dependency.count }.by(1)
.and change { Packages::DependencyLink.count }.by(1)
.and change { ::Packages::Nuget::Metadatum.count }.by(1)
expect(package.reload.name).to eq(package_name)
expect(package.version).to eq(package_version)
expect(package).to be_default
expect(package_file.reload.file_name).to eq(package_file_name)
# hard reset needed to properly reload package_file.file
expect(Packages::PackageFile.find(package_file.id).file.size).not_to eq 0
end
it_behaves_like 'taking the lease'
it_behaves_like 'not updating the package if the lease is taken'
end
context 'with existing package' do
let!(:existing_package) { create(:nuget_package, project: package.project, name: package_name, version: package_version) }
let(:package_id) { existing_package.id }
it 'link existing package and updates package file', :aggregate_failures do
expect(service).to receive(:try_obtain_lease).and_call_original
expect { subject }
.to change { ::Packages::Package.count }.by(-1)
.and change { Packages::Dependency.count }.by(0)
.and change { Packages::DependencyLink.count }.by(0)
.and change { Packages::Nuget::DependencyLinkMetadatum.count }.by(0)
.and change { ::Packages::Nuget::Metadatum.count }.by(1)
.and change { existing_package.build_infos.count }.by(1)
expect(package_file.reload.file_name).to eq(package_file_name)
expect(package_file.package).to eq(existing_package)
end
it_behaves_like 'taking the lease'
it_behaves_like 'not updating the package if the lease is taken'
context 'marked as pending_destruction' do
before do
existing_package.pending_destruction!
end
it 'reuses the processing package', :aggregate_failures do
expect { subject }
.to not_change { ::Packages::Package.count }
.and change { Packages::Dependency.count }.by(1)
.and change { Packages::DependencyLink.count }.by(1)
.and change { ::Packages::Nuget::Metadatum.count }.by(1)
end
end
end
context 'with a nuspec file with metadata' do
let(:nuspec_filepath) { 'packages/nuget/with_metadata.nuspec' }
let(:expected_tags) { %w[foo bar test tag1 tag2 tag3 tag4 tag5] }
before do
allow_next_instance_of(Packages::Nuget::MetadataExtractionService) do |service|
allow(service)
.to receive(:nuspec_file_content).and_return(fixture_file(nuspec_filepath))
end
end
it 'creates tags' do
expect(service).to receive(:try_obtain_lease).and_call_original
expect { subject }.to change { ::Packages::Tag.count }.by(8)
expect(package.reload.tags.map(&:name)).to contain_exactly(*expected_tags)
end
context 'with existing package and tags' do
let!(:existing_package) { create(:nuget_package, project: package.project, name: 'DummyProject.WithMetadata', version: '1.2.3') }
let!(:tag1) { create(:packages_tag, package: existing_package, name: 'tag1') }
let!(:tag2) { create(:packages_tag, package: existing_package, name: 'tag2') }
let!(:tag3) { create(:packages_tag, package: existing_package, name: 'tag_not_in_metadata') }
it 'creates tags and deletes those not in metadata' do
expect(service).to receive(:try_obtain_lease).and_call_original
expect { subject }.to change { ::Packages::Tag.count }.by(5)
expect(existing_package.tags.map(&:name)).to contain_exactly(*expected_tags)
end
end
it 'creates nuget metadatum', :aggregate_failures do
expect { subject }
.to not_change { ::Packages::Package.count }
.and change { ::Packages::Nuget::Metadatum.count }.by(1)
metadatum = package_file.reload.package.nuget_metadatum
expect(metadatum.authors).to eq('Author Test')
expect(metadatum.description).to eq('Description Test')
expect(metadatum.license_url).to eq('https://opensource.org/licenses/MIT')
expect(metadatum.project_url).to eq('https://gitlab.com/gitlab-org/gitlab')
expect(metadatum.icon_url).to eq('https://opensource.org/files/osi_keyhole_300X300_90ppi_0.png')
end
context 'with too long url' do
let_it_be(:too_long_url) { "http://localhost/#{'bananas' * 50}" }
let(:metadata) { { package_name: package_name, package_version: package_version, authors: 'Author Test', description: 'Description Test', license_url: too_long_url } }
before do
allow(service).to receive(:metadata).and_return(metadata)
end
it_behaves_like 'raising an', described_class::InvalidMetadataError, with_message: /Validation failed: License url is too long/
end
context 'without authors or description' do
%i[authors description].each do |property|
context "for #{property}" do
let(:metadata) { { package_name: package_name, package_version: package_version, property => nil } }
before do
allow(service).to receive(:metadata).and_return(metadata)
end
it_behaves_like 'raising an', described_class::InvalidMetadataError, with_message: described_class::INVALID_METADATA_ERROR_MESSAGE
end
end
end
end
context 'with nuspec file with dependencies' do
let(:nuspec_filepath) { 'packages/nuget/with_dependencies.nuspec' }
let(:package_name) { 'Test.Package' }
let(:package_version) { '3.5.2' }
let(:package_file_name) { 'test.package.3.5.2.nupkg' }
before do
allow_next_instance_of(Packages::Nuget::MetadataExtractionService) do |service|
allow(service)
.to receive(:nuspec_file_content).and_return(fixture_file(nuspec_filepath))
end
end
it 'updates package and package file', :aggregate_failures do
expect { subject }
.to not_change { ::Packages::Package.count }
.and change { Packages::Dependency.count }.by(4)
.and change { Packages::DependencyLink.count }.by(4)
.and change { Packages::Nuget::DependencyLinkMetadatum.count }.by(2)
expect(package.reload.name).to eq(package_name)
expect(package.version).to eq(package_version)
expect(package).to be_default
expect(package_file.reload.file_name).to eq(package_file_name)
# hard reset needed to properly reload package_file.file
expect(Packages::PackageFile.find(package_file.id).file.size).not_to eq 0
end
end
context 'with package file not containing a nuspec file' do
before do
allow_next_instance_of(Zip::File) do |file|
allow(file).to receive(:glob).and_return([])
end
end
it_behaves_like 'raising an', ::Packages::Nuget::ExtractMetadataFileService::ExtractionError, with_message: 'nuspec file not found'
end
context 'with a symbol package' do
let(:package_file) { package.package_files.last }
let(:package_file_name) { 'dummyproject.dummypackage.1.0.0.snupkg' }
context 'with no existing package' do
let(:package_id) { package.id }
it_behaves_like 'raising an', described_class::InvalidMetadataError, with_message: described_class::MISSING_MATCHING_PACKAGE_ERROR_MESSAGE
end
context 'with existing package' do
let!(:existing_package) { create(:nuget_package, project: package.project, name: package_name, version: package_version) }
let(:package_id) { existing_package.id }
let(:package_zip_file) do
Zip::File.open(package_file.file.path) do |zipfile|
zipfile.add('package.pdb', expand_fixture_path('packages/nuget/symbol/package.pdb'))
zipfile
end
end
it 'link existing package and updates package file', :aggregate_failures do
expect(service).to receive(:try_obtain_lease).and_call_original
expect(::Packages::Nuget::SyncMetadatumService).not_to receive(:new)
expect(::Packages::UpdateTagsService).not_to receive(:new)
expect_next_instance_of(Packages::Nuget::Symbols::CreateSymbolFilesService, existing_package, package_zip_file) do |service|
expect(service).to receive(:execute).and_call_original
end
expect { subject }
.to change { ::Packages::Package.count }.by(-1)
.and change { Packages::Dependency.count }.by(0)
.and change { Packages::DependencyLink.count }.by(0)
.and change { Packages::Nuget::DependencyLinkMetadatum.count }.by(0)
.and change { ::Packages::Nuget::Metadatum.count }.by(0)
.and change { existing_package.nuget_symbols.count }.by(1)
expect(package_file.reload.file_name).to eq(package_file_name)
expect(package_file.package).to eq(existing_package)
end
it_behaves_like 'taking the lease'
it_behaves_like 'not updating the package if the lease is taken'
end
end
context 'with an invalid package name' do
invalid_name_error_msg = 'Validation failed: Name is invalid'
where(:invalid_name, :error_message) do
'' | described_class::INVALID_METADATA_ERROR_MESSAGE
'My/package' | invalid_name_error_msg
'../../../my_package' | invalid_name_error_msg
'%2e%2e%2fmy_package' | invalid_name_error_msg
end
with_them do
before do
allow(service).to receive(:package_name).and_return(invalid_name)
end
it_behaves_like 'raising an', described_class::InvalidMetadataError, with_message: params[:error_message]
end
end
context 'with an invalid package version' do
invalid_version_error_msg = 'Validation failed: Version is invalid'
where(:invalid_version, :error_message) do
'' | described_class::INVALID_METADATA_ERROR_MESSAGE
'555' | invalid_version_error_msg
'1./2.3' | invalid_version_error_msg
'../../../../../1.2.3' | invalid_version_error_msg
'%2e%2e%2f1.2.3' | invalid_version_error_msg
end
with_them do
before do
allow(service).to receive(:package_version).and_return(invalid_version)
end
it_behaves_like 'raising an', described_class::InvalidMetadataError, with_message: params[:error_message]
end
end
context 'with an invalid zip file' do
before do
allow_next_instance_of(::Packages::Nuget::MetadataExtractionService) do |instance|
allow(instance).to receive(:execute).and_raise(Zip::Error)
end
end
it_behaves_like 'raising an', described_class::ZipError, with_message: 'Could not open the .nupkg file'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class CheckDuplicatesService < BaseService
include Gitlab::Utils::StrongMemoize
ExtractionError = Class.new(StandardError)
def execute
return ServiceResponse.success if package_settings_allow_duplicates? || !target_package_is_duplicate?
ServiceResponse.error(
message: 'A package with the same name and version already exists',
reason: :conflict
)
rescue ExtractionError => e
ServiceResponse.error(message: e.message, reason: :bad_request)
end
private
def package_settings_allow_duplicates?
package_settings.nuget_duplicates_allowed? || package_settings.class.duplicates_allowed?(existing_package)
end
def target_package_is_duplicate?
existing_package.name.casecmp(metadata[:package_name]) == 0 &&
(existing_package.version.casecmp(metadata[:package_version]) == 0 ||
existing_package.normalized_nuget_version&.casecmp(metadata[:package_version]) == 0)
end
def package_settings
project.namespace.package_settings
end
strong_memoize_attr :package_settings
def existing_package
::Packages::Nuget::PackageFinder
.new(
current_user,
project,
package_name: metadata[:package_name],
package_version: metadata[:package_version]
)
.execute
.first
end
strong_memoize_attr :existing_package
def metadata
if params[:remote_url].present?
::Packages::Nuget::ExtractMetadataContentService
.new(nuspec_file_content)
.execute
.payload
else # to cover the case when package file is on disk not in object storage
Zip::InputStream.open(params[:file]) do |zip|
::Packages::Nuget::MetadataExtractionService
.new(zip)
.execute
.payload
end
end
end
strong_memoize_attr :metadata
def nuspec_file_content
::Packages::Nuget::ExtractRemoteMetadataFileService
.new(params[:remote_url])
.execute
.payload
rescue ::Packages::Nuget::ExtractRemoteMetadataFileService::ExtractionError => e
raise ExtractionError, e.message
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::CheckDuplicatesService, feature_category: :package_registry do
let_it_be(:project) { create(:project) }
let_it_be(:user) { create(:user) }
let_it_be(:file_name) { 'package.nupkg' }
let(:params) do
{
file_name: file_name,
file: File.open(expand_fixture_path('packages/nuget/package.nupkg'))
}
end
let(:service) { described_class.new(project, user, params) }
describe '#execute' do
subject(:execute) { service.execute }
shared_examples 'returning error' do |reason:, message:|
it 'returns an error' do
response = execute
expect(response.status).to eq(:error)
expect(response.reason).to eq(reason)
expect(response.message).to eq(message)
end
end
shared_examples 'returning success' do
it 'returns success' do
response = execute
expect(response.status).to eq(:success)
end
end
shared_examples 'handling duplicates disallowed when package exists' do
it_behaves_like 'returning error', reason: :conflict,
message: 'A package with the same name and version already exists'
context 'with nuget_duplicate_exception_regex' do
before do
package_settings.update_column(:nuget_duplicate_exception_regex, ".*#{existing_package.name.last(3)}.*")
end
it_behaves_like 'returning success'
end
end
context 'with existing package' do
let_it_be(:existing_package) { create(:nuget_package, :with_metadatum, project: project, version: '1.7.15.0') }
let_it_be(:metadata) do
{
package_name: existing_package.name,
package_version: existing_package.version,
authors: 'authors',
description: 'description'
}
end
context 'when nuget duplicates are allowed' do
before do
allow_next_instance_of(Namespace::PackageSetting) do |instance|
allow(instance).to receive(:nuget_duplicates_allowed?).and_return(true)
end
end
it_behaves_like 'returning success'
end
context 'when nuget duplicates are not allowed' do
let!(:package_settings) do
create(:namespace_package_setting, :group, namespace: project.namespace, nuget_duplicates_allowed: false)
end
context 'when package file is in object storage' do
let(:params) { super().merge(remote_url: 'https://example.com') }
before do
allow_next_instance_of(::Packages::Nuget::ExtractRemoteMetadataFileService) do |instance|
allow(instance).to receive(:execute)
.and_return(ServiceResponse.success(payload: Nokogiri::XML::Document.new))
end
allow_next_instance_of(::Packages::Nuget::ExtractMetadataContentService) do |instance|
allow(instance).to receive(:execute).and_return(ServiceResponse.success(payload: metadata))
end
end
it_behaves_like 'handling duplicates disallowed when package exists'
context 'when ExtractRemoteMetadataFileService raises ExtractionError' do
before do
allow_next_instance_of(::Packages::Nuget::ExtractRemoteMetadataFileService) do |instance|
allow(instance).to receive(:execute).and_raise(
::Packages::Nuget::ExtractRemoteMetadataFileService::ExtractionError, 'nuspec file not found'
)
end
end
it_behaves_like 'returning error', reason: :bad_request, message: 'nuspec file not found'
end
context 'when version is normalized' do
let(:metadata) { super().merge(package_version: '1.7.15') }
it_behaves_like 'handling duplicates disallowed when package exists'
end
end
context 'when package file is on disk' do
before do
allow_next_instance_of(::Packages::Nuget::MetadataExtractionService) do |instance|
allow(instance).to receive(:execute).and_return(ServiceResponse.success(payload: metadata))
end
end
it_behaves_like 'handling duplicates disallowed when package exists'
end
end
end
context 'with non existing package' do
let_it_be(:metadata) do
{ package_name: 'foo', package_version: '1.0.0', authors: 'author', description: 'description' }
end
before do
allow_next_instance_of(::Packages::Nuget::MetadataExtractionService) do |instance|
allow(instance).to receive(:execute).and_return(ServiceResponse.success(payload: metadata))
end
end
context 'when nuget duplicates are allowed' do
let_it_be(:package_settings) do
create(:namespace_package_setting, :group, namespace: project.namespace, nuget_duplicates_allowed: true)
end
it_behaves_like 'returning success'
end
context 'when nuget duplicates are not allowed' do
let_it_be(:package_settings) do
create(:namespace_package_setting, :group, namespace: project.namespace, nuget_duplicates_allowed: false)
end
it_behaves_like 'returning success'
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class ProcessPackageFileService
ExtractionError = Class.new(StandardError)
def initialize(package_file)
@package_file = package_file
end
def execute
raise ExtractionError, 'invalid package file' unless valid_package_file?
with_zip_file do |zip_file|
::Packages::Nuget::UpdatePackageFromMetadataService.new(package_file, zip_file).execute
end
end
private
attr_reader :package_file
def valid_package_file?
package_file && package_file.package&.nuget? && !package_file.file.empty_size?
end
def with_zip_file(&block)
package_file.file.use_open_file(unlink_early: false) do |open_file|
Zip::File.open(open_file.file_path, &block) # rubocop: disable Performance/Rubyzip
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::ProcessPackageFileService, feature_category: :package_registry do
let_it_be(:package_file) { build(:package_file, :nuget) }
let(:service) { described_class.new(package_file) }
describe '#execute' do
subject { service.execute }
shared_examples 'raises an error' do |error_message|
it { expect { subject }.to raise_error(described_class::ExtractionError, error_message) }
end
context 'with valid package file' do
it 'calls the UpdatePackageFromMetadataService' do
expect_next_instance_of(Packages::Nuget::UpdatePackageFromMetadataService, package_file,
instance_of(Zip::File)) do |service|
expect(service).to receive(:execute)
end
subject
end
end
context 'with invalid package file' do
let(:package_file) { nil }
it_behaves_like 'raises an error', 'invalid package file'
end
context 'when linked to a non nuget package' do
before do
package_file.package.maven!
end
it_behaves_like 'raises an error', 'invalid package file'
end
context 'with a 0 byte package file' do
before do
allow_next_instance_of(Packages::PackageFileUploader) do |instance|
allow(instance).to receive(:size).and_return(0)
end
end
it_behaves_like 'raises an error', 'invalid package file'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
class CreateDependencyService < BaseService
def initialize(package, dependencies = [])
@package = package
@dependencies = dependencies
end
def execute
return if @dependencies.empty?
@package.transaction do
create_dependency_links
create_dependency_link_metadata
end
end
private
def create_dependency_links
::Packages::CreateDependencyService
.new(@package, dependencies_for_create_dependency_service)
.execute
end
def create_dependency_link_metadata
inserted_links = ::Packages::DependencyLink.preload_dependency
.for_package(@package)
return if inserted_links.empty?
rows = inserted_links.map do |dependency_link|
raw_dependency = raw_dependency_for(dependency_link.dependency)
next if raw_dependency[:target_framework].blank?
{
dependency_link_id: dependency_link.id,
target_framework: raw_dependency[:target_framework]
}
end
::ApplicationRecord.legacy_bulk_insert(::Packages::Nuget::DependencyLinkMetadatum.table_name, rows.compact) # rubocop:disable Gitlab/BulkInsert
end
def raw_dependency_for(dependency)
name = dependency.name
version = dependency.version_pattern.presence
@dependencies.find do |raw_dependency|
raw_dependency[:name] == name && raw_dependency[:version] == version
end
end
def dependencies_for_create_dependency_service
names_and_versions = @dependencies.to_h do |dependency|
[dependency[:name], version_or_empty_string(dependency[:version])]
end
{ 'dependencies' => names_and_versions }
end
def version_or_empty_string(version)
return '' if version.blank?
version
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::CreateDependencyService, feature_category: :package_registry do
let_it_be(:package, reload: true) { create(:nuget_package) }
describe '#execute' do
RSpec.shared_examples 'creating dependencies, links and nuget metadata for' do |expected_dependency_names, dependency_count, dependency_link_count|
let(:dependencies_with_metadata) { dependencies.select { |dep| dep[:target_framework].present? } }
it 'creates dependencies, links and nuget metadata' do
expect { subject }
.to change { Packages::Dependency.count }.by(dependency_count)
.and change { Packages::DependencyLink.count }.by(dependency_link_count)
.and change { Packages::Nuget::DependencyLinkMetadatum.count }.by(dependencies_with_metadata.size)
expect(expected_dependency_names).to contain_exactly(*dependency_names)
expect(package.dependency_links.map(&:dependency_type).uniq).to contain_exactly('dependencies')
dependencies_with_metadata.each do |dependency|
name = dependency[:name]
version_pattern = service.send(:version_or_empty_string, dependency[:version])
metadatum = package.dependency_links.joins(:dependency)
.find_by(packages_dependencies: { name: name, version_pattern: version_pattern })
.nuget_metadatum
expect(metadatum.target_framework).to eq dependency[:target_framework]
end
end
end
let_it_be(:dependencies) do
[
{ name: 'Moqi', version: '2.5.6' },
{ name: 'Castle.Core' },
{ name: 'Test.Dependency', version: '2.3.7', target_framework: '.NETStandard2.0' },
{ name: 'Newtonsoft.Json', version: '12.0.3', target_framework: '.NETStandard2.0' }
]
end
let(:dependency_names) { package.dependency_links.flat_map(&:dependency).map(&:name) }
let(:service) { described_class.new(package, dependencies) }
subject { service.execute }
it_behaves_like 'creating dependencies, links and nuget metadata for', %w[Castle.Core Moqi Newtonsoft.Json Test.Dependency], 4, 4
context 'with existing dependencies' do
let_it_be(:exisiting_dependency) { create(:packages_dependency, name: 'Moqi', version_pattern: '2.5.6') }
it_behaves_like 'creating dependencies, links and nuget metadata for', %w[Castle.Core Moqi Newtonsoft.Json Test.Dependency], 3, 4
end
context 'with dependencies with no target framework' do
let_it_be(:dependencies) do
[
{ name: 'Moqi', version: '2.5.6' },
{ name: 'Castle.Core' },
{ name: 'Test.Dependency', version: '2.3.7' },
{ name: 'Newtonsoft.Json', version: '12.0.3' }
]
end
it_behaves_like 'creating dependencies, links and nuget metadata for', %w[Castle.Core Moqi Newtonsoft.Json Test.Dependency], 4, 4
end
context 'with empty dependencies' do
let_it_be(:dependencies) { [] }
it 'is a no op' do
expect(service).not_to receive(:create_dependency_links)
expect(service).not_to receive(:create_dependency_link_metadata)
subject
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
module Symbols
class ExtractSignatureAndChecksumService
include Gitlab::Utils::StrongMemoize
# More information about the GUID format can be found here:
# https://github.com/dotnet/symstore/blob/main/docs/specs/SSQP_Key_Conventions.md#key-formatting-basic-rules
GUID_START_INDEX = 7
GUID_END_INDEX = 26
SIGNATURE_LENGTH = 16
TWENTY_ZEROED_BYTES = "\u0000" * 20
GUID_PARTS_LENGTHS = [4, 2, 2, 8].freeze
GUID_AGE_PART = 'FFFFFFFF'
TWO_CHARACTER_HEX_REGEX = /\h{2}/
GUID_CHUNK_SIZE = 256.bytes
SHA_CHUNK_SIZE = 16.kilobytes
# The extraction of the signature in this service is based on the following documentation:
# https://github.com/dotnet/symstore/blob/main/docs/specs/SSQP_Key_Conventions.md#portable-pdb-signature
def initialize(file)
@file = file
end
def execute
return error_response unless signature
ServiceResponse.success(payload: { signature: signature, checksum: checksum })
end
private
attr_reader :file
def signature
return unless pdb_id
# Convert the GUID into an array of two-character hex strings
guid = pdb_id.first(SIGNATURE_LENGTH).unpack('H*').flat_map { |el| el.scan(TWO_CHARACTER_HEX_REGEX) }
# Reorder the GUID parts based on arbitrary lengths
guid = GUID_PARTS_LENGTHS.map { |length| guid.shift(length) }
# Concatenate the parts of the GUID back together
result = guid.first(3).map(&:reverse)
result << guid.last
result = result.join
result << GUID_AGE_PART
end
strong_memoize_attr :signature
# https://github.com/dotnet/corefx/blob/master/src/System.Reflection.Metadata/specs/PE-COFF.md#portable-pdb-checksum
def checksum
sha = OpenSSL::Digest.new('SHA256')
count = 0
chunk = (+'').force_encoding(Encoding::BINARY)
file.rewind
while file.read(SHA_CHUNK_SIZE, chunk)
count += 1
chunk[pdb_id] = TWENTY_ZEROED_BYTES if count == 1
sha.update(chunk)
end
sha.hexdigest
end
def pdb_id
# The ID is located in the first 256 bytes of the symbol `.pdb` file
chunk = file.read(GUID_CHUNK_SIZE)
return unless chunk
# Find the index of the first occurrence of 'Blob'
guid_index = chunk.index('Blob')
return unless guid_index
# Extract the binary GUID from the symbol content
chunk[(guid_index + GUID_START_INDEX)..(guid_index + GUID_END_INDEX)]
end
strong_memoize_attr :pdb_id
def error_response
ServiceResponse.error(message: 'Could not find the signature in the symbol file')
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::Symbols::ExtractSignatureAndChecksumService, feature_category: :package_registry do
let_it_be(:symbol_file_path) { expand_fixture_path('packages/nuget/symbol/package.pdb') }
let(:symbol_file) { File.new(symbol_file_path) }
let(:service) { described_class.new(symbol_file) }
after do
symbol_file.close
end
describe '#execute' do
subject { service.execute }
context 'with a valid symbol file' do
it 'returns the signature and checksum' do
payload = subject.payload
expect(payload[:signature]).to eq('b91a152048fc4b3883bf3cf73fbc03f1FFFFFFFF')
expect(payload[:checksum]).to eq('20151ab9fc48384b83bf3cf73fbc03f1d49166cc356139845f290d1d315256c0')
end
it 'reads the file in chunks' do
expect(symbol_file).to receive(:read).with(described_class::GUID_CHUNK_SIZE).and_call_original
expect(symbol_file).to receive(:read).with(described_class::SHA_CHUNK_SIZE, instance_of(String))
.at_least(:once).and_call_original
subject
end
end
context 'with an invalid symbol file' do
before do
allow(symbol_file).to receive(:read).and_return('invalid')
end
it 'returns an error' do
expect(subject).to be_error
expect(subject.message).to eq('Could not find the signature in the symbol file')
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Nuget
module Symbols
class CreateSymbolFilesService
ExtractionError = Class.new(StandardError)
SYMBOL_ENTRIES_LIMIT = 100
CONTENT_TYPE = 'application/octet-stream'
def initialize(package, package_zip_file)
@package = package
@symbol_entries = package_zip_file.glob('**/*.pdb')
end
def execute
return if symbol_entries.empty?
process_symbol_entries
rescue ExtractionError => e
Gitlab::ErrorTracking.track_exception(e, class: self.class.name, package_id: package.id)
end
private
attr_reader :package, :symbol_entries
def process_symbol_entries
Tempfile.create('nuget_extraction_symbol_file') do |tmp_file|
symbol_entries.each_with_index do |entry, index|
raise ExtractionError, 'too many symbol entries' if index >= SYMBOL_ENTRIES_LIMIT
entry.extract(tmp_file.path) { true }
File.open(tmp_file.path, 'rb') do |file|
create_symbol(entry.name, file)
end
end
end
rescue Zip::EntrySizeError => e
raise ExtractionError, "symbol file has the wrong entry size: #{e.message}"
rescue Zip::EntryNameError => e
raise ExtractionError, "symbol file has the wrong entry name: #{e.message}"
end
def create_symbol(path, file)
signature, checksum = extract_signature_and_checksum(file)
return if signature.blank? || checksum.blank?
::Packages::Nuget::Symbol.create!(
package: package,
file: { tempfile: file, filename: path.downcase, content_type: CONTENT_TYPE },
file_path: path,
signature: signature,
size: file.size,
file_sha256: checksum
)
rescue StandardError => e
Gitlab::ErrorTracking.track_exception(e, class: self.class.name, package_id: package.id)
end
def extract_signature_and_checksum(file)
::Packages::Nuget::Symbols::ExtractSignatureAndChecksumService
.new(file)
.execute
.payload
.values_at(:signature, :checksum)
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Nuget::Symbols::CreateSymbolFilesService, feature_category: :package_registry do
let_it_be(:package) { create(:nuget_package) }
let_it_be(:package_file) do
create(:package_file, :snupkg, package: package,
file_fixture: expand_fixture_path('packages/nuget/package_with_symbols.snupkg'))
end
let(:package_zip_file) { Zip::File.new(package_file.file) }
let(:service) { described_class.new(package, package_zip_file) }
describe '#execute' do
subject { service.execute }
shared_examples 'logging an error' do |error_class|
it 'logs the error' do
expect(Gitlab::ErrorTracking).to receive(:track_exception).with(
an_instance_of(error_class),
class: described_class.name,
package_id: package.id
)
subject
end
end
context 'when symbol files are found' do
it 'creates a symbol record and extracts the signature' do
expect_next_instance_of(Packages::Nuget::Symbols::ExtractSignatureAndChecksumService,
instance_of(File)) do |service|
expect(service).to receive(:execute).and_call_original
end
expect { subject }.to change { package.nuget_symbols.count }.by(1)
end
end
context 'when symbol files hit the limit' do
before do
stub_const("#{described_class}::SYMBOL_ENTRIES_LIMIT", 0)
end
it 'does not create a symbol record' do
expect { subject }.not_to change { package.nuget_symbols.count }
end
it_behaves_like 'logging an error', described_class::ExtractionError
end
context 'without a signature' do
before do
allow_next_instance_of(Packages::Nuget::Symbols::ExtractSignatureAndChecksumService) do |instance|
allow(instance).to receive(:execute).and_return(ServiceResponse.success(payload: { signature: nil }))
end
end
it 'does not call create! on the symbol record' do
expect(::Packages::Nuget::Symbol).not_to receive(:create!)
subject
end
end
context 'without a checksum' do
before do
allow_next_instance_of(Packages::Nuget::Symbols::ExtractSignatureAndChecksumService) do |instance|
allow(instance).to receive(:execute).and_return(ServiceResponse.success(payload: { checksum: nil }))
end
end
it 'does not call create! on the symbol record' do
expect(::Packages::Nuget::Symbol).not_to receive(:create!)
subject
end
end
context 'with existing duplicate symbol records' do
let_it_be(:symbol) { create(:nuget_symbol, package: package) }
before do
allow_next_instance_of(Packages::Nuget::Symbols::ExtractSignatureAndChecksumService) do |instance|
allow(instance).to receive(:execute).and_return(
ServiceResponse.success(payload: { signature: symbol.signature, checksum: symbol.file_sha256 })
)
end
end
it 'does not create a symbol record' do
expect { subject }.not_to change { package.nuget_symbols.count }
end
it_behaves_like 'logging an error', ActiveRecord::RecordInvalid
end
context 'when a symbol file has the wrong entry size' do
before do
allow_next_instance_of(Zip::Entry) do |instance|
allow(instance).to receive(:extract).and_raise(Zip::EntrySizeError)
end
end
it_behaves_like 'logging an error', described_class::ExtractionError
end
context 'when a symbol file has the wrong entry name' do
before do
allow_next_instance_of(Zip::Entry) do |instance|
allow(instance).to receive(:extract).and_raise(Zip::EntryNameError)
end
end
it_behaves_like 'logging an error', described_class::ExtractionError
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Conan
class SinglePackageSearchService # rubocop:disable Search/NamespacedClass
include Gitlab::Utils::StrongMemoize
def initialize(query, current_user)
@name, @version, @username, _ = query.split(%r{[@/]})
@current_user = current_user
end
def execute
ServiceResponse.success(payload: { results: search_results })
end
private
attr_reader :name, :version, :username, :current_user
def search_results
return [] unless can_access_project_package?
[package&.conan_recipe].compact
end
def package
project
.packages
.with_name(name)
.with_version(version)
.order_created
.last
end
def project
Project.find_by_full_path(full_path)
end
strong_memoize_attr :project
def full_path
::Packages::Conan::Metadatum.full_path_from(package_username: username)
end
def can_access_project_package?
Ability.allowed?(current_user, :read_package, project.try(:packages_policy_subject))
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Conan::SinglePackageSearchService, feature_category: :package_registry do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project, :public) }
let!(:conan_package) { create(:conan_package, project: project) }
let!(:conan_package2) { create(:conan_package, project: project) }
describe '#execute' do
context 'with a valid query and user with permissions' do
before do
allow_next_instance_of(described_class) do |service|
allow(service).to receive(:can_access_project_package?).and_return(true)
end
end
it 'returns the correct package' do
[conan_package, conan_package2].each do |package|
result = described_class.new(package.conan_recipe, user).execute
expect(result.status).to eq :success
expect(result[:results]).to match_array([package.conan_recipe])
end
end
end
context 'with a user without permissions' do
before do
allow_next_instance_of(described_class) do |service|
allow(service).to receive(:can_access_project_package?).and_return(false)
end
end
it 'returns an empty array' do
result = described_class.new(conan_package.conan_recipe, user).execute
expect(result.status).to eq :success
expect(result[:results]).to match_array([])
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Conan
class CreatePackageFileService
attr_reader :package, :file, :params
def initialize(package, file, params)
@package = package
@file = file
@params = params
end
def execute
package_file = package.package_files.build(
file: file,
size: params['file.size'],
file_name: params[:file_name],
file_sha1: params['file.sha1'],
file_md5: params['file.md5'],
conan_file_metadatum_attributes: {
recipe_revision: params[:recipe_revision],
package_revision: params[:package_revision],
conan_package_reference: params[:conan_package_reference],
conan_file_type: params[:conan_file_type]
}
)
if params[:build].present?
package_file.package_file_build_infos << package_file.package_file_build_infos.build(pipeline: params[:build].pipeline)
end
package_file.save!
package_file
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Conan::CreatePackageFileService, feature_category: :package_registry do
include WorkhorseHelpers
let_it_be(:package) { create(:conan_package) }
let_it_be(:user) { create(:user) }
describe '#execute' do
let(:file_name) { 'foo.tgz' }
subject { described_class.new(package, file, params).execute }
shared_examples 'a valid package_file' do
let(:params) do
{
file_name: file_name,
'file.md5': '12345',
'file.sha1': '54321',
'file.size': '128',
'file.type': 'txt',
recipe_revision: '0',
package_revision: '0',
conan_package_reference: '123456789',
conan_file_type: :package_file
}.with_indifferent_access
end
it 'creates a new package file' do
package_file = subject
expect(package_file).to be_valid
expect(package_file.file_name).to eq(file_name)
expect(package_file.file_md5).to eq('12345')
expect(package_file.size).to eq(128)
expect(package_file.conan_file_metadatum).to be_valid
expect(package_file.conan_file_metadatum.recipe_revision).to eq('0')
expect(package_file.conan_file_metadatum.package_revision).to eq('0')
expect(package_file.conan_file_metadatum.conan_package_reference).to eq('123456789')
expect(package_file.conan_file_metadatum.conan_file_type).to eq('package_file')
expect(package_file.file.read).to eq('content')
end
it_behaves_like 'assigns build to package file'
end
shared_examples 'a valid recipe_file' do
let(:params) do
{
file_name: file_name,
'file.md5': '12345',
'file.sha1': '54321',
'file.size': '128',
'file.type': 'txt',
recipe_revision: '0',
conan_file_type: :recipe_file
}.with_indifferent_access
end
it 'creates a new recipe file' do
package_file = subject
expect(package_file).to be_valid
expect(package_file.file_name).to eq(file_name)
expect(package_file.file_md5).to eq('12345')
expect(package_file.size).to eq(128)
expect(package_file.conan_file_metadatum).to be_valid
expect(package_file.conan_file_metadatum.recipe_revision).to eq('0')
expect(package_file.conan_file_metadatum.package_revision).to be_nil
expect(package_file.conan_file_metadatum.conan_package_reference).to be_nil
expect(package_file.conan_file_metadatum.conan_file_type).to eq('recipe_file')
expect(package_file.file.read).to eq('content')
end
it_behaves_like 'assigns build to package file'
end
context 'with temp file' do
let!(:file) do
upload_path = ::Packages::PackageFileUploader.workhorse_local_upload_path
file_path = upload_path + '/' + file_name
FileUtils.mkdir_p(upload_path)
File.write(file_path, 'content')
UploadedFile.new(file_path, filename: File.basename(file_path))
end
before do
allow_any_instance_of(Packages::PackageFileUploader).to receive(:size).and_return(128)
end
it_behaves_like 'a valid package_file'
it_behaves_like 'a valid recipe_file'
end
context 'with remote file' do
let!(:fog_connection) do
stub_package_file_object_storage(direct_upload: true)
end
before do
allow_any_instance_of(Packages::PackageFileUploader).to receive(:size).and_return(128)
end
let(:tmp_object) do
fog_connection.directories.new(key: 'packages').files.create( # rubocop:disable Rails/SaveBang
key: "tmp/uploads/#{file_name}",
body: 'content'
)
end
let(:file) { fog_to_uploaded_file(tmp_object) }
it_behaves_like 'a valid package_file'
it_behaves_like 'a valid recipe_file'
end
context 'file is missing' do
let(:file) { nil }
let(:params) do
{
file_name: file_name,
recipe_revision: '0',
conan_file_type: :recipe_file
}
end
it 'raises an error' do
expect { subject }.to raise_error(ActiveRecord::RecordInvalid)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Conan
class SearchService < BaseService
include ActiveRecord::Sanitization::ClassMethods
WILDCARD = '*'
RECIPE_SEPARATOR = '@'
def execute
ServiceResponse.success(payload: { results: search_results })
end
private
def search_results
return [] if wildcard_query?
return search_for_single_package(sanitized_query) if params[:query].include?(RECIPE_SEPARATOR)
search_packages
end
def wildcard_query?
params[:query] == WILDCARD
end
def sanitized_query
@sanitized_query ||= sanitize_sql_like(params[:query].delete(WILDCARD))
end
def search_for_single_package(query)
::Packages::Conan::SinglePackageSearchService
.new(query, current_user)
.execute[:results]
end
def search_packages
::Packages::Conan::PackageFinder
.new(current_user, { query: build_query }, project: project)
.execute
.map(&:conan_recipe)
end
def build_query
return "#{sanitized_query}%" if params[:query].end_with?(WILDCARD)
sanitized_query
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Conan::SearchService, feature_category: :package_registry do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project, :public) }
let!(:conan_package) { create(:conan_package, project: project) }
let!(:conan_package2) { create(:conan_package, project: project) }
subject { described_class.new(project, user, query: query) }
before do
project.add_developer(user)
end
describe '#execute' do
context 'with wildcard' do
let(:partial_name) { conan_package.name.first[0, 3] }
let(:query) { "#{partial_name}*" }
it 'makes a wildcard query' do
result = subject.execute
expect(result.status).to eq :success
expect(result.payload).to eq(results: [conan_package2.conan_recipe, conan_package.conan_recipe])
end
end
context 'with only wildcard' do
let(:query) { '*' }
it 'returns empty' do
result = subject.execute
expect(result.status).to eq :success
expect(result.payload).to eq(results: [])
end
end
context 'with no wildcard' do
let(:query) { conan_package.name }
it 'makes a search using the beginning of the recipe' do
result = subject.execute
expect(result.status).to eq :success
expect(result.payload).to eq(results: [conan_package.conan_recipe])
end
end
context 'with full recipe match' do
let(:query) { conan_package.conan_recipe }
it 'makes an exact search' do
result = subject.execute
expect(result.status).to eq :success
expect(result.payload).to eq(results: [conan_package.conan_recipe])
end
end
context 'with malicious query' do
let(:query) { 'DROP TABLE foo;' }
it 'returns empty' do
result = subject.execute
expect(result.status).to eq :success
expect(result.payload).to eq(results: [])
end
end
context 'for project' do
let_it_be(:project2) { create(:project, :public) }
let(:query) { conan_package.name }
let!(:conan_package3) { create(:conan_package, name: conan_package.name, project: project2) }
context 'when passing a project' do
it 'returns only packages of the given project' do
result = subject.execute
expect(result.status).to eq :success
expect(result[:results]).to match_array([conan_package.conan_recipe])
end
end
context 'when passing a project with nil' do
it 'returns all packages' do
result = described_class.new(nil, user, query: query).execute
expect(result.status).to eq :success
expect(result[:results]).to eq([conan_package3.conan_recipe, conan_package.conan_recipe])
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Conan
class CreatePackageService < ::Packages::CreatePackageService
def execute
create_package!(:conan,
name: params[:package_name],
version: params[:package_version],
conan_metadatum_attributes: {
package_username: params[:package_username],
package_channel: params[:package_channel]
}
)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Conan::CreatePackageService, feature_category: :package_registry do
let_it_be(:project) { create(:project) }
let_it_be(:user) { create(:user) }
subject(:service) { described_class.new(project, user, params) }
describe '#execute' do
subject(:package) { service.execute }
context 'valid params' do
let(:params) do
{
package_name: 'my-pkg',
package_version: '1.0.0',
package_username: ::Packages::Conan::Metadatum.package_username_from(full_path: project.full_path),
package_channel: 'stable'
}
end
it 'creates a new package' do
expect(package).to be_valid
expect(package.name).to eq(params[:package_name])
expect(package.version).to eq(params[:package_version])
expect(package.package_type).to eq('conan')
expect(package.conan_metadatum.package_username).to eq(params[:package_username])
expect(package.conan_metadatum.package_channel).to eq(params[:package_channel])
end
it_behaves_like 'assigns the package creator'
it_behaves_like 'assigns build to package'
it_behaves_like 'assigns status to package'
end
context 'invalid params' do
let(:params) do
{
package_name: 'my-pkg',
package_version: '1.0.0',
package_username: 'foo/bar',
package_channel: 'stable'
}
end
it 'fails' do
expect { package }.to raise_exception(ActiveRecord::RecordInvalid)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module TerraformModule
class CreatePackageService < ::Packages::CreatePackageService
include Gitlab::Utils::StrongMemoize
def execute
return error('Version is empty.', 400) if params[:module_version].blank?
return error('Access Denied', 403) if current_package_exists_elsewhere?
return error('Package version already exists.', 403) if current_package_version_exists?
return error('File is too large.', 400) if file_size_exceeded?
ApplicationRecord.transaction { create_terraform_module_package! }
end
private
def create_terraform_module_package!
package = create_package!(:terraform_module, name: name, version: params[:module_version])
::Packages::CreatePackageFileService.new(package, file_params).execute
package
end
def current_package_exists_elsewhere?
::Packages::Package
.for_projects(project.root_namespace.all_projects.id_not_in(project.id))
.with_package_type(:terraform_module)
.with_name(name)
.not_pending_destruction
.exists?
end
def current_package_version_exists?
project.packages
.with_package_type(:terraform_module)
.with_name(name)
.with_version(params[:module_version])
.not_pending_destruction
.exists?
end
def name
"#{params[:module_name]}/#{params[:module_system]}"
end
strong_memoize_attr :name
def file_name
"#{params[:module_name]}-#{params[:module_system]}-#{params[:module_version]}.tgz"
end
strong_memoize_attr :file_name
def file_params
{
file: params[:file],
size: params[:file].size,
file_sha256: params[:file].sha256,
file_name: file_name,
build: params[:build]
}
end
def file_size_exceeded?
project.actual_limits.exceeded?(:generic_packages_max_file_size, params[:file].size)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::TerraformModule::CreatePackageService, feature_category: :package_registry do
let_it_be(:namespace) { create(:namespace) }
let_it_be(:project) { create(:project, namespace: namespace) }
let_it_be(:user) { create(:user) }
let_it_be(:sha256) { '440e5e148a25331bbd7991575f7d54933c0ebf6cc735a18ee5066ac1381bb590' }
let(:overrides) { {} }
let(:params) do
{
module_name: 'foo',
module_system: 'bar',
module_version: '1.0.1',
file: UploadedFile.new(Tempfile.new('test').path, sha256: sha256),
file_name: 'foo-bar-1.0.1.tgz'
}.merge(overrides)
end
subject { described_class.new(project, user, params).execute }
describe '#execute' do
shared_examples 'creating a package' do
it 'creates a package' do
expect { subject }
.to change { ::Packages::Package.count }.by(1)
.and change { ::Packages::Package.terraform_module.count }.by(1)
end
end
context 'valid package' do
it_behaves_like 'creating a package'
end
context 'package already exists elsewhere' do
let(:project2) { create(:project, namespace: namespace) }
let!(:existing_package) { create(:terraform_module_package, project: project2, name: 'foo/bar', version: '1.0.0') }
it { expect(subject[:http_status]).to eq 403 }
it { expect(subject[:message]).to be 'Access Denied' }
context 'marked as pending_destruction' do
before do
existing_package.pending_destruction!
end
it_behaves_like 'creating a package'
end
end
context 'version already exists' do
let!(:existing_version) { create(:terraform_module_package, project: project, name: 'foo/bar', version: '1.0.1') }
it { expect(subject[:http_status]).to eq 403 }
it { expect(subject[:message]).to be 'Package version already exists.' }
context 'marked as pending_destruction' do
before do
existing_version.pending_destruction!
end
it_behaves_like 'creating a package'
end
end
context 'with empty version' do
let(:overrides) { { module_version: '' } }
it { expect(subject[:http_status]).to eq 400 }
it { expect(subject[:message]).to eq 'Version is empty.' }
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Generic
class CreatePackageFileService < BaseService
def execute
::Packages::Package.transaction do
create_package_file(find_or_create_package)
end
end
private
def find_or_create_package
package_params = {
name: params[:package_name],
version: params[:package_version],
build: params[:build],
status: params[:status]
}
package = ::Packages::Generic::FindOrCreatePackageService
.new(project, current_user, package_params)
.execute
unless Namespace::PackageSetting.duplicates_allowed?(package)
raise ::Packages::DuplicatePackageError if target_file_is_duplicate?(package)
end
package.update_column(:status, params[:status]) if params[:status] && params[:status] != package.status
package.create_build_infos!(params[:build])
package
end
def create_package_file(package)
file_params = {
file: params[:file],
size: params[:file].size,
file_sha256: params[:file].sha256,
file_name: params[:file_name],
build: params[:build]
}
::Packages::CreatePackageFileService.new(package, file_params).execute
end
def target_file_is_duplicate?(package)
package
.package_files
.with_file_name(params[:file_name])
.not_pending_destruction
.exists?
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Generic::CreatePackageFileService, feature_category: :package_registry do
let_it_be(:project) { create(:project) }
let_it_be(:user) { create(:user) }
let_it_be(:pipeline) { create(:ci_pipeline, user: user) }
let_it_be(:file_name) { 'myfile.tar.gz.1' }
let(:build) { double('build', pipeline: pipeline) }
describe '#execute' do
let_it_be(:package) { create(:generic_package, project: project) }
let(:sha256) { '440e5e148a25331bbd7991575f7d54933c0ebf6cc735a18ee5066ac1381bb590' }
let(:temp_file) { Tempfile.new("test") }
let(:file) { UploadedFile.new(temp_file.path, sha256: sha256) }
let(:package_service) { double }
let(:params) do
{
package_name: 'mypackage',
package_version: '0.0.1',
file: file,
file_name: file_name,
build: build
}
end
let(:package_params) do
{
name: params[:package_name],
version: params[:package_version],
build: params[:build],
status: nil
}
end
subject(:execute_service) { described_class.new(project, user, params).execute }
before do
FileUtils.touch(temp_file)
expect(::Packages::Generic::FindOrCreatePackageService).to receive(:new).with(project, user, package_params).and_return(package_service)
expect(package_service).to receive(:execute).and_return(package)
end
after do
FileUtils.rm_f(temp_file)
end
it 'creates package file', :aggregate_failures do
expect { execute_service }.to change { package.package_files.count }.by(1)
.and change { Packages::PackageFileBuildInfo.count }.by(1)
package_file = package.package_files.last
aggregate_failures do
expect(package_file.package.status).to eq('default')
expect(package_file.package).to eq(package)
expect(package_file.file_name).to eq(file_name)
expect(package_file.size).to eq(file.size)
expect(package_file.file_sha256).to eq(sha256)
end
end
context 'with a status' do
let(:params) { super().merge(status: 'hidden') }
let(:package_params) { super().merge(status: 'hidden') }
it 'updates an existing packages status' do
expect { execute_service }.to change { package.package_files.count }.by(1)
.and change { Packages::PackageFileBuildInfo.count }.by(1)
package_file = package.package_files.last
aggregate_failures do
expect(package_file.package.status).to eq('hidden')
end
end
end
it_behaves_like 'assigns build to package file'
context 'with existing package' do
let_it_be(:duplicate_file) { create(:package_file, package: package, file_name: file_name) }
it { expect { execute_service }.to change { project.package_files.count }.by(1) }
context 'when duplicates are not allowed' do
before do
package.project.namespace.package_settings.update!(generic_duplicates_allowed: false)
end
it 'does not allow duplicates' do
expect { execute_service }.to raise_error(::Packages::DuplicatePackageError)
.and change { project.package_files.count }.by(0)
end
context 'when the file is pending destruction' do
before do
duplicate_file.update_column(:status, :pending_destruction)
end
it 'allows creating the file' do
expect { execute_service }.to change { project.package_files.count }.by(1)
end
end
context 'when the package name matches the exception regex' do
before do
package.project.namespace.package_settings.update!(generic_duplicate_exception_regex: '.*')
end
it { expect { execute_service }.to change { project.package_files.count }.by(1) }
end
end
context 'with multiple files for the same package and the same pipeline' do
let(:file_2_params) { params.merge(file_name: 'myfile.tar.gz.2', file: file2) }
let(:file_3_params) { params.merge(file_name: 'myfile.tar.gz.3', file: file3) }
let(:temp_file2) { Tempfile.new("test2") }
let(:temp_file3) { Tempfile.new("test3") }
let(:file2) { UploadedFile.new(temp_file2.path, sha256: sha256) }
let(:file3) { UploadedFile.new(temp_file3.path, sha256: sha256) }
before do
FileUtils.touch(temp_file2)
FileUtils.touch(temp_file3)
expect(::Packages::Generic::FindOrCreatePackageService).to receive(:new).with(project, user, package_params).and_return(package_service).twice
expect(package_service).to receive(:execute).and_return(package).twice
end
after do
FileUtils.rm_f(temp_file2)
FileUtils.rm_f(temp_file3)
end
it 'creates the build info only once' do
expect do
described_class.new(project, user, params).execute
described_class.new(project, user, file_2_params).execute
described_class.new(project, user, file_3_params).execute
end.to change { package.build_infos.count }.by(1)
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Generic
class FindOrCreatePackageService < ::Packages::CreatePackageService
def execute
find_or_create_package!(::Packages::Package.package_types['generic'])
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Generic::FindOrCreatePackageService, feature_category: :package_registry do
let_it_be(:project) { create(:project) }
let_it_be(:user) { create(:user) }
let_it_be(:ci_build) { create(:ci_build, :running, user: user) }
let(:params) do
{
name: 'mypackage',
version: '0.0.1'
}
end
describe '#execute' do
context 'when packages does not exist yet' do
it 'creates package' do
service = described_class.new(project, user, params)
expect { service.execute }.to change { project.packages.generic.count }.by(1)
package = project.packages.generic.last
aggregate_failures do
expect(package.creator).to eq(user)
expect(package.name).to eq('mypackage')
expect(package.version).to eq('0.0.1')
expect(package.last_build_info).to be_nil
end
end
it 'creates package and package build info when build is provided' do
service = described_class.new(project, user, params.merge(build: ci_build))
expect { service.execute }.to change { project.packages.generic.count }.by(1)
package = project.packages.generic.last
aggregate_failures do
expect(package.creator).to eq(user)
expect(package.name).to eq('mypackage')
expect(package.version).to eq('0.0.1')
expect(package.last_build_info.pipeline).to eq(ci_build.pipeline)
end
end
end
context 'when packages already exists' do
let!(:package) { project.packages.generic.create!(params) }
context 'when package was created manually' do
it 'finds the package and does not create package build info even if build is provided' do
service = described_class.new(project, user, params.merge(build: ci_build))
expect do
found_package = service.execute
expect(found_package).to eq(package)
end.not_to change { project.packages.generic.count }
expect(package.reload.last_build_info).to be_nil
end
end
context 'when package was created by pipeline' do
let(:pipeline) { create(:ci_pipeline, project: project) }
before do
package.build_infos.create!(pipeline: pipeline)
end
it 'finds the package and does not change package build info even if build is provided' do
service = described_class.new(project, user, params.merge(build: ci_build))
expect do
found_package = service.execute
expect(found_package).to eq(package)
end.not_to change { project.packages.generic.count }
expect(package.reload.last_build_info.pipeline).to eq(pipeline)
end
end
context 'when a pending_destruction package exists', :aggregate_failures do
let!(:package) { project.packages.generic.create!(params.merge(status: :pending_destruction)) }
it 'creates a new package' do
service = described_class.new(project, user, params)
expect { service.execute }.to change { project.packages.generic.count }.by(1)
package = project.packages.generic.last
expect(package.creator).to eq(user)
expect(package.name).to eq('mypackage')
expect(package.version).to eq('0.0.1')
expect(package.last_build_info).to be_nil
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rpm
class ParsePackageService
include ::Gitlab::Utils::StrongMemoize
BUILD_ATTRIBUTES_METHOD_NAMES = %i[changelogs requirements provides].freeze
STATIC_ATTRIBUTES = %i[name version release summary description arch
license sourcerpm group buildhost packager vendor].freeze
CHANGELOGS_RPM_KEYS = %i[changelogtext changelogtime].freeze
REQUIREMENTS_RPM_KEYS = %i[requirename requireversion requireflags].freeze
PROVIDES_RPM_KEYS = %i[providename provideflags provideversion].freeze
def initialize(package_file)
@rpm = RPM::File.new(package_file)
end
def execute
raise ArgumentError, 'Unable to parse package' unless valid_package?
{
files: rpm.files || [],
epoch: package_tags[:epoch] || '0',
changelogs: build_changelogs,
requirements: build_requirements,
provides: build_provides,
directories: package_tags[:dirnames]
}.merge(extract_static_attributes)
end
private
attr_reader :rpm
def valid_package?
rpm.files && package_tags && true
rescue RuntimeError
# if arr-pm throws an error due to an incorrect file format,
# we just want this validation to fail rather than throw an exception
false
end
def package_tags
rpm.tags
end
strong_memoize_attr :package_tags
def extract_static_attributes
STATIC_ATTRIBUTES.index_with do |attribute|
package_tags[attribute]
end
end
# Define methods for building RPM attribute data from parsed package
# Transform
# changelogtime: [123, 234],
# changelogname: ["First", "Second"]
# changelogtext: ["Work1", "Work2"]
# Into
# changelog: [
# {changelogname: "First", changelogtext: "Work1", changelogtime: 123},
# {changelogname: "Second", changelogtext: "Work2", changelogtime: 234}
# ]
BUILD_ATTRIBUTES_METHOD_NAMES.each do |resource|
define_method("build_#{resource}") do
resource_keys = self.class.const_get("#{resource.upcase}_RPM_KEYS", false).dup
return [] if resource_keys.any? { package_tags[_1].blank? }
first_attributes = package_tags[resource_keys.first]
zipped_data = first_attributes.zip(*resource_keys[1..].map { package_tags[_1] })
build_hashes(resource_keys, zipped_data)
end
end
def build_hashes(resource_keys, zipped_data)
zipped_data.map do |data|
resource_keys.zip(data).to_h
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rpm::ParsePackageService, feature_category: :package_registry do
let(:package_file) { File.open('spec/fixtures/packages/rpm/hello-0.0.1-1.fc29.x86_64.rpm') }
describe 'dynamic private methods' do
described_class::BUILD_ATTRIBUTES_METHOD_NAMES.each do |attribute|
it 'define dynamic build attribute method' do
expect(described_class).to be_private_method_defined("build_#{attribute}")
end
end
end
describe '#execute' do
subject { described_class.new(package_file).execute }
shared_examples 'valid package parsing' do
it 'return hash' do
expect(subject).to be_a(Hash)
end
it 'has all static attribute keys' do
expect(subject.keys).to include(*described_class::STATIC_ATTRIBUTES)
end
it 'includes epoch attribute' do
expect(subject[:epoch]).not_to be_blank
end
it 'has all built attributes with array values' do
result = subject
described_class::BUILD_ATTRIBUTES_METHOD_NAMES.each do |attribute|
expect(result).to have_key(attribute)
expect(result[attribute]).to be_a(Array)
end
end
end
context 'when wrong format file received' do
let(:package_file) { File.open('spec/fixtures/rails_sample.jpg') }
it 'raise error' do
expect { subject }.to raise_error(ArgumentError)
end
end
context 'when valid file uploaded' do
context 'when .rpm file uploaded' do
it_behaves_like 'valid package parsing'
end
context 'when .src.rpm file uploaded' do
let(:package_file) { File.open('spec/fixtures/packages/rpm/hello-0.0.1-1.fc29.src.rpm') }
it_behaves_like 'valid package parsing'
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rpm
module RepositoryMetadata
class BuildRepomdXmlService
ROOT_ATTRIBUTES = {
xmlns: 'http://linux.duke.edu/metadata/repo',
'xmlns:rpm': 'http://linux.duke.edu/metadata/rpm'
}.freeze
ALLOWED_DATA_VALUE_KEYS = %i[checksum open-checksum location timestamp size open-size].freeze
# Expected `data` structure
#
# data = {
# filelists: {
# checksum: { type: "sha256", value: "123" },
# location: { href: "repodata/123-filelists.xml.gz" },
# ...
# },
# ...
# }
def initialize(data)
@data = data
end
def execute
Nokogiri::XML::Builder.new(encoding: 'UTF-8') do |xml|
xml.repomd(ROOT_ATTRIBUTES) do
xml.revision Time.now.to_i
build_data_info(xml)
end
end.to_xml
end
private
attr_reader :data
def build_data_info(xml)
data.each do |filename, info|
xml.data(type: filename) do
build_file_info(info, xml)
end
end
end
def build_file_info(info, xml)
info.slice(*ALLOWED_DATA_VALUE_KEYS).each do |key, attributes|
value = attributes.delete(:value)
xml.method_missing(key, value, attributes)
end
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rpm::RepositoryMetadata::BuildRepomdXmlService, feature_category: :package_registry do
describe '#execute' do
subject { described_class.new(data).execute }
let(:data) do
{
filelists: {
checksum: { type: "sha256", value: "123" },
'open-checksum': { type: "sha256", value: "123" },
location: { href: "repodata/123-filelists.xml.gz" },
timestamp: { value: 1644602784 },
size: { value: 11111 },
'open-size': { value: 11111 }
},
primary: {
checksum: { type: "sha256", value: "234" },
'open-checksum': { type: "sha256", value: "234" },
location: { href: "repodata/234-primary.xml.gz" },
timestamp: { value: 1644602784 },
size: { value: 22222 },
'open-size': { value: 22222 }
},
other: {
checksum: { type: "sha256", value: "345" },
'open-checksum': { type: "sha256", value: "345" },
location: { href: "repodata/345-other.xml.gz" },
timestamp: { value: 1644602784 },
size: { value: 33333 },
'open-size': { value: 33333 }
}
}
end
let(:creation_timestamp) { 111111 }
before do
allow(Time).to receive(:now).and_return(creation_timestamp)
end
it 'generate valid xml' do
# Have one root attribute
result = Nokogiri::XML::Document.parse(subject)
expect(result.children.count).to eq(1)
# Root attribute name is 'repomd'
root = result.children.first
expect(root.name).to eq('repomd')
# Have the same count of 'data' tags as count of keys in 'data'
expect(result.css('data').count).to eq(data.count)
end
it 'has all data info' do
result = Nokogiri::XML::Document.parse(subject).remove_namespaces!
data.each do |tag_name, tag_attributes|
tag_attributes.each_key do |key|
expect(result.at("//repomd/data[@type=\"#{tag_name}\"]/#{key}")).not_to be_nil
end
end
end
context 'when data values has unexpected keys' do
let(:data) do
{
filelists: described_class::ALLOWED_DATA_VALUE_KEYS.each_with_object({}) do |key, result|
result[:"#{key}-wrong"] = { value: 'value' }
end
}
end
it 'ignores wrong keys' do
result = Nokogiri::XML::Document.parse(subject).remove_namespaces!
data.each do |tag_name, tag_attributes|
tag_attributes.each_key do |key|
expect(result.at("//repomd/data[@type=\"#{tag_name}\"]/#{key}")).to be_nil
end
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rpm
module RepositoryMetadata
class BuildOtherXmlService < BuildXmlBaseService
ROOT_TAG = 'otherdata'
ROOT_ATTRIBUTES = {
xmlns: 'http://linux.duke.edu/metadata/other',
packages: '0'
}.freeze
def execute
super do |xml|
xml.package(pkgid: data[:pkgid], name: data[:name], arch: data[:arch]) do
xml.version epoch: data[:epoch], ver: data[:version], rel: data[:release]
build_changelog_nodes(xml)
end
end
end
private
def build_changelog_nodes(xml)
data[:changelogs].each do |changelog|
xml.changelog changelog[:changelogtext], date: changelog[:changelogtime]
end
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rpm::RepositoryMetadata::BuildOtherXmlService, feature_category: :package_registry do
describe '#execute' do
subject { described_class.new(data).execute }
include_context 'with rpm package data'
let(:data) { xml_update_params }
let(:changelog_xpath) { "//package/changelog" }
it 'adds all changelog nodes' do
result = subject
expect(result.xpath(changelog_xpath).count).to eq(data[:changelogs].count)
end
it 'set required date attribute' do
result = subject
data[:changelogs].each do |changelog|
expect(result.at("#{changelog_xpath}[@date=\"#{changelog[:changelogtime]}\"]")).not_to be_nil
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rpm
module RepositoryMetadata
class BuildPrimaryXmlService < BuildXmlBaseService
ROOT_TAG = 'metadata'
ROOT_ATTRIBUTES = {
xmlns: 'http://linux.duke.edu/metadata/common',
'xmlns:rpm': 'http://linux.duke.edu/metadata/rpm',
packages: '0'
}.freeze
# Nodes that have only text without attributes
BASE_ATTRIBUTES = %i[name arch summary description url packager].freeze
FORMAT_NODE_BASE_ATTRIBUTES = %i[license vendor group buildhost sourcerpm].freeze
def execute
super do |xml|
xml.package(type: :rpm, 'xmlns:rpm': 'http://linux.duke.edu/metadata/rpm') do
build_base_attributes(xml)
xml.version epoch: data[:epoch], ver: data[:version], rel: data[:release]
xml.checksum data[:pkgid], type: 'sha256', pkgid: 'YES'
xml.size package: data[:packagesize], installed: data[:installedsize], archive: data[:archivesize]
xml.time file: data[:filetime], build: data[:buildtime]
xml.location href: data[:location] if data[:location].present?
build_format_node(xml)
end
end
end
private
def build_base_attributes(xml)
BASE_ATTRIBUTES.each do |attribute|
xml.method_missing(attribute, data[attribute]) if data[attribute].present?
end
end
def build_format_node(xml)
xml.format do
build_base_format_attributes(xml)
build_provides_node(xml)
build_requires_node(xml)
end
end
def build_base_format_attributes(xml)
FORMAT_NODE_BASE_ATTRIBUTES.each do |attribute|
xml[:rpm].method_missing(attribute, data[attribute]) if data[attribute].present?
end
end
def build_requires_node(xml)
xml[:rpm].requires do
data[:requirements].each do |requires|
xml[:rpm].entry(
name: requires[:requirename],
flags: requires[:requireflags],
ver: requires[:requireversion]
)
end
end
end
def build_provides_node(xml)
xml[:rpm].provides do
data[:provides].each do |provides|
xml[:rpm].entry(
name: provides[:providename],
flags: provides[:provideflags],
ver: provides[:provideversion])
end
end
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rpm::RepositoryMetadata::BuildPrimaryXmlService, feature_category: :package_registry do
describe '#execute' do
subject { described_class.new(data).execute }
include_context 'with rpm package data'
let(:data) { xml_update_params }
let(:required_text_only_attributes) { %i[description summary arch name] }
it 'adds node with required_text_only_attributes' do
result = subject
required_text_only_attributes.each do |attribute|
expect(
result.at("//package/#{attribute}").text
).to eq(data[attribute])
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rpm
module RepositoryMetadata
class BuildFilelistXmlService < BuildXmlBaseService
ROOT_TAG = 'filelists'
ROOT_ATTRIBUTES = {
xmlns: 'http://linux.duke.edu/metadata/filelists',
packages: '0'
}.freeze
def execute
super do |xml|
xml.package(pkgid: data[:pkgid], name: data[:name], arch: data[:arch]) do
xml.version epoch: data[:epoch], ver: data[:version], rel: data[:release]
build_file_nodes(xml)
end
end
end
private
def build_file_nodes(xml)
data[:files].each do |path|
attributes = dir?(path) ? { type: 'dir' } : {}
xml.file path, **attributes
end
end
def dir?(path)
# Add trailing slash to path to check
# if it exists in directories list
data[:directories].include? File.join(path, '')
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rpm::RepositoryMetadata::BuildFilelistXmlService, feature_category: :package_registry do
describe '#execute' do
subject { described_class.new(data).execute }
include_context 'with rpm package data'
let(:data) { xml_update_params }
let(:file_xpath) { "//package/file" }
it 'adds all file nodes' do
result = subject
expect(result.xpath(file_xpath).count).to eq(data[:files].count)
end
describe 'setting type attribute' do
context 'when all files are directories' do
let(:dirs) do
3.times.map { generate_directory } # rubocop:disable Performance/TimesMap
end
let(:files) do
5.times.map { FFaker::Filesystem.file_name(dirs.sample) } # rubocop:disable Performance/TimesMap
end
let(:data) do
{
directories: dirs.map { "#{_1}/" }, # Add trailing slash as in original package
files: dirs + files
}
end
it 'set dir type attribute for directories only' do
result = subject
result.xpath(file_xpath).each do |tag|
if dirs.include?(tag.content)
expect(tag.attributes['type']&.value).to eq('dir')
else
expect(tag.attributes['type']).to be_nil
end
end
end
end
def generate_directory
FFaker::Lorem.words(3).join('/')
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Rpm
module RepositoryMetadata
class UpdateXmlService
BUILDERS = {
other: ::Packages::Rpm::RepositoryMetadata::BuildOtherXmlService,
primary: ::Packages::Rpm::RepositoryMetadata::BuildPrimaryXmlService,
filelist: ::Packages::Rpm::RepositoryMetadata::BuildFilelistXmlService
}.freeze
def initialize(filename:, xml: nil, data: {})
@builder_class = BUILDERS[filename]
raise ArgumentError, "Filename must be one of: #{BUILDERS.keys.join(', ')}" if @builder_class.nil?
@xml = Nokogiri::XML(xml) if xml.present?
@data = data
@filename = filename
end
def execute
return build_empty_structure if xml.blank?
remove_existing_packages
update_xml_document
update_package_count
xml.to_xml
end
private
attr_reader :xml, :data, :builder_class, :filename
def build_empty_structure
Nokogiri::XML::Builder.new(encoding: 'UTF-8') do |xml|
xml.method_missing(builder_class::ROOT_TAG, builder_class::ROOT_ATTRIBUTES)
end.to_xml
end
def update_xml_document
# Add to the root xml element a new package metadata node
xml.at(builder_class::ROOT_TAG).add_child(builder_class.new(data).execute)
end
def update_package_count
packages_count = xml.css("//#{builder_class::ROOT_TAG}/package").count
xml.at(builder_class::ROOT_TAG).attributes["packages"].value = packages_count.to_s
end
def remove_existing_packages
case filename
when :primary
xml.search("checksum:contains('#{data[:pkgid]}')").each { _1.parent&.remove }
else
xml.search("[pkgid='#{data[:pkgid]}']").each(&:remove)
end
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Rpm::RepositoryMetadata::UpdateXmlService, feature_category: :package_registry do
describe '#execute' do
subject { described_class.new(filename: filename, xml: xml, data: data).execute }
let(:xml) { nil }
let(:data) { nil }
shared_examples 'handling not implemented xml filename' do
let(:filename) { :not_implemented_yet }
let(:empty_xml) { '' }
it 'raise error' do
expect { subject }.to raise_error(ArgumentError)
end
end
shared_context 'with primary xml file data' do
let(:filename) { :primary }
let(:empty_xml) do
<<~XML
<?xml version="1.0" encoding="UTF-8"?>
<metadata xmlns="http://linux.duke.edu/metadata/common" xmlns:rpm="http://linux.duke.edu/metadata/rpm" packages="0"/>
XML
end
end
shared_context 'with other xml file data' do
let(:filename) { :other }
let(:empty_xml) do
<<~XML
<?xml version="1.0" encoding="UTF-8"?>
<otherdata xmlns="http://linux.duke.edu/metadata/other" packages="0"/>
XML
end
end
shared_context 'with filelist xml file data' do
let(:filename) { :filelist }
let(:empty_xml) do
<<~XML
<?xml version="1.0" encoding="UTF-8"?>
<filelists xmlns="http://linux.duke.edu/metadata/filelists" packages="0"/>
XML
end
end
context 'when building empty xml' do
shared_examples 'generating empty xml' do
it 'generate expected xml' do
expect(subject).to eq(empty_xml)
end
end
it_behaves_like 'handling not implemented xml filename'
context "for 'primary' xml file" do
include_context 'with primary xml file data'
it_behaves_like 'generating empty xml'
end
context "for 'other' xml file" do
include_context 'with other xml file data'
it_behaves_like 'generating empty xml'
end
context "for 'filelist' xml file" do
include_context 'with filelist xml file data'
it_behaves_like 'generating empty xml'
end
end
context 'when updating xml file' do
include_context 'with rpm package data'
let(:xml) { empty_xml }
let(:data) { xml_update_params }
let(:builder_class) { described_class::BUILDERS[filename] }
shared_examples 'updating rpm xml file' do
context 'when updating existing xml' do
shared_examples 'changing root tag attribute' do
it "increment previous 'packages' value by 1" do
previous_value = Nokogiri::XML(xml).at(builder_class::ROOT_TAG).attributes["packages"].value.to_i
new_value = Nokogiri::XML(subject).at(builder_class::ROOT_TAG).attributes["packages"].value.to_i
expect(previous_value + 1).to eq(new_value)
end
end
it 'generate valid xml add expected xml node to existing xml' do
# Have one root attribute
result = Nokogiri::XML::Document.parse(subject).remove_namespaces!
expect(result.children.count).to eq(1)
# Root node has 1 child with generated node
expect(result.xpath("//#{builder_class::ROOT_TAG}/package").count).to eq(1)
end
context 'when empty xml' do
it_behaves_like 'changing root tag attribute'
end
context 'when xml has children' do
context "when node with given 'pkgid' does not exist yet" do
let(:uniq_node_data) do
xml_update_params.tap do |data|
data[:pkgid] = SecureRandom.uuid
end
end
let(:xml) { build_xml_from(uniq_node_data) }
it 'has children nodes' do
existing_xml = Nokogiri::XML::Document.parse(xml).remove_namespaces!
expect(existing_xml.xpath('//package').count).to eq(1)
end
it_behaves_like 'changing root tag attribute'
end
context "when node with given 'pkgid' already exist" do
let(:existing_node_data) do
existing_data = data.dup
existing_data[:name] = FFaker::Lorem.word
existing_data
end
let(:xml) { build_xml_from(existing_node_data) }
it 'has children nodes' do
existing_xml = Nokogiri::XML::Document.parse(xml).remove_namespaces!
expect(existing_xml.xpath('//package').count).to eq(1)
end
it 'replace existing node with new data' do
existing_xml = Nokogiri::XML::Document.parse(xml).remove_namespaces!
result = Nokogiri::XML::Document.parse(subject).remove_namespaces!
expect(result.xpath('//package').count).to eq(1)
expect(result.xpath('//package').first.to_xml).not_to eq(existing_xml.xpath('//package').first.to_xml)
end
end
def build_xml_from(data)
described_class.new(filename: filename, xml: empty_xml, data: data).execute
end
end
end
end
it_behaves_like 'handling not implemented xml filename'
context "for 'primary' xml file" do
include_context 'with primary xml file data'
it_behaves_like 'updating rpm xml file'
end
context "for 'other' xml file" do
include_context 'with other xml file data'
it_behaves_like 'updating rpm xml file'
end
context "for 'filelist' xml file" do
include_context 'with filelist xml file data'
it_behaves_like 'updating rpm xml file'
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
require 'rubygems/package'
module Packages
module Helm
class ExtractFileMetadataService
ExtractionError = Class.new(StandardError)
# Charts must be smaller than 1M because of the storage limitations of Kubernetes objects.
# based on https://helm.sh/docs/chart_template_guide/accessing_files/
MAX_FILE_SIZE = 1.megabytes.freeze
def initialize(package_file)
@package_file = package_file
end
def execute
raise ExtractionError, 'invalid package file' unless valid_package_file?
metadata
end
private
def valid_package_file?
@package_file && @package_file.package&.helm? && !@package_file.file.empty_size?
end
def metadata
YAML.safe_load(chart_yaml_content)
rescue Psych::Exception => e
raise ExtractionError, "Error while parsing Chart.yaml: #{e.message}"
end
def chart_yaml_content
@package_file.file.use_open_file do |file|
tar_reader = Gem::Package::TarReader.new(Zlib::GzipReader.new(file))
chart_yaml = tar_reader.find do |entry|
next unless entry.file?
entry.full_name.end_with?('/Chart.yaml')
end
raise ExtractionError, 'Chart.yaml not found within a directory' unless chart_yaml
raise ExtractionError, 'Chart.yaml too big' if chart_yaml.size > MAX_FILE_SIZE
chart_yaml.read
ensure
tar_reader.close
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Helm::ExtractFileMetadataService, feature_category: :package_registry do
let_it_be(:package_file) { create(:helm_package_file) }
let(:service) { described_class.new(package_file) }
let(:expected) do
{
'apiVersion' => 'v2',
'description' => 'File, Block, and Object Storage Services for your Cloud-Native Environment',
'icon' => 'https://rook.io/images/rook-logo.svg',
'name' => 'rook-ceph',
'sources' => ['https://github.com/rook/rook'],
'version' => 'v1.5.8'
}
end
subject { service.execute }
context 'with a valid file' do
it { is_expected.to eq(expected) }
end
context 'without Chart.yaml' do
before do
expect_next_instances_of(Gem::Package::TarReader::Entry, 14) do |entry|
expect(entry).to receive(:full_name).exactly(:once).and_wrap_original do |m, *args|
m.call(*args) + '_suffix'
end
end
end
it { expect { subject }.to raise_error(described_class::ExtractionError, 'Chart.yaml not found within a directory') }
end
context 'with Chart.yaml at root' do
before do
expect_next_instances_of(Gem::Package::TarReader::Entry, 14) do |entry|
expect(entry).to receive(:full_name).exactly(:once).and_return('Chart.yaml')
end
end
it { expect { subject }.to raise_error(described_class::ExtractionError, 'Chart.yaml not found within a directory') }
end
context 'with an invalid YAML' do
before do
expect_next_instance_of(Gem::Package::TarReader::Entry) do |entry|
expect(entry).to receive(:read).and_return('{')
end
end
it { expect { subject }.to raise_error(described_class::ExtractionError, 'Error while parsing Chart.yaml: (<unknown>): did not find expected node content while parsing a flow node at line 2 column 1') }
end
context 'with a corrupted Chart.yaml of incorrect size' do
let(:helm_fixture_path) { expand_fixture_path('packages/helm/corrupted_chart.tgz') }
let(:expected_error_message) { 'Chart.yaml too big' }
before do
allow(Zlib::GzipReader).to receive(:new).and_return(Zlib::GzipReader.new(File.open(helm_fixture_path)))
end
it 'raises an error with the expected message' do
expect { subject }.to raise_error(::Packages::Helm::ExtractFileMetadataService::ExtractionError, expected_error_message)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Helm
class ProcessFileService
include Gitlab::Utils::StrongMemoize
include ExclusiveLeaseGuard
ExtractionError = Class.new(StandardError)
DEFAULT_LEASE_TIMEOUT = 1.hour.to_i
def initialize(channel, package_file)
@channel = channel
@package_file = package_file
end
def execute
raise ExtractionError, 'Helm chart was not processed - package_file is not set' unless package_file
try_obtain_lease do
temp_package.transaction do
rename_package_and_set_version
rename_package_file_and_set_metadata
cleanup_temp_package
end
end
end
private
attr_reader :channel, :package_file
def rename_package_and_set_version
package.update!(
name: metadata['name'],
version: metadata['version'],
status: :default
)
end
def rename_package_file_and_set_metadata
# Updating file_name updates the path where the file is stored.
# We must pass the file again so that CarrierWave can handle the update
package_file.update!(
file_name: file_name,
file: package_file.file,
package_id: package.id,
helm_file_metadatum_attributes: {
channel: channel,
metadata: metadata
}
)
end
def cleanup_temp_package
temp_package.destroy if package.id != temp_package.id
end
def temp_package
package_file.package
end
strong_memoize_attr :temp_package
def package
project_packages = package_file.package.project.packages
package = project_packages.with_package_type(:helm)
.with_name(metadata['name'])
.with_version(metadata['version'])
.not_pending_destruction
.last
package || temp_package
end
strong_memoize_attr :package
def metadata
::Packages::Helm::ExtractFileMetadataService.new(package_file).execute
end
strong_memoize_attr :metadata
def file_name
"#{metadata['name']}-#{metadata['version']}.tgz"
end
# used by ExclusiveLeaseGuard
def lease_key
"packages:helm:process_file_service:package_file:#{package_file.id}"
end
# used by ExclusiveLeaseGuard
def lease_timeout
DEFAULT_LEASE_TIMEOUT
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Helm::ProcessFileService, feature_category: :package_registry do
let(:package) { create(:helm_package, without_package_files: true, status: 'processing') }
let!(:package_file) { create(:helm_package_file, without_loaded_metadatum: true, package: package) }
let(:channel) { 'stable' }
let(:service) { described_class.new(channel, package_file) }
let(:expected) do
{
'apiVersion' => 'v2',
'description' => 'File, Block, and Object Storage Services for your Cloud-Native Environment',
'icon' => 'https://rook.io/images/rook-logo.svg',
'name' => 'rook-ceph',
'sources' => ['https://github.com/rook/rook'],
'version' => 'v1.5.8'
}
end
describe '#execute' do
subject(:execute) { service.execute }
context 'without a file' do
let(:package_file) { nil }
it 'returns error', :aggregate_failures do
expect { execute }
.to not_change { Packages::Package.count }
.and not_change { Packages::PackageFile.count }
.and not_change { Packages::Helm::FileMetadatum.count }
.and raise_error(Packages::Helm::ProcessFileService::ExtractionError, 'Helm chart was not processed - package_file is not set')
end
end
context 'with existing package' do
let!(:existing_package) { create(:helm_package, project: package.project, name: 'rook-ceph', version: 'v1.5.8') }
it 'reuses existing package', :aggregate_failures do
expect { execute }
.to change { Packages::Package.count }.from(2).to(1)
.and not_change { package.name }
.and not_change { package.version }
.and not_change { package.status }
.and not_change { Packages::PackageFile.count }
.and change { package_file.file_name }.from(package_file.file_name).to("#{expected['name']}-#{expected['version']}.tgz")
.and change { Packages::Helm::FileMetadatum.count }.from(1).to(2)
.and change { package_file.helm_file_metadatum }.from(nil)
expect { package.reload }
.to raise_error(ActiveRecord::RecordNotFound)
expect(package_file.helm_file_metadatum.channel).to eq(channel)
expect(package_file.helm_file_metadatum.metadata).to eq(expected)
end
context 'marked as pending_destruction' do
before do
existing_package.pending_destruction!
end
it 'reuses the processing package' do
expect { execute }
.to not_change { Packages::Package.count }
.and not_change { Packages::PackageFile.count }
.and change { Packages::Helm::FileMetadatum.count }.by(1)
end
end
end
context 'with a valid file' do
it 'processes file', :aggregate_failures do
expect { execute }
.to not_change { Packages::Package.count }
.and change { package.name }.from(package.name).to(expected['name'])
.and change { package.version }.from(package.version).to(expected['version'])
.and change { package.status }.from('processing').to('default')
.and not_change { Packages::PackageFile.count }
.and change { package_file.file_name }.from(package_file.file_name).to("#{expected['name']}-#{expected['version']}.tgz")
.and change { Packages::Helm::FileMetadatum.count }.by(1)
.and change { package_file.helm_file_metadatum }.from(nil)
expect(package_file.helm_file_metadatum.channel).to eq(channel)
expect(package_file.helm_file_metadatum.metadata).to eq(expected)
end
end
context 'without Chart.yaml' do
before do
expect_next_instances_of(Gem::Package::TarReader::Entry, 14) do |entry|
expect(entry).to receive(:full_name).exactly(:once).and_wrap_original do |m, *args|
m.call(*args) + '_suffix'
end
end
end
it { expect { execute }.to raise_error(Packages::Helm::ExtractFileMetadataService::ExtractionError, 'Chart.yaml not found within a directory') }
end
context 'with Chart.yaml at root' do
before do
expect_next_instances_of(Gem::Package::TarReader::Entry, 14) do |entry|
expect(entry).to receive(:full_name).exactly(:once).and_return('Chart.yaml')
end
end
it { expect { execute }.to raise_error(Packages::Helm::ExtractFileMetadataService::ExtractionError, 'Chart.yaml not found within a directory') }
end
context 'with an invalid YAML' do
before do
expect_next_instance_of(Gem::Package::TarReader::Entry) do |entry|
expect(entry).to receive(:read).and_return('{')
end
end
it { expect { execute }.to raise_error(Packages::Helm::ExtractFileMetadataService::ExtractionError, 'Error while parsing Chart.yaml: (<unknown>): did not find expected node content while parsing a flow node at line 2 column 1') }
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Npm
class CreatePackageService < ::Packages::CreatePackageService
include Gitlab::Utils::StrongMemoize
include ExclusiveLeaseGuard
PACKAGE_JSON_NOT_ALLOWED_FIELDS = %w[readme readmeFilename licenseText contributors exports].freeze
DEFAULT_LEASE_TIMEOUT = 1.hour.to_i
def execute
return error('Version is empty.', 400) if version.blank?
return error('Attachment data is empty.', 400) if attachment['data'].blank?
return error('Package already exists.', 403) if current_package_exists?
return error('Package protected.', 403) if current_package_protected?
return error('File is too large.', 400) if file_size_exceeded?
package = try_obtain_lease do
ApplicationRecord.transaction { create_npm_package! }
end
return error('Could not obtain package lease. Please try again.', 400) unless package
package
end
private
def create_npm_package!
package = create_package!(:npm, name: name, version: version)
::Packages::CreatePackageFileService.new(package, file_params).execute
::Packages::CreateDependencyService.new(package, package_dependencies).execute
::Packages::Npm::CreateTagService.new(package, dist_tag).execute
create_npm_metadatum!(package)
package
end
def create_npm_metadatum!(package)
package.create_npm_metadatum!(package_json: package_json)
rescue ActiveRecord::RecordInvalid => e
if package.npm_metadatum && package.npm_metadatum.errors.where(:package_json, :too_large).any? # rubocop: disable CodeReuse/ActiveRecord
Gitlab::ErrorTracking.track_exception(e, field_sizes: field_sizes_for_error_tracking)
end
raise
end
def current_package_exists?
project.packages
.npm
.with_name(name)
.with_version(version)
.not_pending_destruction
.exists?
end
def current_package_protected?
return false if Feature.disabled?(:packages_protected_packages, project)
user_project_authorization_access_level = current_user.max_member_access_for_project(project.id)
project.package_protection_rules.push_protected_from?(access_level: user_project_authorization_access_level, package_name: name, package_type: :npm)
end
def name
params[:name]
end
def version
params[:versions].each_key.first
end
strong_memoize_attr :version
def version_data
params[:versions][version]
end
def package_json
version_data.except(*PACKAGE_JSON_NOT_ALLOWED_FIELDS)
end
def dist_tag
params['dist-tags'].each_key.first
end
def package_file_name
"#{name}-#{version}.tgz"
end
strong_memoize_attr :package_file_name
def attachment
params['_attachments'][package_file_name]
end
strong_memoize_attr :attachment
# TODO (technical debt): Extract the package size calculation to its own component and unit test it separately.
def calculated_package_file_size
# This calculation is based on:
# 1. 4 chars in a Base64 encoded string are 3 bytes in the original string. Meaning 1 char is 0.75 bytes.
# 2. The encoded string may have 1 or 2 extra '=' chars used for padding. Each padding char means 1 byte less in the original string.
# Reference:
# - https://blog.aaronlenoir.com/2017/11/10/get-original-length-from-base-64-string/
# - https://en.wikipedia.org/wiki/Base64#Decoding_Base64_with_padding
encoded_data = attachment['data']
((encoded_data.length * 0.75) - encoded_data[-2..].count('=')).to_i
end
strong_memoize_attr :calculated_package_file_size
def file_params
{
file: CarrierWaveStringFile.new(Base64.decode64(attachment['data'])),
size: calculated_package_file_size,
file_sha1: version_data[:dist][:shasum],
file_name: package_file_name,
build: params[:build]
}
end
def package_dependencies
_version, versions_data = params[:versions].first
versions_data
end
def file_size_exceeded?
project.actual_limits.exceeded?(:npm_max_file_size, calculated_package_file_size)
end
# used by ExclusiveLeaseGuard
def lease_key
"packages:npm:create_package_service:packages:#{project.id}_#{name}_#{version}"
end
# used by ExclusiveLeaseGuard
def lease_timeout
DEFAULT_LEASE_TIMEOUT
end
def field_sizes
package_json.transform_values do |value|
value.to_s.size
end
end
strong_memoize_attr :field_sizes
def filtered_field_sizes
field_sizes.select do |_, size|
size >= ::Packages::Npm::Metadatum::MIN_PACKAGE_JSON_FIELD_SIZE_FOR_ERROR_TRACKING
end
end
strong_memoize_attr :filtered_field_sizes
def largest_fields
field_sizes
.sort_by { |a| a[1] }
.reverse[0..::Packages::Npm::Metadatum::NUM_FIELDS_FOR_ERROR_TRACKING - 1]
.to_h
end
strong_memoize_attr :largest_fields
def field_sizes_for_error_tracking
filtered_field_sizes.empty? ? largest_fields : filtered_field_sizes
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Npm::CreatePackageService, feature_category: :package_registry do
let(:service) { described_class.new(project, user, params) }
subject { service.execute }
describe '#execute' do
include ExclusiveLeaseHelpers
let_it_be(:namespace) { create(:namespace) }
let_it_be_with_reload(:project) { create(:project, namespace: namespace) }
let_it_be(:user) { project.owner }
let(:version) { '1.0.1' }
let(:params) do
Gitlab::Json.parse(fixture_file('packages/npm/payload.json')
.gsub('@root/npm-test', package_name)
.gsub('1.0.1', version)).with_indifferent_access
end
let(:package_name) { "@#{namespace.path}/my-app" }
let(:version_data) { params.dig('versions', version) }
let(:lease_key) { "packages:npm:create_package_service:packages:#{project.id}_#{package_name}_#{version}" }
shared_examples 'valid package' do
it 'creates a package' do
expect { subject }
.to change { Packages::Package.count }.by(1)
.and change { Packages::Package.npm.count }.by(1)
.and change { Packages::Tag.count }.by(1)
.and change { Packages::Npm::Metadatum.count }.by(1)
end
it_behaves_like 'assigns the package creator' do
let(:package) { subject }
end
it { is_expected.to be_valid }
it 'creates a package with name and version' do
package = subject
expect(package.name).to eq(package_name)
expect(package.version).to eq(version)
end
it { expect(subject.npm_metadatum.package_json).to eq(version_data) }
it { expect(subject.name).to eq(package_name) }
it { expect(subject.version).to eq(version) }
context 'with build info' do
let_it_be(:job) { create(:ci_build, user: user) }
let(:params) { super().merge(build: job) }
it_behaves_like 'assigns build to package'
it_behaves_like 'assigns status to package'
it 'creates a package file build info' do
expect { subject }.to change { Packages::PackageFileBuildInfo.count }.by(1)
end
end
context 'when the npm metadatum creation results in a size error' do
shared_examples 'a package json structure size too large error' do
it 'does not create the package' do
expect(Gitlab::ErrorTracking).to receive(:track_exception).with(
instance_of(ActiveRecord::RecordInvalid),
field_sizes: expected_field_sizes
)
expect { subject }.to raise_error(ActiveRecord::RecordInvalid, /structure is too large/)
.and not_change { Packages::Package.count }
.and not_change { Packages::Package.npm.count }
.and not_change { Packages::Tag.count }
.and not_change { Packages::Npm::Metadatum.count }
end
end
context 'when some of the field sizes are above the error tracking size' do
let(:package_json) do
params[:versions][version].except(*::Packages::Npm::CreatePackageService::PACKAGE_JSON_NOT_ALLOWED_FIELDS)
end
# Only the fields that exceed the field size limit should be passed to error tracking
let(:expected_field_sizes) do
{
'test' => ('test' * 10000).size,
'field2' => ('a' * (::Packages::Npm::Metadatum::MIN_PACKAGE_JSON_FIELD_SIZE_FOR_ERROR_TRACKING + 1)).size
}
end
before do
params[:versions][version][:test] = 'test' * 10000
params[:versions][version][:field1] =
'a' * (::Packages::Npm::Metadatum::MIN_PACKAGE_JSON_FIELD_SIZE_FOR_ERROR_TRACKING - 1)
params[:versions][version][:field2] =
'a' * (::Packages::Npm::Metadatum::MIN_PACKAGE_JSON_FIELD_SIZE_FOR_ERROR_TRACKING + 1)
end
it_behaves_like 'a package json structure size too large error'
end
context 'when all of the field sizes are below the error tracking size' do
let(:package_json) do
params[:versions][version].except(*::Packages::Npm::CreatePackageService::PACKAGE_JSON_NOT_ALLOWED_FIELDS)
end
let(:expected_size) { ('a' * (::Packages::Npm::Metadatum::MIN_PACKAGE_JSON_FIELD_SIZE_FOR_ERROR_TRACKING - 1)).size }
# Only the five largest fields should be passed to error tracking
let(:expected_field_sizes) do
{
'field1' => expected_size,
'field2' => expected_size,
'field3' => expected_size,
'field4' => expected_size,
'field5' => expected_size
}
end
before do
5.times do |i|
params[:versions][version]["field#{i + 1}"] =
'a' * (::Packages::Npm::Metadatum::MIN_PACKAGE_JSON_FIELD_SIZE_FOR_ERROR_TRACKING - 1)
end
end
it_behaves_like 'a package json structure size too large error'
end
end
context 'when the npm metadatum creation results in a different error' do
it 'does not track the error' do
error_message = 'boom'
invalid_npm_metadatum_error = ActiveRecord::RecordInvalid.new(
build(:npm_metadatum).tap do |metadatum|
metadatum.errors.add(:base, error_message)
end
)
allow_next_instance_of(::Packages::Package) do |package|
allow(package).to receive(:create_npm_metadatum!).and_raise(invalid_npm_metadatum_error)
end
expect(Gitlab::ErrorTracking).not_to receive(:track_exception)
expect { subject }.to raise_error(ActiveRecord::RecordInvalid, /#{error_message}/)
end
end
described_class::PACKAGE_JSON_NOT_ALLOWED_FIELDS.each do |field|
context "with not allowed #{field} field" do
before do
params[:versions][version][field] = 'test'
end
it 'is persisted without the field' do
expect { subject }
.to change { Packages::Package.count }.by(1)
.and change { Packages::Package.npm.count }.by(1)
.and change { Packages::Tag.count }.by(1)
.and change { Packages::Npm::Metadatum.count }.by(1)
expect(subject.npm_metadatum.package_json[field]).to be_blank
end
end
end
end
context 'scoped package' do
it_behaves_like 'valid package'
end
context 'when user is no project member' do
let_it_be(:user) { create(:user) }
it_behaves_like 'valid package'
end
context 'scoped package not following the naming convention' do
let(:package_name) { '@any-scope/package' }
it_behaves_like 'valid package'
end
context 'unscoped package' do
let(:package_name) { 'unscoped-package' }
it_behaves_like 'valid package'
end
context 'package already exists' do
let(:package_name) { "@#{namespace.path}/my_package" }
let!(:existing_package) { create(:npm_package, project: project, name: package_name, version: '1.0.1') }
it { expect(subject[:http_status]).to eq 403 }
it { expect(subject[:message]).to be 'Package already exists.' }
context 'marked as pending_destruction' do
before do
existing_package.pending_destruction!
end
it 'creates a new package' do
expect { subject }
.to change { Packages::Package.count }.by(1)
.and change { Packages::Package.npm.count }.by(1)
.and change { Packages::Tag.count }.by(1)
.and change { Packages::Npm::Metadatum.count }.by(1)
end
end
end
describe 'max file size validation' do
let(:max_file_size) { 5.bytes }
shared_examples_for 'max file size validation failure' do
it 'returns a 400 error', :aggregate_failures do
expect(subject[:http_status]).to eq 400
expect(subject[:message]).to be 'File is too large.'
end
end
before do
project.actual_limits.update!(npm_max_file_size: max_file_size)
end
context 'when max file size is exceeded' do
# NOTE: The base64 encoded package data in the fixture file is the "hello\n" string, whose byte size is 6.
it_behaves_like 'max file size validation failure'
end
context 'when file size is faked by setting the attachment length param to a lower size' do
let(:params) { super().deep_merge!({ _attachments: { "#{package_name}-#{version}.tgz" => { data: encoded_package_data, length: 1 } } }) }
# TODO (technical debt): Extract the package size calculation outside the service and add separate specs for it.
# Right now we have several contexts here to test the calculation's different scenarios.
context 'when encoded package data is not padded' do
# 'Hello!' (size = 6 bytes) => 'SGVsbG8h'
let(:encoded_package_data) { 'SGVsbG8h' }
it_behaves_like 'max file size validation failure'
end
context "when encoded package data is padded with '='" do
let(:max_file_size) { 4.bytes }
# 'Hello' (size = 5 bytes) => 'SGVsbG8='
let(:encoded_package_data) { 'SGVsbG8=' }
it_behaves_like 'max file size validation failure'
end
context "when encoded package data is padded with '=='" do
let(:max_file_size) { 3.bytes }
# 'Hell' (size = 4 bytes) => 'SGVsbA=='
let(:encoded_package_data) { 'SGVsbA==' }
it_behaves_like 'max file size validation failure'
end
end
end
context 'with invalid name' do
where(:package_name) do
[
'@inv@lid_scope/package',
'@scope/sub/group',
'@scope/../../package',
'@scope%2e%2e%2fpackage'
]
end
with_them do
it { expect { subject }.to raise_error(ActiveRecord::RecordInvalid) }
end
end
context 'with empty versions' do
let(:params) { super().merge!({ versions: {} }) }
it { expect(subject[:http_status]).to eq 400 }
it { expect(subject[:message]).to eq 'Version is empty.' }
end
context 'with invalid versions' do
where(:version) do
[
'1',
'1.2',
'1./2.3',
'../../../../../1.2.3',
'%2e%2e%2f1.2.3'
]
end
with_them do
it { expect { subject }.to raise_error(ActiveRecord::RecordInvalid, "Validation failed: Version #{Gitlab::Regex.semver_regex_message}") }
end
end
context 'with empty attachment data' do
let(:params) { super().merge({ _attachments: { "#{package_name}-#{version}.tgz" => { data: '' } } }) }
it { expect(subject[:http_status]).to eq 400 }
it { expect(subject[:message]).to eq 'Attachment data is empty.' }
end
it 'obtains a lease to create a new package' do
expect_to_obtain_exclusive_lease(lease_key, timeout: described_class::DEFAULT_LEASE_TIMEOUT)
subject
end
context 'when the lease is already taken' do
before do
stub_exclusive_lease_taken(lease_key, timeout: described_class::DEFAULT_LEASE_TIMEOUT)
end
it { expect(subject[:http_status]).to eq 400 }
it { expect(subject[:message]).to eq 'Could not obtain package lease. Please try again.' }
end
context 'when feature flag :packages_protected_packages disabled' do
let_it_be_with_reload(:package_protection_rule) { create(:package_protection_rule, package_type: :npm, project: project) }
before do
stub_feature_flags(packages_protected_packages: false)
end
context 'with matching package protection rule for all roles' do
using RSpec::Parameterized::TableSyntax
let(:package_name_pattern_no_match) { "#{package_name}_no_match" }
where(:package_name_pattern, :push_protected_up_to_access_level) do
ref(:package_name) | :developer
ref(:package_name) | :owner
ref(:package_name_pattern_no_match) | :developer
ref(:package_name_pattern_no_match) | :owner
end
with_them do
before do
package_protection_rule.update!(package_name_pattern: package_name_pattern, push_protected_up_to_access_level: push_protected_up_to_access_level)
end
it_behaves_like 'valid package'
end
end
end
context 'with package protection rule for different roles and package_name_patterns' do
using RSpec::Parameterized::TableSyntax
let_it_be_with_reload(:package_protection_rule) { create(:package_protection_rule, package_type: :npm, project: project) }
let_it_be(:project_developer) { create(:user).tap { |u| project.add_developer(u) } }
let_it_be(:project_maintainer) { create(:user).tap { |u| project.add_maintainer(u) } }
let(:project_owner) { project.owner }
let(:package_name_pattern_no_match) { "#{package_name}_no_match" }
let(:service) { described_class.new(project, current_user, params) }
shared_examples 'protected package' do
it { is_expected.to include http_status: 403, message: 'Package protected.' }
it 'does not create any npm-related package records' do
expect { subject }
.to not_change { Packages::Package.count }
.and not_change { Packages::Package.npm.count }
.and not_change { Packages::Tag.count }
.and not_change { Packages::Npm::Metadatum.count }
end
end
where(:package_name_pattern, :push_protected_up_to_access_level, :current_user, :shared_examples_name) do
ref(:package_name) | :developer | ref(:project_developer) | 'protected package'
ref(:package_name) | :developer | ref(:project_owner) | 'valid package'
ref(:package_name) | :maintainer | ref(:project_maintainer) | 'protected package'
ref(:package_name) | :owner | ref(:project_owner) | 'protected package'
ref(:package_name_pattern_no_match) | :developer | ref(:project_owner) | 'valid package'
ref(:package_name_pattern_no_match) | :owner | ref(:project_owner) | 'valid package'
end
with_them do
before do
package_protection_rule.update!(package_name_pattern: package_name_pattern, push_protected_up_to_access_level: push_protected_up_to_access_level)
end
it_behaves_like params[:shared_examples_name]
end
end
describe '#lease_key' do
subject { service.send(:lease_key) }
it 'returns an unique key' do
is_expected.to eq lease_key
end
end
end
context 'when many of the same packages are created at the same time', :delete do
let(:namespace) { create(:namespace) }
let(:project) { create(:project, namespace: namespace) }
let(:user) { project.owner }
let(:version) { '1.0.1' }
let(:params) do
Gitlab::Json.parse(
fixture_file('packages/npm/payload.json')
.gsub('@root/npm-test', package_name)
.gsub('1.0.1', version)
).with_indifferent_access
end
let(:package_name) { "@#{namespace.path}/my-app" }
let(:service) { described_class.new(project, user, params) }
subject { service.execute }
it 'only creates one package' do
expect { create_packages(project, user, params) }.to change { Packages::Package.count }.by(1)
end
context 'with different versions' do
it 'creates all packages' do
expect { create_packages_with_versions(project, user, params) }.to change { Packages::Package.count }.by(5)
end
end
def create_packages(project, user, params)
with_threads do
described_class.new(project, user, params).execute
end
end
def create_packages_with_versions(project, user, params)
with_threads do |i|
# Modify the package's version
modified_params = Gitlab::Json.parse(params.to_json
.gsub(version, "1.0.#{i}")).with_indifferent_access
described_class.new(project, user, modified_params).execute
end
end
def with_threads(count: 5, &block)
return unless block
# create a race condition - structure from https://blog.arkency.com/2015/09/testing-race-conditions/
wait_for_it = true
threads = Array.new(count) do |i|
Thread.new do
# A loop to make threads busy until we `join` them
true while wait_for_it
yield(i)
end
end
wait_for_it = false
threads.each(&:join)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Npm
class GenerateMetadataService
include API::Helpers::RelatedResourcesHelpers
include Gitlab::Utils::StrongMemoize
# Allowed fields are those defined in the abbreviated form
# defined here: https://github.com/npm/registry/blob/master/docs/responses/package-metadata.md#abbreviated-version-object
# except: name, version, dist, dependencies and xDependencies. Those are generated by this service.
PACKAGE_JSON_ALLOWED_FIELDS = %w[deprecated bin directories dist engines _hasShrinkwrap].freeze
def initialize(name, packages)
@name = name
@packages = packages
@dependencies = {}
@dependency_ids = Hash.new { |h, key| h[key] = {} }
end
def execute(only_dist_tags: false)
ServiceResponse.success(payload: metadata(only_dist_tags))
end
private
attr_reader :name, :packages, :dependencies, :dependency_ids
def metadata(only_dist_tags)
result = { dist_tags: dist_tags }
unless only_dist_tags
result[:name] = name
result[:versions] = versions
end
result
end
def versions
package_versions = {}
packages.each_batch do |relation|
load_dependencies(relation)
load_dependency_ids(relation)
batched_packages = relation.preload_files
.preload_npm_metadatum
batched_packages.each do |package|
package_file = package.installable_package_files.last
next unless package_file
package_versions[package.version] = build_package_version(package, package_file)
end
end
package_versions
end
def dist_tags
build_package_tags.tap { |t| t['latest'] ||= sorted_versions.last }
end
def build_package_tags
package_tags.to_h { |tag| [tag.name, tag.package.version] }
end
def build_package_version(package, package_file)
abbreviated_package_json(package).merge(
name: package.name,
version: package.version,
dist: {
shasum: package_file.file_sha1,
tarball: tarball_url(package, package_file)
}
).tap do |package_version|
package_version.merge!(build_package_dependencies(package))
end
end
def tarball_url(package, package_file)
expose_url api_v4_projects_packages_npm_package_name___file_name_path(
{ id: package.project_id, package_name: package.name, file_name: package_file.file_name }, true
)
end
def build_package_dependencies(package)
dependency_ids[package.id].each_with_object(Hash.new { |h, key| h[key] = {} }) do |(type, ids), memo|
ids.each do |id|
memo[inverted_dependency_types[type]].merge!(dependencies[id])
end
end
end
def inverted_dependency_types
Packages::DependencyLink.dependency_types.invert.stringify_keys
end
strong_memoize_attr :inverted_dependency_types
def sorted_versions
versions = packages.pluck_versions.compact
VersionSorter.sort(versions)
end
def package_tags
Packages::Tag.for_package_ids(packages)
.preload_package
end
def abbreviated_package_json(package)
json = package.npm_metadatum&.package_json || {}
json.slice(*PACKAGE_JSON_ALLOWED_FIELDS)
end
def load_dependencies(packages)
Packages::Dependency
.id_in(
Packages::DependencyLink
.for_packages(packages)
.select_dependency_id
)
.id_not_in(dependencies.keys)
.each_batch do |relation|
relation.each do |dependency|
dependencies[dependency.id] = { dependency.name => dependency.version_pattern }
end
end
end
def load_dependency_ids(packages)
Packages::DependencyLink
.dependency_ids_grouped_by_type(packages)
.each_batch(column: :package_id) do |relation|
relation.each do |dependency_link|
dependency_ids[dependency_link.package_id] = dependency_link.dependency_ids_by_type
end
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe ::Packages::Npm::GenerateMetadataService, feature_category: :package_registry do
using RSpec::Parameterized::TableSyntax
let_it_be(:project) { create(:project) }
let_it_be(:package_name) { "@#{project.root_namespace.path}/test" }
let_it_be(:package1) { create(:npm_package, version: '2.0.4', project: project, name: package_name) }
let_it_be(:package2) { create(:npm_package, version: '2.0.6', project: project, name: package_name) }
let_it_be(:latest_package) { create(:npm_package, version: '2.0.11', project: project, name: package_name) }
let(:packages) { project.packages.npm.with_name(package_name) }
let(:metadata) { described_class.new(package_name, packages).execute }
describe '#versions' do
let_it_be(:version_schema) { 'public_api/v4/packages/npm_package_version' }
let_it_be(:package_json) do
{
name: package_name,
version: '2.0.4',
deprecated: 'warning!',
bin: './cli.js',
directories: ['lib'],
engines: { npm: '^7.5.6' },
_hasShrinkwrap: false,
dist: {
tarball: 'http://localhost/tarball.tgz',
shasum: '1234567890'
},
custom_field: 'foo_bar'
}
end
subject { metadata[:versions] }
where(:has_dependencies, :has_metadatum) do
true | true
false | true
true | false
false | false
end
with_them do
if params[:has_dependencies]
::Packages::DependencyLink.dependency_types.each_key do |dependency_type| # rubocop:disable RSpec/UselessDynamicDefinition -- `dependency_type` used in `let_it_be`
let_it_be("package_dependency_link_for_#{dependency_type}") do
create(:packages_dependency_link, package: package1, dependency_type: dependency_type)
end
end
end
if params[:has_metadatum]
let_it_be(:package_metadatadum) { create(:npm_metadatum, package: package1, package_json: package_json) }
end
it { is_expected.to be_a(Hash) }
it { expect(subject[package1.version].with_indifferent_access).to match_schema(version_schema) }
it { expect(subject[package2.version].with_indifferent_access).to match_schema(version_schema) }
it { expect(subject[package1.version]['custom_field']).to be_blank }
context 'for dependencies' do
::Packages::DependencyLink.dependency_types.each_key do |dependency_type|
if params[:has_dependencies]
it { expect(subject.dig(package1.version, dependency_type.to_s)).to be_any }
else
it { expect(subject.dig(package1.version, dependency_type)).to be nil }
end
it { expect(subject.dig(package2.version, dependency_type)).to be nil }
end
context 'when generate dependencies' do
let(:packages) { ::Packages::Package.where(id: package1.id) }
it 'loads grouped dependency links', :aggregate_failures do
expect(::Packages::DependencyLink).to receive(:dependency_ids_grouped_by_type).and_call_original
expect(::Packages::Package).not_to receive(:including_dependency_links)
subject
end
end
end
context 'for metadatum' do
::Packages::Npm::GenerateMetadataService::PACKAGE_JSON_ALLOWED_FIELDS.each do |metadata_field|
if params[:has_metadatum]
it { expect(subject.dig(package1.version, metadata_field)).not_to be nil }
else
it { expect(subject.dig(package1.version, metadata_field)).to be nil }
end
it { expect(subject.dig(package2.version, metadata_field)).to be nil }
end
end
it 'avoids N+1 database queries' do
check_n_plus_one do
create_list(:npm_package, 5, project: project, name: package_name).each do |npm_package|
next unless has_dependencies
::Packages::DependencyLink.dependency_types.each_key do |dependency_type|
create(:packages_dependency_link, package: npm_package, dependency_type: dependency_type)
end
end
end
end
end
context 'with package files pending destruction' do
let_it_be(:package_file_pending_destruction) do
create(:package_file, :pending_destruction, package: package2, file_sha1: 'pending_destruction_sha1')
end
let(:shasums) { subject.values.map { |v| v.dig(:dist, :shasum) } }
it 'does not return them' do
expect(shasums).not_to include(package_file_pending_destruction.file_sha1)
end
end
end
describe '#dist_tags' do
subject { metadata[:dist_tags] }
context 'for packages without tags' do
it { is_expected.to be_a(Hash) }
it { expect(subject['latest']).to eq(latest_package.version) }
it 'avoids N+1 database queries' do
check_n_plus_one(only_dist_tags: true) do
create_list(:npm_package, 5, project: project, name: package_name)
end
end
end
context 'for packages with tags' do
let_it_be(:package_tag1) { create(:packages_tag, package: package1, name: 'release_a') }
let_it_be(:package_tag2) { create(:packages_tag, package: package1, name: 'test_release') }
let_it_be(:package_tag3) { create(:packages_tag, package: package2, name: 'release_b') }
let_it_be(:package_tag4) { create(:packages_tag, package: latest_package, name: 'release_c') }
let_it_be(:package_tag5) { create(:packages_tag, package: latest_package, name: 'latest') }
it { is_expected.to be_a(Hash) }
it { expect(subject[package_tag1.name]).to eq(package1.version) }
it { expect(subject[package_tag2.name]).to eq(package1.version) }
it { expect(subject[package_tag3.name]).to eq(package2.version) }
it { expect(subject[package_tag4.name]).to eq(latest_package.version) }
it { expect(subject[package_tag5.name]).to eq(latest_package.version) }
it 'avoids N+1 database queries' do
check_n_plus_one(only_dist_tags: true) do
create_list(:npm_package, 5, project: project, name: package_name).each_with_index do |npm_package, index|
create(:packages_tag, package: npm_package, name: "tag_#{index}")
end
end
end
end
end
context 'when passing only_dist_tags: true' do
subject { described_class.new(package_name, packages).execute(only_dist_tags: true) }
it 'returns only dist tags' do
expect(subject.payload.keys).to contain_exactly(:dist_tags)
end
end
def check_n_plus_one(only_dist_tags: false)
pkgs = project.packages.npm.with_name(package_name).preload_files
control = ActiveRecord::QueryRecorder.new do
described_class.new(package_name, pkgs).execute(only_dist_tags: only_dist_tags)
end
yield
pkgs = project.packages.npm.with_name(package_name).preload_files
expect do
described_class.new(package_name, pkgs).execute(only_dist_tags: only_dist_tags)
end.not_to exceed_query_limit(control)
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Npm
class DeprecatePackageService < BaseService
Deprecated = Struct.new(:package_id, :message)
BATCH_SIZE = 50
def initialize(project, params)
super(project, nil, params)
end
def execute(async: false)
return ::Packages::Npm::DeprecatePackageWorker.perform_async(project.id, filtered_params) if async
packages.select(:id, :version).each_batch(of: BATCH_SIZE) do |relation|
deprecated_metadatum = handle_batch(relation)
update_metadatum(deprecated_metadatum)
end
end
private
# To avoid passing the whole metadata to the worker
def filtered_params
{
package_name: params[:package_name],
versions: params[:versions].transform_values { |version| version.slice(:deprecated) }
}
end
def packages
::Packages::Npm::PackageFinder
.new(params['package_name'], project: project)
.execute
end
def handle_batch(relation)
relation
.preload_npm_metadatum
.filter_map { |package| deprecate(package) }
end
def deprecate(package)
deprecation_message = params.dig('versions', package.version, 'deprecated')
return if deprecation_message.nil?
npm_metadatum = package.npm_metadatum
return if identical?(npm_metadatum.package_json['deprecated'], deprecation_message)
Deprecated.new(npm_metadatum.package_id, deprecation_message)
end
def identical?(package_json_deprecated, deprecation_message)
package_json_deprecated == deprecation_message ||
(package_json_deprecated.nil? && deprecation_message.empty?)
end
def update_metadatum(deprecated_metadatum)
return if deprecated_metadatum.empty?
deprecation_message = deprecated_metadatum.first.message
::Packages::Npm::Metadatum
.package_id_in(deprecated_metadatum.map(&:package_id))
.update_all(update_clause(deprecation_message))
end
def update_clause(deprecation_message)
if deprecation_message.empty?
"package_json = package_json - 'deprecated'"
else
["package_json = jsonb_set(package_json, '{deprecated}', ?)", deprecation_message.to_json]
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Npm::DeprecatePackageService, feature_category: :package_registry do
let_it_be(:namespace) { create(:namespace) }
let_it_be(:project) { create(:project, namespace: namespace) }
let_it_be(:package_name) { "@#{namespace.path}/my-app" }
let_it_be_with_reload(:package_1) do
create(:npm_package, project: project, name: package_name, version: '1.0.1').tap do |package|
create(:npm_metadatum, package: package)
end
end
let_it_be(:package_2) do
create(:npm_package, project: project, name: package_name, version: '1.0.2').tap do |package|
create(:npm_metadatum, package: package)
end
end
let(:service) { described_class.new(project, params) }
subject(:execute) { service.execute }
describe '#execute' do
context 'when passing deprecatation message' do
let(:params) do
{
'package_name' => package_name,
'versions' => {
'1.0.1' => {
'name' => package_name,
'deprecated' => 'This version is deprecated'
},
'1.0.2' => {
'name' => package_name,
'deprecated' => 'This version is deprecated'
}
}
}
end
before do
package_json = package_2.npm_metadatum.package_json
package_2.npm_metadatum.update!(package_json: package_json.merge('deprecated' => 'old deprecation message'))
end
it 'adds or updates the deprecated field' do
expect { execute }
.to change { package_1.reload.npm_metadatum.package_json['deprecated'] }.to('This version is deprecated')
.and change { package_2.reload.npm_metadatum.package_json['deprecated'] }
.from('old deprecation message').to('This version is deprecated')
end
it 'executes 5 queries' do
queries = ActiveRecord::QueryRecorder.new do
execute
end
# 1. each_batch lower bound
# 2. each_batch upper bound
# 3. SELECT packages_packages.id, packages_packages.version FROM packages_packages
# 4. SELECT packages_npm_metadata.* FROM packages_npm_metadata
# 5. UPDATE packages_npm_metadata SET package_json =
expect(queries.count).to eq(5)
end
end
context 'when passing deprecated as empty string' do
let(:params) do
{
'package_name' => package_name,
'versions' => {
'1.0.1' => {
'name' => package_name,
'deprecated' => ''
}
}
}
end
before do
package_json = package_1.npm_metadatum.package_json
package_1.npm_metadatum.update!(package_json: package_json.merge('deprecated' => 'This version is deprecated'))
end
it 'removes the deprecation warning' do
expect { execute }
.to change { package_1.reload.npm_metadatum.package_json['deprecated'] }
.from('This version is deprecated').to(nil)
end
end
context 'when passing async: true to execute' do
let(:params) do
{
package_name: package_name,
versions: {
'1.0.1': {
deprecated: 'This version is deprecated'
}
}
}
end
it 'calls the worker and return' do
expect(::Packages::Npm::DeprecatePackageWorker).to receive(:perform_async).with(project.id, params)
expect(service).not_to receive(:packages)
service.execute(async: true)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Npm
class CreateMetadataCacheService
include Gitlab::Utils::StrongMemoize
include ExclusiveLeaseGuard
# used by ExclusiveLeaseGuard
DEFAULT_LEASE_TIMEOUT = 1.hour.to_i.freeze
def initialize(project, package_name)
@project = project
@package_name = package_name
end
def execute
try_obtain_lease do
Packages::Npm::MetadataCache
.find_or_build(package_name: package_name, project_id: project.id)
.update!(
file: CarrierWaveStringFile.new(metadata_content),
size: metadata_content.bytesize
)
end
end
private
attr_reader :package_name, :project
def metadata_content
::API::Entities::NpmPackage.represent(metadata.payload).to_json
end
strong_memoize_attr :metadata_content
def packages
::Packages::Npm::PackageFinder
.new(package_name, project: project)
.execute
end
def metadata
Packages::Npm::GenerateMetadataService.new(package_name, packages).execute
end
# used by ExclusiveLeaseGuard
def lease_key
"packages:npm:create_metadata_cache_service:metadata_caches:#{project.id}_#{package_name}"
end
# used by ExclusiveLeaseGuard
def lease_timeout
DEFAULT_LEASE_TIMEOUT
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Npm::CreateMetadataCacheService, :clean_gitlab_redis_shared_state, feature_category: :package_registry do
include ExclusiveLeaseHelpers
let_it_be(:project) { create(:project) }
let_it_be(:package_name) { "@#{project.root_namespace.path}/npm-test" }
let_it_be(:package) { create(:npm_package, version: '1.0.0', project: project, name: package_name) }
let(:lease_key) { "packages:npm:create_metadata_cache_service:metadata_caches:#{project.id}_#{package_name}" }
let(:service) { described_class.new(project, package_name) }
describe '#execute' do
let(:npm_metadata_cache) { Packages::Npm::MetadataCache.last }
subject { service.execute }
it 'creates a new metadata cache', :aggregate_failures do
expect { subject }.to change { Packages::Npm::MetadataCache.count }.by(1)
metadata = Gitlab::Json.parse(npm_metadata_cache.file.read)
expect(npm_metadata_cache.package_name).to eq(package_name)
expect(npm_metadata_cache.project_id).to eq(project.id)
expect(npm_metadata_cache.size).to eq(metadata.to_json.bytesize)
expect(metadata['name']).to eq(package_name)
expect(metadata['versions'].keys).to contain_exactly('1.0.0')
end
context 'with existing metadata cache' do
let_it_be(:npm_metadata_cache) { create(:npm_metadata_cache, package_name: package_name, project_id: project.id) }
let_it_be(:metadata) { Gitlab::Json.parse(npm_metadata_cache.file.read) }
let_it_be(:metadata_size) { npm_metadata_cache.size }
let_it_be(:tag_name) { 'new-tag' }
let_it_be(:tag) { create(:packages_tag, package: package, name: tag_name) }
it 'does not create a new metadata cache' do
expect { subject }.to change { Packages::Npm::MetadataCache.count }.by(0)
end
it 'updates the metadata cache', :aggregate_failures do
subject
new_metadata = Gitlab::Json.parse(npm_metadata_cache.file.read)
expect(new_metadata).not_to eq(metadata)
expect(new_metadata['dist-tags'].keys).to include(tag_name)
expect(npm_metadata_cache.reload.size).not_to eq(metadata_size)
end
end
it 'obtains a lease to create a new metadata cache' do
expect_to_obtain_exclusive_lease(lease_key, timeout: described_class::DEFAULT_LEASE_TIMEOUT)
subject
end
context 'when the lease is already taken' do
before do
stub_exclusive_lease_taken(lease_key, timeout: described_class::DEFAULT_LEASE_TIMEOUT)
end
it 'does not create a new metadata cache' do
expect { subject }.to change { Packages::Npm::MetadataCache.count }.by(0)
end
it 'returns nil' do
expect(subject).to be_nil
end
end
end
describe '#lease_key' do
subject { service.send(:lease_key) }
it 'returns an unique key' do
is_expected.to eq lease_key
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Packages
module Npm
class CreateTagService
include Gitlab::Utils::StrongMemoize
attr_reader :package, :tag_name
def initialize(package, tag_name)
@package = package
@tag_name = tag_name
end
def execute
if existing_tag.present?
existing_tag.update_column(:package_id, package.id)
existing_tag
else
package.tags.create!(name: tag_name)
end
end
private
def existing_tag
Packages::TagsFinder
.new(package.project, package.name, package_type: package.package_type)
.find_by_name(tag_name)
end
strong_memoize_attr :existing_tag
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Packages::Npm::CreateTagService, feature_category: :package_registry do
let(:package) { create(:npm_package) }
let(:tag_name) { 'test-tag' }
describe '#execute' do
subject { described_class.new(package, tag_name).execute }
shared_examples 'it creates the tag' do
it { expect { subject }.to change { Packages::Tag.count }.by(1) }
it { expect(subject.name).to eq(tag_name) }
it 'adds tag to the package' do
tag = subject
expect(package.reload.tags).to match_array([tag])
end
end
context 'with no existing tag name' do
it_behaves_like 'it creates the tag'
end
context 'with exisiting tag name' do
let!(:package_tag2) { create(:packages_tag, package: package2, name: tag_name) }
context 'on package with different name' do
let!(:package2) { create(:npm_package, project: package.project) }
it_behaves_like 'it creates the tag'
end
context 'on different package type' do
let!(:package2) { create(:conan_package, project: package.project, name: 'conan_package_name', version: package.version) }
it_behaves_like 'it creates the tag'
end
context 'on same package with different version' do
let!(:package2) { create(:npm_package, project: package.project, name: package.name, version: '5.0.0-testing') }
it { expect { subject }.to not_change { Packages::Tag.count } }
it { expect(subject.name).to eq(tag_name) }
it 'adds tag to the package' do
tag = subject
expect(package.reload.tags).to match_array([tag])
expect(package2.reload.tags).to be_empty
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
class DestroyService < Boards::BaseService
def execute(board)
board.destroy!
ServiceResponse.success
end
private
def boards
parent.boards
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::DestroyService, feature_category: :team_planning do
context 'with project board' do
let_it_be(:parent) { create(:project) }
let(:boards) { parent.boards }
let(:board_factory) { :board }
it_behaves_like 'board destroy service'
end
context 'with group board' do
let_it_be(:parent) { create(:group) }
let(:boards) { parent.boards }
let(:board_factory) { :board }
it_behaves_like 'board destroy service'
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
class CreateService < Boards::BaseService
def execute
unless can_create_board?
return ServiceResponse.error(message: "You don't have the permission to create a board for this resource.")
end
create_board!
end
private
def can_create_board?
parent_board_collection.empty? || parent.multiple_issue_boards_available?
end
def create_board!
board = parent_board_collection.create(params)
unless board.persisted?
return ServiceResponse.error(message: "There was an error when creating a board.", payload: board)
end
board.tap do |created_board|
created_board.lists.create(list_type: :backlog)
created_board.lists.create(list_type: :closed)
end
ServiceResponse.success(payload: board)
end
def parent_board_collection
parent.boards
end
end
end
Boards::CreateService.prepend_mod_with('Boards::CreateService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::CreateService, feature_category: :team_planning do
describe '#execute' do
context 'when board parent is a project' do
let(:parent) { create(:project) }
subject(:service) { described_class.new(parent, double) }
it_behaves_like 'boards create service'
end
context 'when board parent is a group' do
let(:parent) { create(:group) }
subject(:service) { described_class.new(parent, double) }
it_behaves_like 'boards create service'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Lists
class MoveService < Boards::BaseService
def execute(list)
@board = list.board
@old_position = list.position
@new_position = params[:position]
return false unless list.movable?
return false unless valid_move?
list.with_lock do
reorder_intermediate_lists
update_list_position(list)
end
end
private
attr_reader :board, :old_position, :new_position
def valid_move?
new_position.present? && new_position != old_position && new_position.between?(0, max_position)
end
def max_position
board.lists.movable.maximum(:position)
end
def reorder_intermediate_lists
if old_position < new_position
decrement_intermediate_lists
else
increment_intermediate_lists
end
end
# rubocop: disable CodeReuse/ActiveRecord
def decrement_intermediate_lists
board.lists.movable.where('position > ?', old_position)
.where('position <= ?', new_position)
.update_all('position = position - 1')
end
# rubocop: enable CodeReuse/ActiveRecord
# rubocop: disable CodeReuse/ActiveRecord
def increment_intermediate_lists
board.lists.movable.where('position >= ?', new_position)
.where('position < ?', old_position)
.update_all('position = position + 1')
end
# rubocop: enable CodeReuse/ActiveRecord
def update_list_position(list)
list.update_attribute(:position, new_position)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Lists::MoveService, feature_category: :team_planning do
describe '#execute' do
context 'when board parent is a project' do
let(:project) { create(:project) }
let(:board) { create(:board, project: project) }
let(:user) { create(:user) }
let(:parent) { project }
it_behaves_like 'lists move service'
end
context 'when board parent is a group' do
let(:group) { create(:group) }
let(:board) { create(:board, group: group) }
let(:user) { create(:user) }
let(:parent) { group }
it_behaves_like 'lists move service'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Lists
# overridden in EE for board lists and also for epic board lists.
class DestroyService < Boards::Lists::BaseDestroyService
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Lists::DestroyService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let(:list_type) { :list }
describe '#execute' do
context 'when board parent is a project' do
let_it_be(:project) { create(:project) }
let_it_be(:board) { create(:board, project: project) }
let_it_be(:list) { create(:list, board: board) }
let_it_be(:closed_list) { board.lists.closed.first }
let(:params) do
{ board: board }
end
let(:parent) { project }
it_behaves_like 'lists destroy service'
end
context 'when board parent is a group' do
let_it_be(:group) { create(:group) }
let_it_be(:board) { create(:board, group: group) }
let_it_be(:list) { create(:list, board: board) }
let_it_be(:closed_list) { board.lists.closed.first }
let(:params) do
{ board: board }
end
let(:parent) { group }
it_behaves_like 'lists destroy service'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Lists
class UpdateService < Boards::Lists::BaseUpdateService
def can_read?(list)
Ability.allowed?(current_user, :read_issue_board_list, parent)
end
def can_admin?(list)
Ability.allowed?(current_user, :admin_issue_board_list, parent)
end
end
end
end
Boards::Lists::UpdateService.prepend_mod_with('Boards::Lists::UpdateService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Lists::UpdateService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let!(:list) { create(:list, board: board, position: 0) }
let!(:list2) { create(:list, board: board, position: 1) }
describe '#execute' do
let(:service) { described_class.new(board.resource_parent, user, params) }
context 'when position parameter is present' do
let(:params) { { position: 1 } }
context 'for projects' do
let(:project) { create(:project, :private) }
let(:board) { create(:board, project: project) }
it_behaves_like 'moving list'
end
context 'for groups' do
let(:group) { create(:group, :private) }
let(:board) { create(:board, group: group) }
it_behaves_like 'moving list'
end
end
context 'when collapsed parameter is present' do
let(:params) { { collapsed: true } }
context 'for projects' do
let(:project) { create(:project, :private) }
let(:board) { create(:board, project: project) }
it_behaves_like 'updating list preferences'
end
context 'for groups' do
let(:project) { create(:project, :private) }
let(:board) { create(:board, project: project) }
it_behaves_like 'updating list preferences'
end
end
context 'when position and collapsed are both present' do
let(:params) { { collapsed: true, position: 1 } }
context 'for projects' do
let(:project) { create(:project, :private) }
let(:board) { create(:board, project: project) }
it_behaves_like 'moving list'
it_behaves_like 'updating list preferences'
end
context 'for groups' do
let(:group) { create(:group, :private) }
let(:board) { create(:board, group: group) }
it_behaves_like 'moving list'
it_behaves_like 'updating list preferences'
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Lists
class ListService < Boards::BaseService
def execute(board, create_default_lists: true)
if create_default_lists && !board.lists.backlog.exists?
board.lists.create(list_type: :backlog)
end
lists = board.lists.preload_associated_models
lists = lists.with_types(available_list_types_for(board))
return lists.id_in(params[:list_id]) if params[:list_id].present?
lists
end
private
def available_list_types_for(board)
licensed_list_types(board) + visible_lists(board)
end
def licensed_list_types(board)
[List.list_types[:label]]
end
def visible_lists(board)
[].tap do |visible|
visible << ::List.list_types[:backlog] unless board.hide_backlog_list?
visible << ::List.list_types[:closed] unless board.hide_closed_list?
end
end
end
end
end
Boards::Lists::ListService.prepend_mod_with('Boards::Lists::ListService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Lists::ListService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let_it_be(:group) { create(:group) }
RSpec.shared_examples 'FOSS lists only' do
context 'when board contains a non FOSS list' do
# This scenario may happen when there used to be an EE license and user downgraded
let_it_be(:backlog_list) { board.lists.backlog.first }
let_it_be(:milestone) { create(:milestone, group: group) }
let_it_be(:assignee_list) do
list = build(:list, board: board, user_id: user.id, list_type: List.list_types[:assignee], position: 0)
list.save!(validate: false)
list
end
let_it_be(:milestone_list) do
list = build(:list, board: board, milestone_id: milestone.id, list_type: List.list_types[:milestone], position: 1) # rubocop:disable Layout/LineLength
list.save!(validate: false)
list
end
it "returns only FOSS board's lists" do
# just making sure these non FOSS lists actually exist on the board
expect(board.lists.with_types([List.list_types[:assignee], List.list_types[:milestone]]).count).to eq 2
# check that the FOSS lists are not returned from the service
expect(service.execute(board)).to match_array [backlog_list, list, board.lists.closed.first]
end
end
end
describe '#execute' do
let(:service) { described_class.new(parent, user) }
context 'when board parent is a project' do
let_it_be(:project) { create(:project, group: group) }
let_it_be_with_reload(:board) { create(:board, project: project) }
let_it_be(:label) { create(:label, project: project) }
let_it_be(:list) { create(:list, board: board, label: label) }
let_it_be(:unrelated_list) { create(:list) }
let(:parent) { project }
it_behaves_like 'lists list service'
it_behaves_like 'FOSS lists only'
end
context 'when board parent is a group' do
let_it_be_with_reload(:board) { create(:board, group: group) }
let_it_be(:label) { create(:group_label, group: group) }
let_it_be(:list) { create(:list, board: board, label: label) }
let_it_be(:unrelated_list) { create(:list) }
let(:parent) { group }
it_behaves_like 'lists list service'
it_behaves_like 'FOSS lists only'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Lists
class CreateService < Boards::Lists::BaseCreateService
end
end
end
Boards::Lists::CreateService.prepend_mod_with('Boards::Lists::CreateService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Lists::CreateService, feature_category: :team_planning do
context 'when board parent is a project' do
let_it_be(:parent) { create(:project) }
let_it_be(:board) { create(:board, project: parent) }
let_it_be(:label) { create(:label, project: parent, name: 'in-progress') }
it_behaves_like 'board lists create service'
end
context 'when board parent is a group' do
let_it_be(:parent) { create(:group) }
let_it_be(:board) { create(:board, group: parent) }
let_it_be(:label) { create(:group_label, group: parent, name: 'in-progress') }
it_behaves_like 'board lists create service'
end
def create_list(params)
create(:list, params.merge(board: board))
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Visits
class CreateService < Boards::BaseService
def execute(board)
return unless current_user && Gitlab::Database.read_write?
return unless board
model.visited!(current_user, board)
end
private
def model
return BoardGroupRecentVisit if parent.is_a?(Group)
BoardProjectRecentVisit
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Visits::CreateService, feature_category: :team_planning do
describe '#execute' do
let(:user) { create(:user) }
context 'when a project board' do
let_it_be(:project) { create(:project) }
let_it_be(:board) { create(:board, project: project) }
let_it_be(:model) { BoardProjectRecentVisit }
it_behaves_like 'boards recent visit create service'
end
context 'when a group board' do
let_it_be(:group) { create(:group) }
let_it_be(:board) { create(:board, group: group) }
let_it_be(:model) { BoardGroupRecentVisit }
it_behaves_like 'boards recent visit create service'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Issues
class MoveService < Boards::BaseItemMoveService
def execute_multiple(issues)
return execute_multiple_empty_result if issues.empty?
handled_issues = []
last_inserted_issue_id = nil
count = issues.each.inject(0) do |moved_count, issue|
issue_modification_params = issuable_params(issue)
next moved_count if issue_modification_params.empty?
if last_inserted_issue_id
issue_modification_params[:move_between_ids] = move_below(last_inserted_issue_id)
end
last_inserted_issue_id = issue.id
handled_issue = move_single_issuable(issue, issue_modification_params)
handled_issues << present_issue_entity(handled_issue) if handled_issue
handled_issue && handled_issue.valid? ? moved_count + 1 : moved_count
end
{
count: count,
success: count == issues.size,
issues: handled_issues
}
end
private
def present_issue_entity(issue)
::API::Entities::Issue.represent(issue)
end
def execute_multiple_empty_result
@execute_multiple_empty_result ||= {
count: 0,
success: false,
issues: []
}
end
def move_below(id)
move_between_ids({ move_after_id: nil, move_before_id: id })
end
def board
@board ||= parent.boards.find(params[:board_id])
end
def update(issue, issue_modification_params)
::Issues::UpdateService.new(container: issue.project, current_user: current_user, params: issue_modification_params).execute(issue)
end
def moving_to_list_items_relation
Boards::Issues::ListService.new(board.resource_parent, current_user, board_id: board.id, id: moving_to_list.id).execute
end
end
end
end
Boards::Issues::MoveService.prepend_mod_with('Boards::Issues::MoveService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Issues::MoveService, feature_category: :team_planning do
describe '#execute' do
context 'when parent is a project' do
let(:user) { create(:user) }
let(:project) { create(:project) }
let(:board1) { create(:board, project: project) }
let(:board2) { create(:board, project: project) }
let(:bug) { create(:label, project: project, name: 'Bug') }
let(:development) { create(:label, project: project, name: 'Development') }
let(:testing) { create(:label, project: project, name: 'Testing') }
let(:regression) { create(:label, project: project, name: 'Regression') }
let!(:list1) { create(:list, board: board1, label: development, position: 0) }
let!(:list2) { create(:list, board: board1, label: testing, position: 1) }
let!(:closed) { create(:closed_list, board: board1) }
let(:parent) { project }
before do
parent.add_developer(user)
end
it_behaves_like 'issues move service'
end
context 'when parent is a group' do
let(:user) { create(:user) }
let(:group) { create(:group) }
let(:project) { create(:project, namespace: group) }
let(:board1) { create(:board, group: group) }
let(:board2) { create(:board, group: group) }
let(:bug) { create(:group_label, group: group, name: 'Bug') }
let(:development) { create(:group_label, group: group, name: 'Development') }
let(:testing) { create(:group_label, group: group, name: 'Testing') }
let(:regression) { create(:group_label, group: group, name: 'Regression') }
let!(:list1) { create(:list, board: board1, label: development, position: 0) }
let!(:list2) { create(:list, board: board1, label: testing, position: 1) }
let!(:closed) { create(:closed_list, board: board1) }
let(:parent) { group }
before do
parent.add_developer(user)
end
it_behaves_like 'issues move service', true
end
describe '#execute_multiple' do
let_it_be(:group) { create(:group) }
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project, namespace: group) }
let_it_be(:board1) { create(:board, group: group) }
let_it_be(:development) { create(:group_label, group: group, name: 'Development') }
let_it_be(:testing) { create(:group_label, group: group, name: 'Testing') }
let_it_be(:list1) { create(:list, board: board1, label: development, position: 0) }
let_it_be(:list2) { create(:list, board: board1, label: testing, position: 1) }
let(:params) { { board_id: board1.id, from_list_id: list1.id, to_list_id: list2.id } }
before do
project.add_developer(user)
end
it 'returns the expected result if list of issues is empty' do
expect(described_class.new(group, user, params).execute_multiple([])).to eq({ count: 0, success: false, issues: [] })
end
context 'moving multiple issues' do
let(:issue1) { create(:labeled_issue, project: project, labels: [development]) }
let(:issue2) { create(:labeled_issue, project: project, labels: [development]) }
it 'moves multiple issues from one list to another' do
expect(described_class.new(group, user, params).execute_multiple([issue1, issue2])).to be_truthy
expect(issue1.labels).to eq([testing])
expect(issue2.labels).to eq([testing])
end
end
context 'moving a single issue' do
let(:issue1) { create(:labeled_issue, project: project, labels: [development]) }
it 'moves one issue' do
expect(described_class.new(group, user, params).execute_multiple([issue1])).to be_truthy
expect(issue1.labels).to eq([testing])
end
end
context 'moving issues visually after an existing issue' do
let(:existing_issue) { create(:labeled_issue, project: project, labels: [testing], relative_position: 10) }
let(:issue1) { create(:labeled_issue, project: project, labels: [development]) }
let(:issue2) { create(:labeled_issue, project: project, labels: [development]) }
let(:move_params) do
params.dup.tap do |hash|
hash[:move_before_id] = existing_issue.id
end
end
it 'moves one issue' do
expect(described_class.new(group, user, move_params).execute_multiple([issue1, issue2])).to be_truthy
expect(issue1.labels).to eq([testing])
expect(issue2.labels).to eq([testing])
expect(issue1.relative_position > existing_issue.relative_position).to eq(true)
expect(issue2.relative_position > issue1.relative_position).to eq(true)
end
end
context 'moving issues visually before an existing issue' do
let(:existing_issue) { create(:labeled_issue, project: project, labels: [testing], relative_position: 10) }
let(:issue1) { create(:labeled_issue, project: project, labels: [development]) }
let(:issue2) { create(:labeled_issue, project: project, labels: [development]) }
let(:move_params) do
params.dup.tap do |hash|
hash[:move_after_id] = existing_issue.id
end
end
it 'moves one issue' do
expect(described_class.new(group, user, move_params).execute_multiple([issue1, issue2])).to be_truthy
expect(issue1.labels).to eq([testing])
expect(issue2.labels).to eq([testing])
expect(issue2.relative_position < existing_issue.relative_position).to eq(true)
expect(issue1.relative_position < issue2.relative_position).to eq(true)
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Issues
class ListService < Boards::BaseItemsListService
include Gitlab::Utils::StrongMemoize
def self.valid_params
IssuesFinder.valid_params
end
# It is a class method because we cannot apply it
# prior to knowing how many items should be fetched for a list.
def self.initialize_relative_positions(board, current_user, issues)
if Gitlab::Database.read_write? && !board.disabled_for?(current_user)
Issue.move_nulls_to_end(issues)
end
end
private
def order(items)
return items.order_closed_at_desc if list&.closed?
items.order_by_relative_position
end
def finder
IssuesFinder.new(current_user, filter_params)
end
def board
@board ||= parent.boards.find(params[:board_id])
end
def filter_params
set_scope
set_non_archived
set_issue_types
super
end
def set_scope
params[:include_subgroups] = board.group_board?
end
def set_non_archived
params[:non_archived] = parent.is_a?(Group)
end
def set_issue_types
params[:issue_types] ||= Issue::TYPES_FOR_BOARD_LIST
end
def item_model
Issue
end
end
end
end
Boards::Issues::ListService.prepend_mod_with('Boards::Issues::ListService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Issues::ListService, feature_category: :team_planning do
describe '#execute' do
let_it_be(:user) { create(:user) }
context 'when parent is a project' do
let_it_be(:project) { create(:project, :empty_repo) }
let_it_be(:board) { create(:board, project: project) }
let_it_be(:m1) { create(:milestone, project: project) }
let_it_be(:m2) { create(:milestone, project: project) }
let_it_be(:bug) { create(:label, project: project, name: 'Bug') }
let_it_be(:development) { create(:label, project: project, name: 'Development') }
let_it_be(:testing) { create(:label, project: project, name: 'Testing') }
let_it_be(:p1) { create(:label, title: 'P1', project: project, priority: 1) }
let_it_be(:p2) { create(:label, title: 'P2', project: project, priority: 2) }
let_it_be(:p3) { create(:label, title: 'P3', project: project, priority: 3) }
let_it_be(:backlog) { board.lists.backlog.first }
let_it_be(:list1) { create(:list, board: board, label: development, position: 0) }
let_it_be(:list2) { create(:list, board: board, label: testing, position: 1) }
let_it_be(:closed) { board.lists.closed.first }
let_it_be(:opened_issue1) { create(:labeled_issue, project: project, milestone: m1, title: 'Issue 1', labels: [bug]) }
let_it_be(:opened_issue2) { create(:labeled_issue, project: project, milestone: m2, title: 'Issue 2', labels: [p2]) }
let_it_be(:reopened_issue1) { create(:issue, :opened, project: project, title: 'Reopened Issue 1') }
let_it_be(:list1_issue1) { create(:labeled_issue, project: project, milestone: m1, labels: [p2, development]) }
let_it_be(:list1_issue2) { create(:labeled_issue, project: project, milestone: m2, labels: [development]) }
let_it_be(:list1_issue3) { create(:labeled_issue, project: project, milestone: m1, labels: [development, p1]) }
let_it_be(:list2_issue1) { create(:labeled_issue, project: project, milestone: m1, labels: [testing]) }
let_it_be(:closed_issue1) { create(:labeled_issue, :closed, project: project, labels: [bug], closed_at: 1.day.ago) }
let_it_be(:closed_issue2) { create(:labeled_issue, :closed, project: project, labels: [p3], closed_at: 2.days.ago) }
let_it_be(:closed_issue3) { create(:issue, :closed, project: project, closed_at: 1.week.ago) }
let_it_be(:closed_issue4) { create(:labeled_issue, :closed, project: project, labels: [p1], closed_at: 1.year.ago) }
let_it_be(:closed_issue5) { create(:labeled_issue, :closed, project: project, labels: [development], closed_at: 2.years.ago) }
let(:parent) { project }
before do
project.add_developer(user)
end
it_behaves_like 'issues list service'
context 'when project is archived' do
before do
project.update!(archived: true)
end
it_behaves_like 'issues list service'
end
context 'when filtering' do
let_it_be(:incident) do
create(
:labeled_issue,
:incident,
project: project,
milestone: m1,
labels: [development, p1]
)
end
context 'when filtering by type' do
it 'only returns the specified type' do
params = { board_id: board.id, id: list1.id, issue_types: 'incident' }
expect(described_class.new(parent, user, params).execute).to eq [incident]
end
end
context 'when filtering by negated type' do
it 'only returns the specified type' do
params = { board_id: board.id, id: list1.id, not: { issue_types: ['issue'] } }
expect(described_class.new(parent, user, params).execute).to contain_exactly(incident)
end
end
end
end
context 'when parent is a group' do
let(:project) { create(:project, :empty_repo, namespace: group) }
let(:project1) { create(:project, :empty_repo, namespace: group) }
let(:project_archived) { create(:project, :empty_repo, :archived, namespace: group) }
let(:m1) { create(:milestone, group: group) }
let(:m2) { create(:milestone, group: group) }
let(:bug) { create(:group_label, group: group, name: 'Bug') }
let(:development) { create(:group_label, group: group, name: 'Development') }
let(:testing) { create(:group_label, group: group, name: 'Testing') }
let(:p1) { create(:group_label, title: 'P1', group: group) }
let(:p2) { create(:group_label, title: 'P2', group: group) }
let(:p3) { create(:group_label, title: 'P3', group: group) }
let(:p1_project) { create(:label, title: 'P1_project', project: project, priority: 1) }
let(:p2_project) { create(:label, title: 'P2_project', project: project, priority: 2) }
let(:p3_project) { create(:label, title: 'P3_project', project: project, priority: 3) }
let(:p1_project1) { create(:label, title: 'P1_project1', project: project1, priority: 1) }
let(:p2_project1) { create(:label, title: 'P2_project1', project: project1, priority: 2) }
let(:p3_project1) { create(:label, title: 'P3_project1', project: project1, priority: 3) }
let!(:backlog) { board.lists.backlog.first }
let!(:list1) { create(:list, board: board, label: development, position: 0) }
let!(:list2) { create(:list, board: board, label: testing, position: 1) }
let!(:closed) { board.lists.closed.first }
let!(:opened_issue1) { create(:labeled_issue, project: project, milestone: m1, title: 'Issue 1', labels: [bug]) }
let!(:opened_issue2) { create(:labeled_issue, project: project, milestone: m2, title: 'Issue 2', labels: [p2, p2_project]) }
let!(:opened_issue3) { create(:labeled_issue, project: project_archived, milestone: m1, title: 'Issue 3', labels: [bug]) }
let!(:reopened_issue1) { create(:issue, state: 'opened', project: project, title: 'Reopened Issue 1', closed_at: Time.current) }
let!(:list1_issue1) { create(:labeled_issue, project: project, milestone: m1, labels: [p2, p2_project, development]) }
let!(:list1_issue2) { create(:labeled_issue, project: project, milestone: m2, labels: [development]) }
let!(:list1_issue3) { create(:labeled_issue, project: project1, milestone: m1, labels: [development, p1, p1_project1]) }
let!(:list2_issue1) { create(:labeled_issue, project: project1, milestone: m1, labels: [testing]) }
let!(:closed_issue1) { create(:labeled_issue, :closed, project: project, labels: [bug], closed_at: 1.day.ago) }
let!(:closed_issue2) { create(:labeled_issue, :closed, project: project, labels: [p3, p3_project], closed_at: 2.days.ago) }
let!(:closed_issue3) { create(:issue, :closed, project: project1, closed_at: 1.week.ago) }
let!(:closed_issue4) { create(:labeled_issue, :closed, project: project1, labels: [p1, p1_project1], closed_at: 1.year.ago) }
let!(:closed_issue5) { create(:labeled_issue, :closed, project: project1, labels: [development], closed_at: 2.years.ago) }
before do
group.add_developer(user)
end
context 'when the group has no parent' do
let(:parent) { group }
let(:group) { create(:group) }
let(:board) { create(:board, group: group) }
it_behaves_like 'issues list service'
end
context 'when the group is an ancestor' do
let(:parent) { create(:group) }
let(:group) { create(:group, parent: parent) }
let(:board) { create(:board, group: parent) }
before do
parent.add_developer(user)
end
it_behaves_like 'issues list service'
end
end
end
describe '.initialize_relative_positions' do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project, :empty_repo) }
let_it_be(:board) { create(:board, project: project) }
let(:issue) { create(:issue, project: project, relative_position: nil) }
context "when 'Gitlab::Database::read_write?' is true" do
before do
allow(Gitlab::Database).to receive(:read_write?).and_return(true)
end
context 'user cannot move issues' do
it 'does not initialize the relative positions of issues' do
described_class.initialize_relative_positions(board, user, [issue])
expect(issue.relative_position).to eq nil
end
end
context 'user can move issues' do
before do
project.add_developer(user)
end
it 'initializes the relative positions of issues' do
described_class.initialize_relative_positions(board, user, [issue])
expect(issue.relative_position).not_to eq nil
end
end
end
context "when 'Gitlab::Database::read_write?' is false" do
before do
allow(Gitlab::Database).to receive(:read_write?).and_return(false)
end
it 'does not initialize the relative positions of issues' do
described_class.initialize_relative_positions(board, user, [issue])
expect(issue.relative_position).to eq nil
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Boards
module Issues
class CreateService < Boards::BaseService
attr_accessor :project
def initialize(parent, project, user, params = {})
@project = project
super(parent, user, params)
end
def execute
create_issue(params.merge(issue_params))
end
private
def issue_params
{ label_ids: [list.label_id] }
end
def board
@board ||= parent.boards.find(params.delete(:board_id))
end
def list
@list ||= board.lists.find(params.delete(:list_id))
end
def create_issue(params)
# NOTE: We are intentionally not doing a spam/CAPTCHA check for issues created via boards.
# See https://gitlab.com/gitlab-org/gitlab/-/issues/29400#note_598479184 for more context.
::Issues::CreateService.new(container: project, current_user: current_user, params: params, perform_spam_check: false).execute
end
end
end
end
Boards::Issues::CreateService.prepend_mod_with('Boards::Issues::CreateService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Boards::Issues::CreateService, feature_category: :team_planning do
describe '#execute' do
let(:project) { create(:project) }
let(:board) { create(:board, project: project) }
let(:user) { create(:user) }
let(:label) { create(:label, project: project, name: 'in-progress') }
let!(:list) { create(:list, board: board, label: label, position: 0) }
subject(:service) { described_class.new(board.resource_parent, project, user, board_id: board.id, list_id: list.id, title: 'New issue') }
before do
project.add_developer(user)
end
it 'delegates the create proceedings to Issues::CreateService' do
expect_next_instance_of(Issues::CreateService) do |instance|
expect(instance).to receive(:execute).once
end
service.execute
end
it 'creates a new issue' do
expect { service.execute }.to change(project.issues, :count).by(1)
end
it 'adds the label of the list to the issue' do
result = service.execute
expect(result).to be_success
expect(result[:issue].labels).to contain_exactly(label)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Submodules
class UpdateService < Commits::CreateService
include Gitlab::Utils::StrongMemoize
def initialize(*args)
super
@start_branch = @branch_name
@commit_sha = params[:commit_sha].presence
@submodule = params[:submodule].presence
@commit_message = params[:commit_message].presence || "Update submodule #{@submodule} with oid #{@commit_sha}"
end
def validate!
super
raise ValidationError, 'The repository is empty' if repository.empty?
end
def execute
super
rescue StandardError => e
error(e.message)
end
def create_commit!
repository.update_submodule(
current_user,
@submodule,
@commit_sha,
message: @commit_message,
branch: @branch_name
)
rescue ArgumentError, TypeError
raise ValidationError, 'Invalid parameters'
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Submodules::UpdateService, feature_category: :source_code_management do
let(:project) { create(:project, :repository) }
let(:repository) { project.repository }
let(:user) { create(:user, :commit_email) }
let(:branch_name) { project.default_branch }
let(:submodule) { 'six' }
let(:commit_sha) { 'e25eda1fece24ac7a03624ed1320f82396f35bd8' }
let(:commit_message) { 'whatever' }
let(:current_sha) { repository.blob_at('HEAD', submodule).id }
let(:commit_params) do
{
submodule: submodule,
commit_message: commit_message,
commit_sha: commit_sha,
branch_name: branch_name
}
end
subject { described_class.new(project, user, commit_params) }
describe "#execute" do
shared_examples 'returns error result' do
it do
result = subject.execute
expect(result[:status]).to eq :error
expect(result[:message]).to eq error_message
end
end
context 'when the user is not authorized' do
it_behaves_like 'returns error result' do
let(:error_message) { 'You are not allowed to push into this branch' }
end
end
context 'when the user is authorized' do
before do
project.add_maintainer(user)
end
context 'when the branch is protected' do
before do
create(:protected_branch, :no_one_can_push, project: project, name: branch_name)
end
it_behaves_like 'returns error result' do
let(:error_message) { 'You are not allowed to push into this branch' }
end
end
context 'validations' do
context 'when submodule' do
context 'is empty' do
let(:submodule) { '' }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid parameters' }
end
end
context 'is not present' do
let(:submodule) { nil }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid parameters' }
end
end
context 'is invalid' do
let(:submodule) { 'VERSION' }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid submodule path' }
end
end
context 'does not exist' do
let(:submodule) { 'non-existent-submodule' }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid submodule path' }
end
end
# Can be re-enabled when problem from https://gitlab.com/gitlab-org/gitlab/-/issues/413964#note_1421909142
# is fixed
# context 'has traversal path' do
# let(:submodule) { '../six' }
# it_behaves_like 'returns error result' do
# let(:error_message) { 'Invalid submodule path' }
# end
# end
end
context 'commit_sha' do
context 'is empty' do
let(:commit_sha) { '' }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid parameters' }
end
end
context 'is not present' do
let(:commit_sha) { nil }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid parameters' }
end
end
context 'is invalid' do
let(:commit_sha) { '1' }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid parameters' }
end
end
context 'is the same as the current ref' do
let(:commit_sha) { current_sha }
it_behaves_like 'returns error result' do
let(:error_message) { "The submodule #{submodule} is already at #{commit_sha}" }
end
end
end
context 'branch_name' do
context 'is empty' do
let(:branch_name) { '' }
it_behaves_like 'returns error result' do
let(:error_message) { 'You can only create or edit files when you are on a branch' }
end
end
context 'is not present' do
let(:branch_name) { nil }
it_behaves_like 'returns error result' do
let(:error_message) { 'Invalid parameters' }
end
end
context 'does not exist' do
let(:branch_name) { 'non/existent-branch' }
it_behaves_like 'returns error result' do
let(:error_message) { 'You can only create or edit files when you are on a branch' }
end
end
context 'when commit message is empty' do
let(:commit_message) { '' }
it 'a default commit message is set' do
message = "Update submodule #{submodule} with oid #{commit_sha}"
expect(repository).to receive(:update_submodule).with(any_args, hash_including(message: message))
subject.execute
end
end
end
end
context 'when there is an unexpected error' do
before do
allow(repository).to receive(:update_submodule).and_raise(StandardError, 'error message')
end
it_behaves_like 'returns error result' do
let(:error_message) { 'error message' }
end
end
it 'updates the submodule reference' do
result = subject.execute
expect(result[:status]).to eq :success
expect(result[:result]).to eq repository.head_commit.id
expect(repository.blob_at('HEAD', submodule).id).to eq commit_sha
end
context 'when submodule is inside a directory' do
let(:submodule) { 'test_inside_folder/another_folder/six' }
let(:branch_name) { 'submodule_inside_folder' }
it 'updates the submodule reference' do
expect(repository.blob_at(branch_name, submodule).id).not_to eq commit_sha
subject.execute
expect(repository.blob_at(branch_name, submodule).id).to eq commit_sha
end
end
context 'when repository is empty' do
let(:project) { create(:project, :empty_repo) }
let(:branch_name) { 'master' }
it_behaves_like 'returns error result' do
let(:error_message) { 'The repository is empty' }
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
# This service copies AwardEmoji from one Awardable to another.
#
# It expects the calling code to have performed the necessary authorization
# checks in order to allow the copy to happen.
module AwardEmojis
class CopyService
def initialize(from_awardable, to_awardable)
raise ArgumentError, 'Awardables must be different' if from_awardable == to_awardable
@from_awardable = from_awardable
@to_awardable = to_awardable
end
def execute
from_awardable.award_emoji.find_each do |award|
new_award = award.dup
new_award.awardable = to_awardable
new_award.save!
end
ServiceResponse.success
end
private
attr_accessor :from_awardable, :to_awardable
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe AwardEmojis::CopyService, feature_category: :team_planning do
let_it_be(:from_awardable) do
create(
:issue,
award_emoji: [
build(:award_emoji, name: 'thumbsup'),
build(:award_emoji, name: 'thumbsdown')
])
end
describe '#initialize' do
it 'validates that we cannot copy AwardEmoji to the same Awardable' do
expect { described_class.new(from_awardable, from_awardable) }.to raise_error(ArgumentError)
end
end
describe '#execute' do
let(:to_awardable) { create(:issue) }
subject(:execute_service) { described_class.new(from_awardable, to_awardable).execute }
it 'copies AwardEmojis', :aggregate_failures do
expect { execute_service }.to change { AwardEmoji.count }.by(2)
expect(to_awardable.award_emoji.map(&:name)).to match_array(%w[thumbsup thumbsdown])
end
it 'returns success', :aggregate_failures do
expect(execute_service).to be_kind_of(ServiceResponse)
expect(execute_service).to be_success
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
# Class for retrieving information about emoji awarded _by_ a particular user.
module AwardEmojis
class CollectUserEmojiService
attr_reader :current_user
# current_user - The User to generate the data for.
def initialize(current_user = nil)
@current_user = current_user
end
def execute
return [] unless current_user
# We want the resulting data set to be an Array containing the emoji names
# in descending order, based on how often they were awarded.
AwardEmoji
.award_counts_for_user(current_user)
.map { |name, _| { name: name } }
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe AwardEmojis::CollectUserEmojiService, feature_category: :team_planning do
describe '#execute' do
it 'returns an Array containing the awarded emoji names' do
user = create(:user)
create(:award_emoji, user: user, name: 'thumbsup')
create(:award_emoji, user: user, name: 'thumbsup')
create(:award_emoji, user: user, name: 'thumbsdown')
awarded = described_class.new(user).execute
expect(awarded).to eq([{ name: 'thumbsup' }, { name: 'thumbsdown' }])
end
it 'returns an empty Array when no user is given' do
awarded = described_class.new.execute
expect(awarded).to be_empty
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module AwardEmojis
class AddService < AwardEmojis::BaseService
include Gitlab::Utils::StrongMemoize
def execute
unless awardable.user_can_award?(current_user)
return error('User cannot add emoji reactions to awardable', status: :forbidden)
end
unless awardable.emoji_awardable?
return error('Awardable cannot add emoji reactions', status: :unprocessable_entity)
end
award = awardable.award_emoji.create(name: name, user: current_user)
if award.persisted?
after_create(award)
success(award: award)
else
error(award.errors.full_messages, award: award)
end
end
private
def after_create(award)
TodoService.new.new_award_emoji(todoable, current_user) if todoable
execute_hooks(award, 'award')
end
def todoable
strong_memoize(:todoable) do
case awardable
when Note
# We don't create todos for personal snippet comments for now
awardable.noteable unless awardable.for_personal_snippet?
when MergeRequest, Issue
awardable
else
# No todos for all other awardables
nil
end
end
end
end
end
AwardEmojis::AddService.prepend_mod_with('AwardEmojis::AddService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe AwardEmojis::AddService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project) }
let_it_be(:awardable) { create(:note, project: project) }
let(:name) { 'thumbsup' }
subject(:service) { described_class.new(awardable, name, user) }
describe '#execute' do
context 'when user is not authorized' do
it 'does not add an emoji' do
expect { service.execute }.not_to change { AwardEmoji.count }
end
it 'returns an error state' do
result = service.execute
expect(result[:status]).to eq(:error)
expect(result[:http_status]).to eq(:forbidden)
end
end
context 'when user is authorized' do
before do
project.add_developer(user)
end
it 'creates an award emoji' do
expect { service.execute }.to change { AwardEmoji.count }.by(1)
end
it 'returns the award emoji' do
result = service.execute
expect(result[:award]).to be_kind_of(AwardEmoji)
end
it 'return a success status' do
result = service.execute
expect(result[:status]).to eq(:success)
end
it 'sets the correct properties on the award emoji' do
award = service.execute[:award]
expect(award.name).to eq(name)
expect(award.user).to eq(user)
end
it 'executes hooks' do
expect(service).to receive(:execute_hooks).with(kind_of(AwardEmoji), 'award')
service.execute
end
describe 'marking Todos as done' do
subject { service.execute }
include_examples 'creating award emojis marks Todos as done'
end
context 'when the awardable cannot have emoji awarded to it' do
before do
expect(awardable).to receive(:emoji_awardable?).and_return(false)
end
it 'does not add an emoji' do
expect { service.execute }.not_to change { AwardEmoji.count }
end
it 'returns an error status' do
result = service.execute
expect(result[:status]).to eq(:error)
expect(result[:http_status]).to eq(:unprocessable_entity)
end
end
context 'when the awardable is invalid' do
before do
expect_next_instance_of(AwardEmoji) do |award|
expect(award).to receive(:valid?).and_return(false)
expect(award).to receive_message_chain(:errors, :full_messages).and_return(['Error 1', 'Error 2'])
end
end
it 'does not add an emoji' do
expect { service.execute }.not_to change { AwardEmoji.count }
end
it 'returns an error status' do
result = service.execute
expect(result[:status]).to eq(:error)
end
it 'returns an error message' do
result = service.execute
expect(result[:message]).to eq('Error 1 and Error 2')
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module AwardEmojis
class BaseService < ::BaseService
attr_accessor :awardable, :name
def initialize(awardable, name, current_user)
@awardable = awardable
@name = normalize_name(name)
super(awardable.project, current_user)
end
def execute_hooks(award_emoji, action)
return unless awardable.project&.has_active_hooks?(:emoji_hooks)
hook_data = Gitlab::DataBuilder::Emoji.build(award_emoji, current_user, action)
awardable.project.execute_hooks(hook_data, :emoji_hooks)
end
private
def normalize_name(name)
TanukiEmoji.find_by_alpha_code(name)&.name || name
end
# Provide more error state data than what BaseService allows.
# - An array of errors
# - The `AwardEmoji` if present
def error(errors, award: nil, status: nil)
errors = Array.wrap(errors)
super(errors.to_sentence.presence, status).merge({
award: award,
errors: errors
})
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe AwardEmojis::BaseService, feature_category: :team_planning do
let_it_be(:group) { create(:group) }
let_it_be(:project) { create(:project, group: group) }
let_it_be(:current_user) { create(:user) }
let_it_be_with_reload(:awardable) { create(:note, project: project) }
let(:emoji_name) { 'horse' }
describe '.initialize' do
subject { described_class }
it 'uses same emoji name if not an alias' do
expect(subject.new(awardable, emoji_name, current_user).name).to eq(emoji_name)
end
it 'uses emoji original name if its an alias' do
emoji_alias = 'small_airplane'
emoji_name = 'airplane_small'
expect(subject.new(awardable, emoji_alias, current_user).name).to eq(emoji_name)
end
end
describe '.execute_hooks' do
let(:award_emoji) { create(:award_emoji, awardable: awardable) }
let(:action) { 'award' }
subject { described_class.new(awardable, emoji_name, current_user) }
context 'with no emoji hooks configured' do
it 'does not build hook_data' do
expect(Gitlab::DataBuilder::Emoji).not_to receive(:build)
expect(award_emoji.awardable.project).not_to receive(:execute_hooks)
subject.execute_hooks(award_emoji, action)
end
end
context 'with emoji hooks configured' do
it 'builds hook_data and calls execute_hooks for project' do
hook_data = {}
create(:project_hook, project: project, emoji_events: true)
expect(Gitlab::DataBuilder::Emoji).to receive(:build).and_return(hook_data)
expect(award_emoji.awardable.project).to receive(:execute_hooks).with(hook_data, :emoji_hooks)
subject.execute_hooks(award_emoji, action)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module AwardEmojis
class DestroyService < AwardEmojis::BaseService
def execute
unless awardable.user_can_award?(current_user)
return error('User cannot destroy emoji on the awardable', status: :forbidden)
end
awards = AwardEmojisFinder.new(awardable, name: name, awarded_by: current_user).execute
if awards.empty?
return error("User has not awarded emoji of type #{name} on the awardable", status: :forbidden)
end
award = awards.destroy_all.first # rubocop: disable Cop/DestroyAll
after_destroy(award)
success(award: award)
end
private
def after_destroy(award)
execute_hooks(award, 'revoke')
end
end
end
AwardEmojis::DestroyService.prepend_mod_with('AwardEmojis::DestroyService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe AwardEmojis::DestroyService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let_it_be(:awardable) { create(:note) }
let_it_be(:project) { awardable.project }
let(:name) { 'thumbsup' }
let!(:award_from_other_user) do
create(:award_emoji, name: name, awardable: awardable, user: create(:user))
end
subject(:service) { described_class.new(awardable, name, user) }
describe '#execute' do
shared_examples_for 'a service that does not authorize the user' do |error:|
it 'does not remove the emoji' do
expect { service.execute }.not_to change { AwardEmoji.count }
end
it 'returns an error state' do
result = service.execute
expect(result[:status]).to eq(:error)
expect(result[:http_status]).to eq(:forbidden)
end
it 'returns a nil award' do
result = service.execute
expect(result).to have_key(:award)
expect(result[:award]).to be_nil
end
it 'returns the error' do
result = service.execute
expect(result[:message]).to eq(error)
expect(result[:errors]).to eq([error])
end
end
context 'when user is not authorized' do
it_behaves_like 'a service that does not authorize the user',
error: 'User cannot destroy emoji on the awardable'
end
context 'when the user is authorized' do
before do
project.add_developer(user)
end
context 'when user has not awarded an emoji to the awardable' do
let!(:award_from_user) { create(:award_emoji, name: name, user: user) }
it_behaves_like 'a service that does not authorize the user',
error: 'User has not awarded emoji of type thumbsup on the awardable'
end
context 'when user has awarded an emoji to the awardable' do
let!(:award_from_user) { create(:award_emoji, name: name, awardable: awardable, user: user) }
it 'removes the emoji' do
expect { service.execute }.to change { AwardEmoji.count }.by(-1)
end
it 'returns a success status' do
result = service.execute
expect(result[:status]).to eq(:success)
end
it 'returns no errors' do
result = service.execute
expect(result).not_to have_key(:error)
expect(result).not_to have_key(:errors)
end
it 'returns the destroyed award' do
result = service.execute
expect(result[:award]).to eq(award_from_user)
expect(result[:award]).to be_destroyed
end
it 'executes hooks' do
expect(service).to receive(:execute_hooks).with(award_from_user, 'revoke')
service.execute
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module AwardEmojis
class ToggleService < AwardEmojis::BaseService
def execute
if awardable.awarded_emoji?(name, current_user)
DestroyService.new(awardable, name, current_user).execute
else
AddService.new(awardable, name, current_user).execute
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe AwardEmojis::ToggleService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project, :public) }
let_it_be(:awardable) { create(:note, project: project) }
let(:name) { 'thumbsup' }
subject(:service) { described_class.new(awardable, name, user) }
describe '#execute' do
context 'when user has awarded an emoji' do
let!(:award_from_other_user) { create(:award_emoji, name: name, awardable: awardable, user: create(:user)) }
let!(:award) { create(:award_emoji, name: name, awardable: awardable, user: user) }
it 'calls AwardEmojis::DestroyService' do
expect(AwardEmojis::AddService).not_to receive(:new)
expect_next_instance_of(AwardEmojis::DestroyService) do |service|
expect(service).to receive(:execute)
end
service.execute
end
it 'destroys an AwardEmoji' do
expect { service.execute }.to change { AwardEmoji.count }.by(-1)
end
it 'returns the result of DestroyService#execute' do
mock_result = double(foo: true)
expect_next_instance_of(AwardEmojis::DestroyService) do |service|
expect(service).to receive(:execute).and_return(mock_result)
end
result = service.execute
expect(result).to eq(mock_result)
end
end
context 'when user has not awarded an emoji' do
it 'calls AwardEmojis::AddService' do
expect_next_instance_of(AwardEmojis::AddService) do |service|
expect(service).to receive(:execute)
end
expect(AwardEmojis::DestroyService).not_to receive(:new)
service.execute
end
it 'creates an AwardEmoji' do
expect { service.execute }.to change { AwardEmoji.count }.by(1)
end
it 'returns the result of AddService#execute' do
mock_result = double(foo: true)
expect_next_instance_of(AwardEmojis::AddService) do |service|
expect(service).to receive(:execute).and_return(mock_result)
end
result = service.execute
expect(result).to eq(mock_result)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module VsCode
module Settings
class CreateOrUpdateService
def initialize(current_user:, params: {})
@current_user = current_user
@params = params
end
def execute
# The GitLab VSCode settings API does not support creating or updating
# machines.
return ServiceResponse.success(payload: DEFAULT_MACHINE) if @params[:setting_type] == 'machines'
setting = VsCodeSetting.by_user(current_user).by_setting_type(params[:setting_type]).first
if setting.nil?
merged_params = params.merge(user: current_user, uuid: SecureRandom.uuid)
setting = VsCodeSetting.new(merged_params)
else
setting.content = params[:content]
setting.uuid = SecureRandom.uuid
end
if setting.save
ServiceResponse.success(payload: setting)
else
ServiceResponse.error(
message: setting.errors.full_messages.to_sentence,
payload: { setting: setting }
)
end
end
private
attr_reader :current_user, :params
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe VsCode::Settings::CreateOrUpdateService, feature_category: :web_ide do
describe '#execute' do
let_it_be(:user) { create(:user) }
let(:opts) do
{
setting_type: "settings",
content: '{ "editor.fontSize": 12 }'
}
end
subject { described_class.new(current_user: user, params: opts).execute }
context 'when setting_type is machines' do
it 'returns default machine as a successful response' do
opts = { setting_type: "machines", machines: '[]' }
result = described_class.new(current_user: user, params: opts).execute
expect(result.payload).to eq(VsCode::Settings::DEFAULT_MACHINE)
end
end
it 'creates a new record when a record with the setting does not exist' do
expect { subject }.to change { User.find(user.id).vscode_settings.count }.from(0).to(1)
record = User.find(user.id).vscode_settings.by_setting_type('settings').first
expect(record.content).to eq('{ "editor.fontSize": 12 }')
end
it 'updates the existing record if setting exists' do
setting = create(:vscode_setting, user: user)
expect { subject }.to change {
VsCode::Settings::VsCodeSetting.find(setting.id).content
}.from(setting.content).to(opts[:content])
end
it 'fails if an invalid value is passed' do
invalid_opts = { setting_type: nil, content: nil }
result = described_class.new(current_user: user, params: invalid_opts).execute
expect(result.status).to eq(:error)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module VsCode
module Settings
class DeleteService
def initialize(current_user:)
@current_user = current_user
end
def execute
VsCodeSetting.by_user(current_user).delete_all
ServiceResponse.success
end
private
attr_reader :current_user
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe VsCode::Settings::DeleteService, feature_category: :web_ide do
describe '#execute' do
let_it_be(:user) { create(:user) }
let_it_be(:other_user) { create(:user) }
let_it_be(:setting_one) { create(:vscode_setting, user: user) }
let_it_be(:setting_two) { create(:vscode_setting, setting_type: 'extensions', user: user) }
let_it_be(:setting_three) { create(:vscode_setting, setting_type: 'extensions', user: other_user) }
subject { described_class.new(current_user: user).execute }
it 'deletes all vscode_settings belonging to the current user' do
expect { subject }
.to change { User.find(user.id).vscode_settings.count }.from(2).to(0)
.and not_change { User.find(other_user.id).vscode_settings.count }
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class FindOrCreateService
attr_accessor :project, :current_user, :params
def initialize(project, user, params = {})
@project = project
@current_user = user
@params = params.dup
end
def execute
find_milestone || create_milestone
end
private
# rubocop: disable CodeReuse/ActiveRecord
def find_milestone
groups = project.group&.self_and_ancestors_ids
Milestone.for_projects_and_groups([project.id], groups).find_by(title: params["title"])
end
# rubocop: enable CodeReuse/ActiveRecord
def create_milestone
return unless current_user.can?(:admin_milestone, project)
new_milestone if new_milestone.persisted?
end
def new_milestone
@new_milestone ||= CreateService.new(project, current_user, params).execute
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::FindOrCreateService, feature_category: :team_planning do
describe '#execute' do
subject(:service) { described_class.new(project, user, params) }
let(:user) { create(:user) }
let(:group) { create(:group) }
let(:project) { create(:project, namespace: group) }
let(:params) do
{
title: '1.0',
description: 'First Release',
start_date: Date.today,
due_date: Date.today + 1.month
}.with_indifferent_access
end
context 'when finding milestone on project level' do
let!(:existing_project_milestone) { create(:milestone, project: project, title: '1.0') }
it 'returns existing milestone' do
expect(service.execute).to eq(existing_project_milestone)
end
end
context 'when finding milestone on group level' do
let!(:existing_group_milestone) { create(:milestone, group: group, title: '1.0') }
it 'returns existing milestone' do
expect(service.execute).to eq(existing_group_milestone)
end
end
context 'when not finding milestone' do
context 'when user has permissions' do
before do
project.add_developer(user)
end
context 'when params are valid' do
it 'creates a new milestone at project level using params' do
expect { service.execute }.to change(project.milestones, :count).by(1)
milestone = project.reload.milestones.last
expect(milestone.title).to eq(params[:title])
expect(milestone.description).to eq(params[:description])
expect(milestone.start_date).to eq(params[:start_date])
expect(milestone.due_date).to eq(params[:due_date])
end
end
context 'when params are not valid' do
before do
params[:start_date] = Date.today + 2.months
end
it 'returns nil' do
expect(service.execute).to be_nil
end
end
end
context 'when user does not have permissions' do
before do
project.add_guest(user)
end
it 'does not create a new milestone' do
expect { service.execute }.not_to change(project.milestones, :count)
end
it 'returns nil' do
expect(service.execute).to be_nil
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class MergeRequestsCountService < BaseCountService
def initialize(milestone)
@milestone = milestone
end
def cache_key
"milestone_merge_requests_count_#{@milestone.milestoneish_id}"
end
def relation_for_count
@milestone.merge_requests
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::MergeRequestsCountService, :use_clean_rails_memory_store_caching,
feature_category: :team_planning do
let_it_be(:project) { create(:project, :empty_repo) }
let_it_be(:milestone) { create(:milestone, project: project) }
before_all do
create(:merge_request, milestone: milestone, source_project: project)
create(:merge_request, :closed, milestone: milestone, source_project: project)
end
subject { described_class.new(milestone) }
it_behaves_like 'a counter caching service'
it 'counts all merge requests' do
expect(subject.count).to eq(2)
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class ClosedIssuesCountService < BaseCountService
def initialize(milestone)
@milestone = milestone
end
def cache_key
"milestone_closed_issues_count_#{@milestone.milestoneish_id}"
end
def relation_for_count
@milestone.issues.closed
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::ClosedIssuesCountService, :use_clean_rails_memory_store_caching,
feature_category: :team_planning do
let(:project) { create(:project) }
let(:milestone) { create(:milestone, project: project) }
before do
create(:issue, milestone: milestone, project: project)
create(:issue, :confidential, milestone: milestone, project: project)
create(:issue, :closed, milestone: milestone, project: project)
create(:issue, :closed, :confidential, milestone: milestone, project: project)
end
subject { described_class.new(milestone) }
it_behaves_like 'a counter caching service'
it 'counts closed issues including confidential' do
expect(subject.count).to eq(2)
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class PromoteService < Milestones::BaseService
PromoteMilestoneError = Class.new(StandardError)
def execute(milestone)
check_project_milestone!(milestone)
Milestone.transaction do
group_milestone = clone_project_milestone(milestone)
move_children_to_group_milestone(group_milestone)
# Destroy all milestones with same title across projects
destroy_old_milestones(milestone)
# Rollback if milestone is not valid
unless group_milestone.valid?
raise_error(group_milestone.errors.full_messages.to_sentence)
end
group_milestone
end
end
private
def milestone_ids_for_merge(group_milestone)
# Pluck need to be used here instead of select so the array of ids
# is persistent after old milestones gets deleted.
@milestone_ids_for_merge ||= begin
search_params = { title: group_milestone.title, project_ids: group_project_ids, state: 'all' }
milestones = MilestonesFinder.new(search_params).execute
milestones.pluck_primary_key
end
end
def move_children_to_group_milestone(group_milestone)
milestone_ids_for_merge(group_milestone).in_groups_of(100, false) do |milestone_ids|
update_children(group_milestone, milestone_ids)
end
end
def check_project_milestone!(milestone)
raise_error(s_('PromoteMilestone|Only project milestones can be promoted.')) unless milestone.project_milestone?
end
def clone_project_milestone(milestone)
params = milestone.slice(:title, :description, :start_date, :due_date, :state_event)
create_service = CreateService.new(group, current_user, params)
milestone = create_service.execute
# milestone won't be valid here because of duplicated title
milestone.save(validate: false)
milestone
end
# rubocop: disable CodeReuse/ActiveRecord
def update_children(group_milestone, milestone_ids)
issues = Issue.where(project_id: group_project_ids, milestone_id: milestone_ids)
merge_requests = MergeRequest.where(source_project_id: group_project_ids, milestone_id: milestone_ids)
[issues, merge_requests].each do |issuable_collection|
issuable_collection.update_all(milestone_id: group_milestone.id)
end
end
# rubocop: enable CodeReuse/ActiveRecord
def group
@group ||= parent.group || raise_error(s_('PromoteMilestone|Project does not belong to a group.'))
end
# rubocop: disable CodeReuse/ActiveRecord
def destroy_old_milestones(milestone)
Milestone.where(id: milestone_ids_for_merge(milestone)).destroy_all # rubocop: disable Cop/DestroyAll
end
# rubocop: enable CodeReuse/ActiveRecord
def group_project_ids
group.projects.select(:id)
end
def raise_error(message)
raise PromoteMilestoneError, s_("PromoteMilestone|Promotion failed - %{message}") % { message: message }
end
end
end
Milestones::PromoteService.prepend_mod_with('Milestones::PromoteService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::PromoteService, feature_category: :team_planning do
let(:group) { create(:group) }
let(:project) { create(:project, namespace: group) }
let(:user) { create(:user) }
let(:milestone_title) { 'project milestone' }
let(:milestone) { create(:milestone, project: project, title: milestone_title) }
let(:service) { described_class.new(project, user) }
describe '#execute' do
before do
group.add_maintainer(user)
end
context 'validations' do
it 'raises error if milestone does not belong to a project' do
allow(milestone).to receive(:project_milestone?).and_return(false)
expect { service.execute(milestone) }.to raise_error(described_class::PromoteMilestoneError)
end
it 'raises error if project does not belong to a group' do
project.update!(namespace: user.namespace)
expect { service.execute(milestone) }.to raise_error(described_class::PromoteMilestoneError)
end
it 'does not promote milestone and update issuables if promoted milestone is not valid' do
issue = create(:issue, milestone: milestone, project: project)
merge_request = create(:merge_request, milestone: milestone, source_project: project)
allow_next_instance_of(Milestone) do |instance|
allow(instance).to receive(:valid?).and_return(false)
end
expect { service.execute(milestone) }.to raise_error(described_class::PromoteMilestoneError)
expect(milestone.reload).to be_persisted
expect(issue.reload.milestone).to eq(milestone)
expect(merge_request.reload.milestone).to eq(milestone)
end
end
context 'without duplicated milestone titles across projects' do
it 'promotes project milestone to group milestone' do
promoted_milestone = service.execute(milestone)
expect(promoted_milestone).to be_group_milestone
end
it 'does not update issuables without milestone with the new promoted milestone' do
issue_without_milestone = create(:issue, project: project, milestone: nil)
merge_request_without_milestone = create(:merge_request, milestone: nil, source_project: project)
service.execute(milestone)
expect(issue_without_milestone.reload.milestone).to be_nil
expect(merge_request_without_milestone.reload.milestone).to be_nil
end
it 'sets issuables with new promoted milestone' do
issue = create(:issue, milestone: milestone, project: project)
merge_request = create(:merge_request, milestone: milestone, source_project: project)
promoted_milestone = service.execute(milestone)
expect(promoted_milestone).to be_group_milestone
expect(issue.reload.milestone).to eq(promoted_milestone)
expect(merge_request.reload.milestone).to eq(promoted_milestone)
end
end
context 'with duplicated milestone titles across projects' do
let(:project_2) { create(:project, namespace: group) }
let!(:milestone_2) { create(:milestone, project: project_2, title: milestone_title) }
it 'deletes project milestones with the same title' do
promoted_milestone = service.execute(milestone)
expect(promoted_milestone).to be_group_milestone
expect(promoted_milestone).to be_valid
expect(Milestone.exists?(milestone.id)).to be_falsy
expect(Milestone.exists?(milestone_2.id)).to be_falsy
end
it 'does not update issuables without milestone with the new promoted milestone' do
issue_without_milestone_1 = create(:issue, project: project, milestone: nil)
issue_without_milestone_2 = create(:issue, project: project_2, milestone: nil)
merge_request_without_milestone_1 = create(:merge_request, milestone: nil, source_project: project)
merge_request_without_milestone_2 = create(:merge_request, milestone: nil, source_project: project_2)
service.execute(milestone)
expect(issue_without_milestone_1.reload.milestone).to be_nil
expect(issue_without_milestone_2.reload.milestone).to be_nil
expect(merge_request_without_milestone_1.reload.milestone).to be_nil
expect(merge_request_without_milestone_2.reload.milestone).to be_nil
end
it 'sets all issuables with new promoted milestone' do
issue = create(:issue, milestone: milestone, project: project)
issue_2 = create(:issue, milestone: milestone_2, project: project_2)
merge_request = create(:merge_request, milestone: milestone, source_project: project)
merge_request_2 = create(:merge_request, milestone: milestone_2, source_project: project_2)
promoted_milestone = service.execute(milestone)
expect(issue.reload.milestone).to eq(promoted_milestone)
expect(issue_2.reload.milestone).to eq(promoted_milestone)
expect(merge_request.reload.milestone).to eq(promoted_milestone)
expect(merge_request_2.reload.milestone).to eq(promoted_milestone)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class IssuesCountService < BaseCountService
def initialize(milestone)
@milestone = milestone
end
def cache_key
"milestone_total_issues_count_#{@milestone.milestoneish_id}"
end
def relation_for_count
@milestone.issues
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::IssuesCountService, :use_clean_rails_memory_store_caching,
feature_category: :team_planning do
let(:project) { create(:project) }
let(:milestone) { create(:milestone, project: project) }
before do
create(:issue, milestone: milestone, project: project)
create(:issue, :confidential, milestone: milestone, project: project)
create(:issue, :closed, milestone: milestone, project: project)
create(:issue, :closed, milestone: milestone, project: project)
end
subject { described_class.new(milestone) }
it_behaves_like 'a counter caching service'
it 'counts all issues including confidential' do
expect(subject.count).to eq(4)
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
# Milestones::TransferService class
#
# Used for recreating the missing group milestones at project level when
# transferring a project to a new namespace
#
module Milestones
class TransferService
attr_reader :current_user, :old_group, :project
def initialize(current_user, old_group, project)
@current_user = current_user
@old_group = old_group
@project = project
end
def execute
return unless old_group.present?
Milestone.transaction do
milestones_to_transfer.find_each do |milestone|
new_milestone = find_or_create_milestone(milestone)
update_issues_milestone(milestone, new_milestone)
update_merge_requests_milestone(milestone.id, new_milestone&.id)
delete_milestone_counts_caches(milestone)
delete_milestone_counts_caches(new_milestone)
end
end
end
private
# rubocop: disable CodeReuse/ActiveRecord
def milestones_to_transfer
Milestone.from_union([group_milestones_applied_to_issues, group_milestones_applied_to_merge_requests])
.reorder(nil)
.distinct
end
# rubocop: enable CodeReuse/ActiveRecord
# rubocop: disable CodeReuse/ActiveRecord
def group_milestones_applied_to_issues
Milestone.joins(:issues)
.where(
issues: { project_id: project.id },
group_id: old_group.self_and_ancestors
)
end
# rubocop: enable CodeReuse/ActiveRecord
# rubocop: disable CodeReuse/ActiveRecord
def group_milestones_applied_to_merge_requests
Milestone.joins(:merge_requests)
.where(
merge_requests: { target_project_id: project.id },
group_id: old_group.self_and_ancestors
)
end
# rubocop: enable CodeReuse/ActiveRecord
def find_or_create_milestone(milestone)
params = milestone.attributes.slice('title', 'description', 'start_date', 'due_date', 'state')
FindOrCreateService.new(project, current_user, params).execute
end
# rubocop: disable CodeReuse/ActiveRecord
def update_issues_milestone(old_milestone, new_milestone)
Issue.where(project: project, milestone_id: old_milestone.id)
.update_all(milestone_id: new_milestone&.id)
end
# rubocop: enable CodeReuse/ActiveRecord
# rubocop: disable CodeReuse/ActiveRecord
def update_merge_requests_milestone(old_milestone_id, new_milestone_id)
MergeRequest.where(project: project, milestone_id: old_milestone_id)
.update_all(milestone_id: new_milestone_id)
end
# rubocop: enable CodeReuse/ActiveRecord
def delete_milestone_counts_caches(milestone)
return unless milestone
Milestones::IssuesCountService.new(milestone).delete_cache
Milestones::ClosedIssuesCountService.new(milestone).delete_cache
Milestones::MergeRequestsCountService.new(milestone).delete_cache
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::TransferService, feature_category: :team_planning do
describe '#execute' do
subject(:service) { described_class.new(user, old_group, project) }
context 'when old_group is present' do
let(:user) { create(:admin) }
let(:new_group) { create(:group) }
let(:old_group) { create(:group) }
let(:project) { create(:project, namespace: old_group) }
let(:group_milestone) { create(:milestone, :closed, group: old_group) }
let(:group_milestone2) { create(:milestone, group: old_group) }
let(:project_milestone) { create(:milestone, project: project) }
let!(:issue_with_group_milestone) { create(:issue, project: project, milestone: group_milestone) }
let!(:issue_with_project_milestone) { create(:issue, project: project, milestone: project_milestone) }
let!(:mr_with_group_milestone) { create(:merge_request, source_project: project, source_branch: 'branch-1', milestone: group_milestone) }
let!(:mr_with_project_milestone) { create(:merge_request, source_project: project, source_branch: 'branch-2', milestone: project_milestone) }
before do
new_group.add_maintainer(user)
project.add_maintainer(user)
# simulate project transfer
project.update!(group: new_group)
end
context 'without existing milestone at the new group level' do
it 'recreates the missing group milestones at project level' do
expect { service.execute }.to change(project.milestones, :count).by(1)
end
it 'applies new project milestone to issues with group milestone' do
service.execute
new_milestone = issue_with_group_milestone.reload.milestone
expect(new_milestone).not_to eq(group_milestone)
expect(new_milestone.title).to eq(group_milestone.title)
expect(new_milestone.project_milestone?).to be_truthy
expect(new_milestone.state).to eq("closed")
end
context 'when milestone is from an ancestor group' do
let(:old_group_ancestor) { create(:group) }
let(:old_group) { create(:group, parent: old_group_ancestor) }
let(:group_milestone) { create(:milestone, group: old_group_ancestor) }
it 'recreates the missing group milestones at project level' do
expect { service.execute }.to change(project.milestones, :count).by(1)
end
end
it 'deletes milestone counters cache for both milestones' do
new_milestone = create(:milestone, project: project, title: group_milestone.title)
expect_next_instance_of(Milestones::IssuesCountService, group_milestone) do |service|
expect(service).to receive(:delete_cache).and_call_original
end
expect_next_instance_of(Milestones::ClosedIssuesCountService, group_milestone) do |service|
expect(service).to receive(:delete_cache).and_call_original
end
expect_next_instance_of(Milestones::MergeRequestsCountService, group_milestone) do |service|
expect(service).to receive(:delete_cache).and_call_original
end
expect_next_instance_of(Milestones::IssuesCountService, new_milestone) do |service|
expect(service).to receive(:delete_cache).and_call_original
end
expect_next_instance_of(Milestones::ClosedIssuesCountService, new_milestone) do |service|
expect(service).to receive(:delete_cache).and_call_original
end
expect_next_instance_of(Milestones::MergeRequestsCountService, new_milestone) do |service|
expect(service).to receive(:delete_cache).and_call_original
end
service.execute
end
it 'does not apply new project milestone to issues with project milestone' do
service.execute
expect(issue_with_project_milestone.reload.milestone).to eq(project_milestone)
end
it 'applies new project milestone to merge_requests with group milestone' do
service.execute
new_milestone = mr_with_group_milestone.reload.milestone
expect(new_milestone).not_to eq(group_milestone)
expect(new_milestone.title).to eq(group_milestone.title)
expect(new_milestone.project_milestone?).to be_truthy
expect(new_milestone.state).to eq("closed")
end
it 'does not apply new project milestone to issuables with project milestone' do
service.execute
expect(mr_with_project_milestone.reload.milestone).to eq(project_milestone)
end
it 'does not recreate missing group milestones that are not applied to issues or merge requests' do
service.execute
new_milestone_title = project.reload.milestones.pluck(:title)
expect(new_milestone_title).to include(group_milestone.title)
expect(new_milestone_title).not_to include(group_milestone2.title)
end
context 'when find_or_create_milestone returns nil' do
before do
allow_next_instance_of(Milestones::FindOrCreateService) do |instance|
allow(instance).to receive(:execute).and_return(nil)
end
end
it 'removes issues group milestone' do
service.execute
expect(mr_with_group_milestone.reload.milestone).to be_nil
end
it 'removes merge requests group milestone' do
service.execute
expect(issue_with_group_milestone.reload.milestone).to be_nil
end
end
end
context 'with existing milestone at the new group level' do
let!(:existing_milestone) { create(:milestone, group: new_group, title: group_milestone.title) }
it 'does not create a new milestone' do
expect { service.execute }.not_to change(project.milestones, :count)
end
it 'applies existing milestone to issues with group milestone' do
service.execute
expect(issue_with_group_milestone.reload.milestone).to eq(existing_milestone)
end
it 'applies existing milestone to merge_requests with group milestone' do
service.execute
expect(mr_with_group_milestone.reload.milestone).to eq(existing_milestone)
end
end
end
end
context 'when old_group is not present' do
let(:user) { create(:admin) }
let(:old_group) { project.group }
let(:project) { create(:project, namespace: user.namespace) }
it 'returns nil' do
expect(described_class.new(user, old_group, project).execute).to be_nil
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class CloseService < Milestones::BaseService
def execute(milestone)
if milestone.close && milestone.project_milestone?
event_service.close_milestone(milestone, current_user)
end
milestone
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::CloseService, feature_category: :team_planning do
let(:user) { create(:user) }
let(:project) { create(:project) }
let(:milestone) { create(:milestone, title: "Milestone v1.2", project: project) }
before do
project.add_maintainer(user)
end
describe '#execute' do
before do
described_class.new(project, user, {}).execute(milestone)
end
it { expect(milestone).to be_valid }
it { expect(milestone).to be_closed }
describe 'event' do
let(:event) { Event.recent.first }
it { expect(event.milestone).to be_truthy }
it { expect(event.target).to eq(milestone) }
it { expect(event.action_name).to eq('closed') }
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class DestroyService < Milestones::BaseService
def execute(milestone)
Milestone.transaction do
update_params = { milestone_id: nil, skip_milestone_email: true }
milestone.issues.each do |issue|
Issues::UpdateService.new(container: parent, current_user: current_user, params: update_params).execute(issue)
end
milestone.merge_requests.each do |merge_request|
MergeRequests::UpdateService.new(project: parent, current_user: current_user, params: update_params).execute(merge_request)
end
log_destroy_event_for(milestone)
milestone.destroy
end
end
def log_destroy_event_for(milestone)
return if milestone.group_milestone?
event_service.destroy_milestone(milestone, current_user)
Event.for_milestone_id(milestone.id).each do |event|
event.target_id = nil
event.save
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::DestroyService, feature_category: :team_planning do
let(:user) { create(:user) }
let(:project) { create(:project, :repository) }
let(:milestone) { create(:milestone, title: 'Milestone v1.0', project: project) }
before do
project.add_maintainer(user)
end
def service
described_class.new(project, user, {})
end
describe '#execute' do
it 'deletes milestone' do
service.execute(milestone)
expect { milestone.reload }.to raise_error ActiveRecord::RecordNotFound
end
context 'with an existing merge request' do
let!(:issue) { create(:issue, project: project, milestone: milestone) }
let!(:merge_request) { create(:merge_request, source_project: project, milestone: milestone) }
it 'deletes milestone id from issuables' do
service.execute(milestone)
expect(issue.reload.milestone).to be_nil
expect(merge_request.reload.milestone).to be_nil
end
end
it 'logs destroy event' do
service.execute(milestone)
event = Event.where(project_id: milestone.project_id, target_type: 'Milestone')
expect(event.count).to eq(1)
end
context 'group milestones' do
let(:group) { create(:group) }
let(:group_milestone) { create(:milestone, group: group) }
before do
project.update!(namespace: group)
group.add_developer(user)
end
it { expect(service.execute(group_milestone)).to eq(group_milestone) }
it 'deletes milestone id from issuables' do
issue = create(:issue, project: project, milestone: group_milestone)
merge_request = create(:merge_request, source_project: project, milestone: group_milestone)
service.execute(group_milestone)
expect(issue.reload.milestone).to be_nil
expect(merge_request.reload.milestone).to be_nil
end
it 'does not log destroy event' do
expect { service.execute(group_milestone) }.not_to change { Event.count }
end
end
context 'when a release is tied to a milestone' do
it 'destroys the milestone but not the associated release' do
release = create(
:release,
tag: 'v1.0',
project: project,
milestones: [milestone]
)
expect { service.execute(milestone) }.not_to change { Release.count }
expect(release.reload).to be_persisted
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class UpdateService < Milestones::BaseService
def execute(milestone)
state = params[:state_event]
case state
when 'activate'
Milestones::ReopenService.new(parent, current_user, {}).execute(milestone)
when 'close'
Milestones::CloseService.new(parent, current_user, {}).execute(milestone)
end
if params.present?
milestone.assign_attributes(params.except(:state_event))
end
if milestone.changed?
before_update(milestone)
end
milestone.save
milestone
end
private
def before_update(milestone)
milestone.check_for_spam(user: current_user, action: :update)
end
end
end
Milestones::UpdateService.prepend_mod_with('Milestones::UpdateService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::UpdateService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project) }
let_it_be(:milestone) { create(:milestone, project: project) }
let_it_be(:params) { { title: 'New Title' } }
subject(:update_milestone) { described_class.new(project, user, params) }
describe '#execute' do
context 'when state_event is "activate"' do
let(:params) { { state_event: 'activate' } }
it 'calls Milestones::ReopenService' do
reopen_service = instance_double(Milestones::ReopenService)
expect(Milestones::ReopenService).to receive(:new).with(project, user, {}).and_return(reopen_service)
expect(reopen_service).to receive(:execute).with(milestone)
update_milestone.execute(milestone)
end
end
context 'when state_event is "close"' do
let(:params) { { state_event: 'close' } }
it 'calls Milestones::CloseService' do
close_service = instance_double(Milestones::CloseService)
expect(Milestones::CloseService).to receive(:new).with(project, user, {}).and_return(close_service)
expect(close_service).to receive(:execute).with(milestone)
update_milestone.execute(milestone)
end
end
context 'when params are present' do
it 'assigns the params to the milestone' do
expect(milestone).to receive(:assign_attributes).with(params.except(:state_event))
update_milestone.execute(milestone)
end
end
context 'when milestone is changed' do
before do
allow(milestone).to receive(:changed?).and_return(true)
end
it 'calls before_update' do
expect(update_milestone).to receive(:before_update).with(milestone)
update_milestone.execute(milestone)
end
end
context 'when milestone is not changed' do
before do
allow(milestone).to receive(:changed?).and_return(false)
end
it 'does not call before_update' do
expect(update_milestone).not_to receive(:before_update)
update_milestone.execute(milestone)
end
end
it 'saves the milestone' do
expect(milestone).to receive(:save)
update_milestone.execute(milestone)
end
it 'returns the milestone' do
expect(update_milestone.execute(milestone)).to eq(milestone)
end
end
describe '#before_update' do
it 'checks for spam' do
expect(milestone).to receive(:check_for_spam).with(user: user, action: :update)
update_milestone.send(:before_update, milestone)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Milestones
class CreateService < Milestones::BaseService
def execute
milestone = parent.milestones.new(params)
before_create(milestone)
if milestone.save && milestone.project_milestone?
event_service.open_milestone(milestone, current_user)
end
milestone
end
private
def before_create(milestone)
milestone.check_for_spam(user: current_user, action: :create)
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Milestones::CreateService, feature_category: :team_planning do
let_it_be(:user) { create(:user) }
let_it_be(:project) { create(:project) }
let_it_be(:params) { { title: 'New Milestone', description: 'Description' } }
subject(:create_milestone) { described_class.new(project, user, params) }
describe '#execute' do
context 'when milestone is saved successfully' do
it 'creates a new milestone' do
expect { create_milestone.execute }.to change { Milestone.count }.by(1)
end
it 'opens the milestone if it is a project milestone' do
expect_next_instance_of(EventCreateService) do |instance|
expect(instance).to receive(:open_milestone)
end
create_milestone.execute
end
it 'returns the created milestone' do
milestone = create_milestone.execute
expect(milestone).to be_a(Milestone)
expect(milestone.title).to eq('New Milestone')
expect(milestone.description).to eq('Description')
end
end
context 'when milestone fails to save' do
before do
allow_next_instance_of(Milestone) do |instance|
allow(instance).to receive(:save).and_return(false)
end
end
it 'does not create a new milestone' do
expect { create_milestone.execute }.not_to change { Milestone.count }
end
it 'does not open the milestone' do
expect(EventCreateService).not_to receive(:open_milestone)
create_milestone.execute
end
it 'returns the unsaved milestone' do
milestone = create_milestone.execute
expect(milestone).to be_a(Milestone)
expect(milestone.title).to eq('New Milestone')
expect(milestone.persisted?).to be_falsey
end
end
it 'calls before_create method' do
expect(create_milestone).to receive(:before_create)
create_milestone.execute
end
end
describe '#before_create' do
it 'checks for spam' do
milestone = build(:milestone)
expect(milestone).to receive(:check_for_spam).with(user: user, action: :create)
subject.send(:before_create, milestone)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Applications
class CreateService
attr_reader :current_user, :params
def initialize(current_user, params)
@current_user = current_user
@params = params.except(:ip_address)
end
# EE would override and use `request` arg
def execute(request)
@application = Doorkeeper::Application.new(params)
unless params[:scopes].present?
@application.errors.add(:base, _("Scopes can't be blank"))
return @application
end
@application.save
@application
end
end
end
Applications::CreateService.prepend_mod_with('Applications::CreateService')
``` | # frozen_string_literal: true
require "spec_helper"
RSpec.describe ::Applications::CreateService do
include TestRequestHelpers
let(:user) { create(:user) }
subject { described_class.new(user, params) }
context 'when scopes are present' do
let(:params) { attributes_for(:application, scopes: ['read_user']) }
it { expect { subject.execute(test_request) }.to change { Doorkeeper::Application.count }.by(1) }
end
context 'when scopes are missing' do
let(:params) { attributes_for(:application) }
it { expect { subject.execute(test_request) }.not_to change { Doorkeeper::Application.count } }
it 'includes blank scopes error message' do
application = subject.execute(test_request)
expect(application.errors.full_messages).to include "Scopes can't be blank"
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module JiraConnect
class CreateAsymmetricJwtService
ARGUMENT_ERROR_MESSAGE = 'jira_connect_installation is not a proxy installation'
def initialize(jira_connect_installation, event: :installed)
raise ArgumentError, ARGUMENT_ERROR_MESSAGE unless jira_connect_installation.proxy?
@jira_connect_installation = jira_connect_installation
@event = event
end
def execute
JWT.encode(jwt_claims, private_key, 'RS256', jwt_headers)
end
private
def jwt_claims
{ aud: aud_claim, iss: iss_claim, qsh: qsh_claim }
end
def aud_claim
@jira_connect_installation.audience_url
end
def iss_claim
@jira_connect_installation.client_key
end
def qsh_claim
Atlassian::Jwt.create_query_string_hash(
audience_event_url,
'POST',
@jira_connect_installation.audience_url
)
end
def audience_event_url
return @jira_connect_installation.audience_uninstalled_event_url if @event == :uninstalled
@jira_connect_installation.audience_installed_event_url
end
def private_key
@private_key ||= OpenSSL::PKey::RSA.generate(3072)
end
def public_key_storage
@public_key_storage ||= JiraConnect::PublicKey.create!(key: private_key.public_key)
end
def jwt_headers
{ kid: public_key_storage.uuid }
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe JiraConnect::CreateAsymmetricJwtService, feature_category: :integrations do
describe '#execute' do
let_it_be(:jira_connect_installation) { create(:jira_connect_installation) }
let(:service) { described_class.new(jira_connect_installation) }
subject(:jwt_token) { service.execute }
it 'raises an error' do
expect { jwt_token }.to raise_error(ArgumentError, 'jira_connect_installation is not a proxy installation')
end
context 'with proxy installation' do
let_it_be(:jira_connect_installation) { create(:jira_connect_installation, instance_url: 'https://gitlab.test') }
let(:public_key_id) { Atlassian::Jwt.decode(jwt_token, nil, false, algorithm: 'RS256').last['kid'] }
let(:public_key_cdn) { 'https://gitlab.com/-/jira_connect/public_keys/' }
let(:event_url) { 'https://gitlab.test/-/jira_connect/events/installed' }
let(:jwt_verification_claims) do
{
aud: 'https://gitlab.test/-/jira_connect',
iss: jira_connect_installation.client_key,
qsh: Atlassian::Jwt.create_query_string_hash(event_url, 'POST', 'https://gitlab.test/-/jira_connect')
}
end
subject(:jwt_token) { service.execute }
shared_examples 'produces a valid JWT' do
it 'produces a valid JWT' do
public_key = OpenSSL::PKey.read(JiraConnect::PublicKey.find(public_key_id).key)
options = jwt_verification_claims.except(:qsh).merge({ verify_aud: true, verify_iss: true,
algorithm: 'RS256' })
decoded_token = Atlassian::Jwt.decode(jwt_token, public_key, true, options).first
expect(decoded_token).to eq(jwt_verification_claims.stringify_keys)
end
end
it 'stores the public key' do
expect { JiraConnect::PublicKey.find(public_key_id) }.not_to raise_error
end
it_behaves_like 'produces a valid JWT'
context 'with uninstalled event option' do
let(:service) { described_class.new(jira_connect_installation, event: :uninstalled) }
let(:event_url) { 'https://gitlab.test/-/jira_connect/events/uninstalled' }
it_behaves_like 'produces a valid JWT'
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module JiraConnect
class SyncService
def initialize(project)
self.project = project
end
# Parameters: see Atlassian::JiraConnect::Client#send_info
# Includes: update_sequence_id, commits, branches, merge_requests, pipelines
def execute(**args)
preload_reviewers_for_merge_requests(args[:merge_requests]) if args.key?(:merge_requests)
JiraConnectInstallation.for_project(project).flat_map do |installation|
client = Atlassian::JiraConnect::Client.new(installation.base_url, installation.shared_secret)
responses = client.send_info(project: project, **args)
responses.each { |r| log_response(r) }
end
end
private
attr_accessor :project
def log_response(response)
message = {
message: 'response from jira dev_info api',
integration: 'JiraConnect',
project_id: project.id,
project_path: project.full_path,
jira_response: response&.to_json
}
has_errors = response && (response['errorMessage'].present? || response['errorMessages'].present?)
if has_errors
logger.error(message)
else
logger.info(message)
end
end
def logger
Gitlab::IntegrationsLogger
end
def preload_reviewers_for_merge_requests(merge_requests)
ActiveRecord::Associations::Preloader.new(
records: merge_requests, associations: [:approvals, { merge_request_reviewers: :reviewer }]
).call
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe JiraConnect::SyncService, feature_category: :integrations do
include AfterNextHelpers
describe '#execute' do
let_it_be(:project) { create(:project, :repository) }
let_it_be(:merge_request) { create(:merge_request, source_project: project) }
let_it_be(:merge_request_reviewer) { create(:merge_request_reviewer, merge_request: merge_request) }
let(:client) { Atlassian::JiraConnect::Client }
let(:info) { { a: 'Some', b: 'Info', merge_requests: [merge_request] } }
subject do
described_class.new(project).execute(**info)
end
before do
create(:jira_connect_subscription, namespace: project.namespace)
end
def store_info(return_values = [{ 'status': 'success' }])
receive(:send_info).with(project: project, **info).and_return(return_values)
end
def expect_log(type, message)
expect(Gitlab::IntegrationsLogger)
.to receive(type).with(
{
message: 'response from jira dev_info api',
integration: 'JiraConnect',
project_id: project.id,
project_path: project.full_path,
jira_response: message&.to_json
}
)
end
it 'calls Atlassian::JiraConnect::Client#store_dev_info and logs the response' do
expect_next(client).to store_info
expect_log(:info, { 'status': 'success' })
subject
end
it 'does not execute any queries for preloaded reviewers' do
expect_next(client).to store_info
expect_log(:info, { 'status': 'success' })
amount = ActiveRecord::QueryRecorder
.new { info[:merge_requests].flat_map(&:merge_request_reviewers).map(&:reviewer) }
.count
expect(amount).to be_zero
subject
end
context 'when a request returns errors' do
it 'logs each response as an error' do
expect_next(client).to store_info(
[
{ 'errorMessages' => ['some error message'] },
{ 'errorMessage' => 'a single error message' },
{ 'errorMessages' => [] },
{ 'errorMessage' => '' }
])
expect_log(:error, { 'errorMessages' => ['some error message'] })
expect_log(:error, { 'errorMessage' => 'a single error message' })
subject
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Files
class BaseService < Commits::CreateService
FileChangedError = Class.new(StandardError)
def initialize(*args)
super
git_user = Gitlab::Git::User.from_gitlab(current_user) if current_user.present?
@author_email = commit_email(git_user)
@author_name = params[:author_name] || git_user&.name
@commit_message = params[:commit_message]
@last_commit_sha = params[:last_commit_sha]
@file_path = params[:file_path]
@previous_path = params[:previous_path]
@file_content = params[:file_content]
@file_content = Base64.decode64(@file_content) if params[:file_content_encoding] == 'base64'
@execute_filemode = params[:execute_filemode]
end
def file_has_changed?(path, commit_id)
return false unless commit_id
last_commit_from_branch = get_last_commit_for_path(ref: @start_branch, path: path)
return false unless last_commit_from_branch
last_commit_from_commit_id = get_last_commit_for_path(ref: commit_id, path: path)
return false unless last_commit_from_commit_id
last_commit_from_branch.sha != last_commit_from_commit_id.sha
end
private
def get_last_commit_for_path(ref:, path:)
Gitlab::Git::Commit.last_for_path(@start_project.repository, ref, path, literal_pathspec: true)
end
def commit_email(git_user)
return params[:author_email] if params[:author_email].present?
return unless current_user
namespace_commit_email = current_user.namespace_commit_email_for_project(@start_project)
return namespace_commit_email.email.email if namespace_commit_email
git_user.email
end
end
end
``` | # frozen_string_literal: true
require "spec_helper"
RSpec.describe Files::BaseService, feature_category: :source_code_management do
let_it_be(:group) { create(:group) }
let_it_be(:project) { create(:project, group: group) }
let_it_be(:user) { create(:user) }
let(:params) { {} }
subject(:author_email) { described_class.new(project, user, params).instance_variable_get(:@author_email) }
before do
group.add_developer(user)
end
context 'with no namespace_commit_emails' do
it 'sets @author_email to user default email' do
expect(author_email).to eq(user.email)
end
end
context 'with an author_email in params and namespace_commit_email' do
let(:params) { { author_email: '[email protected]' } }
before do
create(:namespace_commit_email, user: user, namespace: group)
end
it 'gives precedence to the parameter value for @author_email' do
expect(author_email).to eq('[email protected]')
end
end
context 'with a project namespace_commit_email' do
it 'sets @author_email to the project namespace_commit_email' do
namespace_commit_email = create(:namespace_commit_email, user: user, namespace: project.project_namespace)
expect(author_email).to eq(namespace_commit_email.email.email)
end
end
context 'with a group namespace_commit_email' do
it 'sets @author_email to the group namespace_commit_email' do
namespace_commit_email = create(:namespace_commit_email, user: user, namespace: group)
expect(author_email).to eq(namespace_commit_email.email.email)
end
end
context 'with a project and group namespace_commit_email' do
it 'sets @author_email to the project namespace_commit_email' do
namespace_commit_email = create(:namespace_commit_email, user: user, namespace: project.project_namespace)
create(:namespace_commit_email, user: user, namespace: group)
expect(author_email).to eq(namespace_commit_email.email.email)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Files
class MultiService < Files::BaseService
UPDATE_FILE_ACTIONS = %w[update move delete chmod].freeze
def create_commit!
transformer = Lfs::FileTransformer.new(project, repository, @branch_name)
actions = actions_after_lfs_transformation(transformer, params[:actions])
actions = transform_move_actions(actions)
commit_actions!(actions)
end
private
def actions_after_lfs_transformation(transformer, actions)
actions.map do |action|
if action[:action] == 'create'
result = transformer.new_file(action[:file_path], action[:content], encoding: action[:encoding])
action[:content] = result.content
action[:encoding] = result.encoding
end
action
end
end
# When moving a file, `content: nil` means "use the contents of the previous
# file", while `content: ''` means "move the file and set it to empty"
def transform_move_actions(actions)
actions.map do |action|
action[:infer_content] = true if action[:content].nil?
action
end
end
def commit_actions!(actions)
repository.commit_files(
current_user,
message: @commit_message,
branch_name: @branch_name,
actions: actions,
author_email: @author_email,
author_name: @author_name,
start_project: @start_project,
start_branch_name: @start_branch,
start_sha: @start_sha,
force: force?
)
rescue ArgumentError => e
raise_error(e)
end
def validate!
super
params[:actions].each { |action| validate_file_status!(action) }
end
def validate_file_status!(action)
return unless UPDATE_FILE_ACTIONS.include?(action[:action])
file_path = action[:previous_path] || action[:file_path]
if file_has_changed?(file_path, action[:last_commit_id])
raise_error("The file has changed since you started editing it: #{file_path}")
end
end
end
end
``` | # frozen_string_literal: true
require "spec_helper"
RSpec.describe Files::MultiService, feature_category: :source_code_management do
subject { described_class.new(project, user, commit_params) }
let(:project) { create(:project, :repository) }
let(:repository) { project.repository }
let(:user) { create(:user) }
let(:branch_name) { project.default_branch }
let(:original_file_path) { 'files/ruby/popen.rb' }
let(:new_file_path) { 'files/ruby/popen.rb' }
let(:file_content) { 'New content' }
let(:action) { 'update' }
let(:commit_message) { 'Update File' }
let!(:original_commit_id) do
Gitlab::Git::Commit.last_for_path(project.repository, branch_name, original_file_path).sha
end
let(:branch_commit_id) do
Gitlab::Git::Commit.find(project.repository, branch_name).sha
end
let(:default_action) do
{
action: action,
file_path: new_file_path,
previous_path: original_file_path,
content: file_content,
last_commit_id: original_commit_id
}
end
let(:actions) { [default_action] }
let(:commit_params) do
{
commit_message: commit_message,
branch_name: branch_name,
start_branch: branch_name,
actions: actions
}
end
before do
project.add_maintainer(user)
end
describe '#execute' do
context 'with a valid action' do
it 'returns a hash with the :success status' do
results = subject.execute
expect(results[:status]).to eq(:success)
end
end
context 'with an invalid action' do
let(:action) { 'rename' }
it 'returns a hash with the :error status' do
results = subject.execute
expect(results[:status]).to eq(:error)
expect(results[:message]).to match(/Unknown action/)
end
end
describe 'Updating files' do
context 'when the file has been previously updated' do
before do
update_file(original_file_path)
end
it 'rejects the commit' do
results = subject.execute
expect(results[:status]).to eq(:error)
expect(results[:message]).to match(new_file_path)
end
end
context 'when file not changed, but later commit id is used' do
let(:actions) { [default_action.merge(last_commit_id: branch_commit_id)] }
it 'accepts the commit' do
results = subject.execute
expect(results[:status]).to eq(:success)
end
end
context 'when the file have not been modified' do
it 'accepts the commit' do
results = subject.execute
expect(results[:status]).to eq(:success)
end
end
end
describe 'changing execute_filemode of a file' do
let(:commit_message) { 'Chmod +x file' }
let(:file_path) { original_file_path }
let(:default_action) do
{
action: 'chmod',
file_path: file_path,
execute_filemode: true
}
end
it 'accepts the commit' do
results = subject.execute
expect(results[:status]).to eq(:success)
end
it 'updates the execute_filemode of the file' do
expect { subject.execute }.to change { repository.blob_at_branch(branch_name, file_path).mode }.from('100644').to('100755')
end
context "when the file doesn't exists" do
let(:file_path) { 'files/wrong_path.rb' }
it 'rejects the commit' do
results = subject.execute
expect(results[:status]).to eq(:error)
expect(results[:message]).to eq("A file with this name doesn't exist")
end
end
end
context 'when moving a file' do
let(:action) { 'move' }
let(:new_file_path) { 'files/ruby/new_popen.rb' }
let(:result) { subject.execute }
let(:blob) { repository.blob_at_branch(branch_name, new_file_path) }
context 'when original file has been updated' do
before do
update_file(original_file_path)
end
it 'rejects the commit' do
expect(result[:status]).to eq(:error)
expect(result[:message]).to match(original_file_path)
end
end
context 'when original file has not been updated' do
it 'moves the file' do
expect(result[:status]).to eq(:success)
expect(blob).to be_present
expect(blob.data).to eq(file_content)
end
context 'when content is nil' do
let(:file_content) { nil }
it 'moves the existing content untouched' do
original_content = repository.blob_at_branch(branch_name, original_file_path).data
expect(result[:status]).to eq(:success)
expect(blob).to be_present
expect(blob.data).to eq(original_content)
end
end
context 'when content is an empty string' do
let(:file_content) { '' }
it 'moves the file and empties it' do
expect(result[:status]).to eq(:success)
expect(blob).not_to be_nil
expect(blob.data).to eq('')
end
end
end
end
context 'when creating a file matching an LFS filter' do
let(:action) { 'create' }
let(:branch_name) { 'lfs' }
let(:new_file_path) { 'test_file.lfs' }
before do
allow(project).to receive(:lfs_enabled?).and_return(true)
end
it 'creates an LFS pointer' do
subject.execute
blob = repository.blob_at('lfs', new_file_path)
expect(blob.data).to start_with(Gitlab::Git::LfsPointerFile::VERSION_LINE)
end
it "creates an LfsObject with the file's content" do
subject.execute
expect(LfsObject.last.file.read).to eq file_content
end
context 'with base64 encoded content' do
let(:raw_file_content) { 'Raw content' }
let(:file_content) { Base64.encode64(raw_file_content) }
let(:actions) { [default_action.merge(encoding: 'base64')] }
it 'creates an LFS pointer' do
subject.execute
blob = repository.blob_at('lfs', new_file_path)
expect(blob.data).to start_with(Gitlab::Git::LfsPointerFile::VERSION_LINE)
end
it "creates an LfsObject with the file's content" do
subject.execute
expect(LfsObject.last.file.read).to eq raw_file_content
end
end
it 'links the LfsObject to the project' do
expect do
subject.execute
end.to change { project.lfs_objects.count }.by(1)
end
end
context 'when file status validation is skipped' do
let(:action) { 'create' }
let(:new_file_path) { 'files/ruby/new_file.rb' }
it 'does not check the last commit' do
expect(Gitlab::Git::Commit).not_to receive(:last_for_path)
subject.execute
end
it 'creates the file' do
subject.execute
blob = project.repository.blob_at_branch(branch_name, new_file_path)
expect(blob).to be_present
end
end
context 'when force is set to true and branch already exists' do
let(:commit_params) do
{
commit_message: commit_message,
branch_name: 'feature',
start_branch: 'master',
actions: actions,
force: true
}
end
it 'is still a success' do
expect(subject.execute[:status]).to eq(:success)
end
end
end
def update_file(path)
params = {
file_path: path,
start_branch: branch_name,
branch_name: branch_name,
commit_message: 'Update file',
file_content: 'New content'
}
Files::UpdateService.new(project, user, params).execute
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Files
class UpdateService < Files::BaseService
def create_commit!
repository.update_file(
current_user,
@file_path,
@file_content,
message: @commit_message,
branch_name: @branch_name,
previous_path: @previous_path,
author_email: @author_email,
author_name: @author_name,
start_project: @start_project,
start_branch_name: @start_branch,
execute_filemode: @execute_filemode
)
end
private
def validate!
super
if file_has_changed?(@file_path, @last_commit_sha)
raise FileChangedError, _('You are attempting to update a file that has changed since you started editing it.')
end
end
end
end
``` | # frozen_string_literal: true
require "spec_helper"
RSpec.describe Files::UpdateService, feature_category: :source_code_management do
subject { described_class.new(project, user, commit_params) }
let(:project) { create(:project, :repository) }
let(:user) { create(:user, :commit_email) }
let(:file_path) { 'files/ruby/popen.rb' }
let(:new_contents) { 'New Content' }
let(:branch_name) { project.default_branch }
let(:last_commit_sha) { nil }
let(:commit) { project.repository.commit }
let(:commit_params) do
{
file_path: file_path,
commit_message: "Update File",
file_content: new_contents,
file_content_encoding: "text",
last_commit_sha: last_commit_sha,
start_project: project,
start_branch: project.default_branch,
branch_name: branch_name
}
end
before do
project.add_maintainer(user)
end
describe "#execute" do
context "when the file's last commit sha is earlier than the latest change for that branch" do
let(:last_commit_sha) { Gitlab::Git::Commit.last_for_path(project.repository, project.default_branch, file_path).parent_id }
it "returns a hash with the correct error message and a :error status" do
expect { subject.execute }
.to raise_error(
Files::UpdateService::FileChangedError,
"You are attempting to update a file that has changed since you started editing it."
)
end
end
context "when the file's last commit sha does match the supplied last_commit_sha" do
let(:last_commit_sha) { Gitlab::Git::Commit.last_for_path(project.repository, project.default_branch, file_path).sha }
it "returns a hash with the :success status" do
results = subject.execute
expect(results[:status]).to match(:success)
end
it "updates the file with the new contents" do
subject.execute
results = project.repository.blob_at_branch(project.default_branch, file_path)
expect(results.data).to eq(new_contents)
end
it 'uses the commit email' do
subject.execute
expect(user.commit_email).not_to eq(user.email)
expect(commit.author_email).to eq(user.commit_email)
expect(commit.committer_email).to eq(user.commit_email)
end
end
context "when the last_commit_sha is not supplied" do
it "returns a hash with the :success status" do
results = subject.execute
expect(results[:status]).to match(:success)
end
it "updates the file with the new contents" do
subject.execute
results = project.repository.blob_at_branch(project.default_branch, file_path)
expect(results.data).to eq(new_contents)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Files
class CreateService < Files::BaseService
def create_commit!
transformer = Lfs::FileTransformer.new(project, repository, @branch_name)
result = transformer.new_file(@file_path, @file_content)
create_transformed_commit(result.content)
end
private
def create_transformed_commit(content_or_lfs_pointer)
repository.create_file(
current_user,
@file_path,
content_or_lfs_pointer,
message: @commit_message,
branch_name: @branch_name,
author_email: @author_email,
author_name: @author_name,
start_project: @start_project,
start_branch_name: @start_branch,
execute_filemode: @execute_filemode)
end
end
end
``` | # frozen_string_literal: true
require "spec_helper"
RSpec.describe Files::CreateService, feature_category: :source_code_management do
let(:project) { create(:project, :repository) }
let(:repository) { project.repository }
let(:user) { create(:user, :commit_email) }
let(:file_content) { 'Test file content' }
let(:branch_name) { project.default_branch }
let(:start_branch) { branch_name }
let(:commit_params) do
{
file_path: file_path,
commit_message: "Update File",
file_content: file_content,
file_content_encoding: "text",
start_project: project,
start_branch: start_branch,
branch_name: branch_name
}
end
let(:commit) { repository.head_commit }
subject { described_class.new(project, user, commit_params) }
before do
project.add_maintainer(user)
end
describe "#execute" do
context 'when file matches LFS filter' do
let(:file_path) { 'test_file.lfs' }
let(:branch_name) { 'lfs' }
context 'with LFS disabled' do
it 'skips gitattributes check' do
expect(repository).not_to receive(:attributes_at)
subject.execute
end
it "doesn't create LFS pointers" do
subject.execute
blob = repository.blob_at('lfs', file_path)
expect(blob.data).not_to start_with(Gitlab::Git::LfsPointerFile::VERSION_LINE)
expect(blob.data).to eq(file_content)
end
end
context 'with LFS enabled' do
before do
allow(project).to receive(:lfs_enabled?).and_return(true)
end
it 'creates an LFS pointer' do
subject.execute
blob = repository.blob_at('lfs', file_path)
expect(blob.data).to start_with(Gitlab::Git::LfsPointerFile::VERSION_LINE)
end
it "creates an LfsObject with the file's content" do
subject.execute
expect(LfsObject.last.file.read).to eq file_content
end
it 'links the LfsObject to the project' do
expect do
subject.execute
end.to change { project.lfs_objects.count }.by(1)
end
end
end
end
context 'commit attribute' do
let(:file_path) { 'test-commit-attributes.txt' }
it 'uses the commit email' do
subject.execute
expect(user.commit_email).not_to eq(user.email)
expect(commit.author_email).to eq(user.commit_email)
expect(commit.committer_email).to eq(user.commit_email)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Files
class DeleteService < Files::BaseService
def create_commit!
repository.delete_file(
current_user,
@file_path,
message: @commit_message,
branch_name: @branch_name,
author_email: @author_email,
author_name: @author_name,
start_project: @start_project,
start_branch_name: @start_branch)
end
private
def validate!
super
if file_has_changed?(@file_path, @last_commit_sha)
raise FileChangedError, _("You are attempting to delete a file that has been previously updated.")
end
end
end
end
``` | # frozen_string_literal: true
require "spec_helper"
RSpec.describe Files::DeleteService, feature_category: :source_code_management do
subject { described_class.new(project, user, commit_params) }
let(:project) { create(:project, :repository) }
let(:user) { create(:user, :commit_email) }
let(:file_path) { 'files/ruby/popen.rb' }
let(:branch_name) { project.default_branch }
let(:last_commit_sha) { nil }
let(:commit) { project.repository.head_commit }
let(:commit_params) do
{
file_path: file_path,
commit_message: "Delete File",
last_commit_sha: last_commit_sha,
start_project: project,
start_branch: project.default_branch,
branch_name: branch_name
}
end
shared_examples 'successfully deletes the file' do
it 'returns a hash with the :success status' do
results = subject.execute
expect(results[:status]).to match(:success)
end
it 'deletes the file' do
subject.execute
blob = project.repository.blob_at_branch(project.default_branch, file_path)
expect(blob).to be_nil
end
it 'uses the commit email' do
subject.execute
expect(user.commit_email).not_to eq(user.email)
expect(commit.author_email).to eq(user.commit_email)
expect(commit.committer_email).to eq(user.commit_email)
end
end
before do
project.add_maintainer(user)
end
describe "#execute" do
context "when the file's last commit is earlier than the latest commit for this branch" do
let(:last_commit_sha) { Gitlab::Git::Commit.last_for_path(project.repository, project.default_branch, file_path).parent_id }
it "returns a hash with the correct error message and a :error status" do
expect { subject.execute }.to raise_error(
Files::UpdateService::FileChangedError,
"You are attempting to delete a file that has been previously updated."
)
end
end
context "when the file's last commit sha does match the supplied last_commit_sha" do
let(:last_commit_sha) { Gitlab::Git::Commit.last_for_path(project.repository, project.default_branch, file_path).sha }
it_behaves_like 'successfully deletes the file'
end
context "when the last_commit_sha is not supplied" do
it_behaves_like 'successfully deletes the file'
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module WikiPages
# There are 3 notions of 'action' that inheriting classes must implement:
#
# - external_action: the action we report to external clients with webhooks
# - usage_counter_action: the action that we count in out internal counters
# - event_action: what we record as the value of `Event#action`
class BaseService < ::BaseContainerService
private
def execute_hooks(page)
page_data = payload(page)
container.execute_hooks(page_data, :wiki_page_hooks)
container.execute_integrations(page_data, :wiki_page_hooks)
increment_usage
create_wiki_event(page)
end
# Passed to web-hooks, and send to external consumers.
def external_action
raise NotImplementedError
end
# Passed to the WikiPageCounter to count events.
# Must be one of WikiPageCounter::KNOWN_EVENTS
def usage_counter_action
raise NotImplementedError
end
# Used to create `Event` records.
# Must be a valid value for `Event#action`
def event_action
raise NotImplementedError
end
def payload(page)
Gitlab::DataBuilder::WikiPage.build(page, current_user, external_action)
end
# This method throws an error if the action is an unanticipated value.
def increment_usage
Gitlab::UsageDataCounters::WikiPageCounter.count(usage_counter_action)
end
def create_wiki_event(page)
response = WikiPages::EventCreateService
.new(current_user)
.execute(slug_for_page(page), page, event_action, fingerprint(page))
log_error(response.message) if response.error?
end
def slug_for_page(page)
page.slug
end
def fingerprint(page)
page.sha
end
end
end
WikiPages::BaseService.prepend_mod_with('WikiPages::BaseService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe WikiPages::BaseService, feature_category: :wiki do
let(:project) { double('project') }
let(:user) { double('user') }
describe '#increment_usage' do
counter = Gitlab::UsageDataCounters::WikiPageCounter
error = counter::UnknownEvent
let(:subject) { bad_service_class.new(container: project, current_user: user) }
context 'the class implements usage_counter_action incorrectly' do
let(:bad_service_class) do
Class.new(described_class) do
def usage_counter_action
:bad_event
end
end
end
it 'raises an error on unknown events' do
expect { subject.send(:increment_usage) }.to raise_error(error)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module WikiPages
class EventCreateService
# @param [User] author The event author
def initialize(author)
raise ArgumentError, 'author must not be nil' unless author
@author = author
end
def execute(slug, page, action, event_fingerprint)
wiki_page_meta = WikiPage::Meta.find_or_create(slug, page)
event = ::EventCreateService.new.wiki_event(wiki_page_meta, author, action, event_fingerprint)
ServiceResponse.success(payload: { event: event })
rescue ::EventCreateService::IllegalActionError, ::ActiveRecord::ActiveRecordError => e
ServiceResponse.error(message: e.message, payload: { error: e })
end
private
attr_reader :author
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe WikiPages::EventCreateService, feature_category: :wiki do
let_it_be(:project) { create(:project) }
let_it_be(:user) { create(:user) }
subject { described_class.new(user) }
describe '#execute' do
let_it_be(:page) { create(:wiki_page, project: project) }
let(:slug) { generate(:sluggified_title) }
let(:action) { :created }
let(:fingerprint) { page.sha }
let(:response) { subject.execute(slug, page, action, fingerprint) }
context 'the user is nil' do
subject { described_class.new(nil) }
it 'raises an error on construction' do
expect { subject }.to raise_error ArgumentError
end
end
context 'the action is illegal' do
let(:action) { :illegal_action }
it 'returns an error' do
expect(response).to be_error
end
it 'does not create an event' do
expect { response }.not_to change(Event, :count)
end
end
it 'returns a successful response' do
expect(response).to be_success
end
context 'the action is a deletion' do
let(:action) { :destroyed }
it 'does not synchronize the wiki metadata timestamps with the git commit' do
expect_next_instance_of(WikiPage::Meta) do |instance|
expect(instance).not_to receive(:synch_times_with_page)
end
response
end
end
it 'creates a wiki page event' do
expect { response }.to change(Event, :count).by(1)
end
it 'returns an event in the payload' do
expect(response.payload).to include(event: have_attributes(author: user, wiki_page?: true, action: 'created'))
end
it 'records the slug for the page' do
response
meta = WikiPage::Meta.find_or_create(page.slug, page)
expect(meta.slugs.pluck(:slug)).to include(slug)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module WikiPages
class DestroyService < WikiPages::BaseService
def execute(page)
if page.delete
execute_hooks(page)
ServiceResponse.success(payload: { page: page })
else
ServiceResponse.error(
message: _('Could not delete wiki page'), payload: { page: page }
)
end
end
def usage_counter_action
:delete
end
def external_action
'delete'
end
def event_action
:destroyed
end
def fingerprint(page)
page.wiki.repository.head_commit.sha
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe WikiPages::DestroyService, feature_category: :wiki do
it_behaves_like 'WikiPages::DestroyService#execute', :project
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module WikiPages
class UpdateService < WikiPages::BaseService
UpdateError = Class.new(StandardError)
def execute(page)
# this class is not thread safe!
@old_slug = page.slug
if page.wiki.capture_git_error(event_action) { page.update(@params) }
execute_hooks(page)
ServiceResponse.success(payload: { page: page })
else
raise UpdateError, _('Could not update wiki page')
end
rescue UpdateError, WikiPage::PageChangedError, WikiPage::PageRenameError => e
page.update_attributes(@params) # rubocop:disable Rails/ActiveRecordAliases
ServiceResponse.error(
message: e.message,
payload: { page: page }
)
end
def usage_counter_action
:update
end
def external_action
'update'
end
def event_action
:updated
end
def slug_for_page(page)
@old_slug.presence || super
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe WikiPages::UpdateService, feature_category: :wiki do
it_behaves_like 'WikiPages::UpdateService#execute', :project
describe '#execute' do
let_it_be(:project) { create(:project) }
let(:page) { create(:wiki_page, project: project) }
subject(:service) { described_class.new(container: project) }
context 'when wiki create fails due to git error' do
let(:wiki_git_error) { 'Could not update wiki page' }
it 'catches the thrown error and returns a ServiceResponse error' do
allow_next_instance_of(WikiPage) do |instance|
allow(instance).to receive(:update).and_raise(Gitlab::Git::CommandError.new(wiki_git_error))
end
result = service.execute(page)
expect(result).to be_error
expect(result.message).to eq(wiki_git_error)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module WikiPages
class CreateService < WikiPages::BaseService
def execute
wiki = Wiki.for_container(container, current_user)
page = WikiPage.new(wiki)
wiki.capture_git_error(event_action) do
page.create(@params)
end
if page.persisted?
execute_hooks(page)
ServiceResponse.success(payload: { page: page })
else
ServiceResponse.error(message: _('Could not create wiki page'), payload: { page: page })
end
end
def usage_counter_action
:create
end
def external_action
'create'
end
def event_action
:created
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe WikiPages::CreateService, feature_category: :wiki do
it_behaves_like 'WikiPages::CreateService#execute', :project
describe '#execute' do
let_it_be(:project) { create(:project) }
subject(:service) { described_class.new(container: project) }
context 'when wiki create fails due to git error' do
let(:wiki_git_error) { 'Could not create wiki page' }
it 'catches the thrown error and returns a ServiceResponse error' do
allow_next_instance_of(WikiPage) do |instance|
allow(instance).to receive(:create).and_raise(Gitlab::Git::CommandError.new(wiki_git_error))
end
result = service.execute
expect(result).to be_error
expect(result.message).to eq(wiki_git_error)
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Lfs
# Lfs::PushService pushes the LFS objects associated with a project to a
# remote URL
class PushService < BaseService
include Gitlab::Utils::StrongMemoize
# Match the canonical LFS client's batch size:
# https://github.com/git-lfs/git-lfs/blob/master/tq/transfer_queue.go#L19
BATCH_SIZE = 100
def execute
lfs_objects_relation.each_batch(of: BATCH_SIZE) do |objects|
push_objects!(objects)
end
success
rescue StandardError => err
Gitlab::ErrorTracking.log_exception(err, extra_context)
error(err.message)
end
private
def extra_context
{ project_id: project.id, user_id: current_user&.id }.compact
end
# Currently we only set repository_type for design repository objects, so
# push mirroring must send objects with a `nil` repository type - but if the
# wiki repository uses LFS, its objects will also be sent. This will be
# addressed by https://gitlab.com/gitlab-org/gitlab/-/issues/250346
def lfs_objects_relation
project.lfs_objects_for_repository_types(nil, :project)
end
def push_objects!(objects)
rsp = lfs_client.batch!('upload', objects)
objects = objects.index_by(&:oid)
rsp.fetch('objects', []).each do |spec|
actions = spec['actions']
object = objects[spec['oid']]
upload_object!(object, spec) if actions&.key?('upload')
verify_object!(object, spec) if actions&.key?('verify')
end
end
def upload_object!(object, spec)
authenticated = spec['authenticated']
upload = spec.dig('actions', 'upload')
# The server wants us to upload the object but something is wrong
unless object && object.size == spec['size'].to_i
log_error("Couldn't match object #{spec['oid']}/#{spec['size']}")
return
end
lfs_client.upload!(object, upload, authenticated: authenticated)
end
def verify_object!(object, spec)
authenticated = spec['authenticated']
verify = spec.dig('actions', 'verify')
lfs_client.verify!(object, verify, authenticated: authenticated)
end
def url
params.fetch(:url)
end
def credentials
params.fetch(:credentials)
end
def lfs_client
strong_memoize(:lfs_client) do
Gitlab::Lfs::Client.new(url, credentials: credentials)
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Lfs::PushService, feature_category: :source_code_management do
let(:logger) { service.send(:logger) }
let(:lfs_client) { service.send(:lfs_client) }
let_it_be(:project) { create(:forked_project_with_submodules) }
let_it_be(:remote_mirror) { create(:remote_mirror, project: project, enabled: true) }
let(:params) { { url: remote_mirror.bare_url, credentials: remote_mirror.credentials } }
subject(:service) { described_class.new(project, nil, params) }
describe "#execute" do
let_it_be(:lfs_object) { create_linked_lfs_object(project, :project) }
it 'uploads the object when upload is requested' do
stub_lfs_batch(lfs_object)
expect(lfs_client)
.to receive(:upload!)
.with(lfs_object, upload_action_spec(lfs_object), authenticated: true)
expect(service.execute).to eq(status: :success)
end
it 'does not upload the object when upload is not requested' do
stub_lfs_batch(lfs_object, upload: false)
expect(lfs_client).not_to receive(:upload!)
expect(service.execute).to eq(status: :success)
end
it 'verifies the upload if requested' do
stub_lfs_batch(lfs_object, verify: true)
expect(lfs_client).to receive(:upload!)
expect(lfs_client)
.to receive(:verify!)
.with(lfs_object, verify_action_spec(lfs_object), authenticated: true)
expect(service.execute).to eq(status: :success)
end
it 'skips verification if requested but upload fails' do
stub_lfs_batch(lfs_object, verify: true)
expect(lfs_client).to receive(:upload!) { raise 'failed' }
expect(lfs_client).not_to receive(:verify!)
expect(service.execute).to eq(status: :error, message: 'failed')
end
it 'returns a failure when submitting a batch fails' do
expect(lfs_client).to receive(:batch!) { raise 'failed' }
expect(Gitlab::ErrorTracking).to receive(:log_exception).and_call_original
expect(service.execute).to eq(status: :error, message: 'failed')
end
it 'returns a failure when submitting an upload fails' do
stub_lfs_batch(lfs_object)
expect(lfs_client).to receive(:upload!) { raise 'failed' }
expect(Gitlab::ErrorTracking).to receive(:log_exception).and_call_original
expect(service.execute).to eq(status: :error, message: 'failed')
end
context 'non-project-repository LFS objects' do
let_it_be(:nil_lfs_object) { create_linked_lfs_object(project, nil) }
let_it_be(:wiki_lfs_object) { create_linked_lfs_object(project, :wiki) }
let_it_be(:design_lfs_object) { create_linked_lfs_object(project, :design) }
it 'only tries to upload the project-repository LFS object' do
stub_lfs_batch(nil_lfs_object, lfs_object, upload: false)
expect(service.execute).to eq(status: :success)
end
end
end
it 'does nothing if there are no LFS objects' do
expect(lfs_client).not_to receive(:upload!)
expect(service.execute).to eq(status: :success)
end
def create_linked_lfs_object(project, type)
create(:lfs_objects_project, project: project, repository_type: type).lfs_object
end
def stub_lfs_batch(*objects, upload: true, verify: false)
expect(lfs_client)
.to receive(:batch!).with('upload', containing_exactly(*objects))
.and_return('transfer' => 'basic', 'objects' => objects.map { |o| object_spec(o, upload: upload, verify: verify) })
end
def batch_spec(*objects, upload: true, verify: false)
{ 'transfer' => 'basic', 'objects' => objects.map { |o| object_spec(o, upload: upload) } }
end
def object_spec(object, upload: true, verify: false)
{ 'oid' => object.oid, 'size' => object.size, 'authenticated' => true, 'actions' => {} }.tap do |spec|
spec['actions']['upload'] = upload_action_spec(object) if upload
spec['actions']['verify'] = verify_action_spec(object) if verify
end
end
def upload_action_spec(object)
{ 'href' => "https://example.com/#{object.oid}/#{object.size}", 'header' => { 'Key' => 'value' } }
end
def verify_action_spec(object)
{ 'href' => "https://example.com/#{object.oid}/#{object.size}/verify", 'header' => { 'Key' => 'value' } }
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Lfs
class UnlockFileService < BaseService
def execute
unless can?(current_user, :push_code, project)
raise Gitlab::GitAccess::ForbiddenError, _('You have no permissions')
end
unlock_file
rescue Gitlab::GitAccess::ForbiddenError => ex
error(ex.message, 403)
rescue ActiveRecord::RecordNotFound
error(_('Lock not found'), 404)
rescue StandardError => ex
error(ex.message, 500)
end
private
def unlock_file
forced = params[:force] == true
if lock.can_be_unlocked_by?(current_user, forced)
lock.destroy!
success(lock: lock, http_status: :ok)
elsif forced
error(_('You must have maintainer access to force delete a lock'), 403)
else
error(_("%{lock_path} is locked by GitLab User %{lock_user_id}") % { lock_path: lock.path, lock_user_id: lock.user_id }, 403)
end
end
# rubocop: disable CodeReuse/ActiveRecord
def lock
return @lock if defined?(@lock)
@lock = if params[:id].present?
project.lfs_file_locks.find(params[:id])
elsif params[:path].present?
project.lfs_file_locks.find_by!(path: params[:path])
end
end
# rubocop: enable CodeReuse/ActiveRecord
end
end
Lfs::UnlockFileService.prepend_mod_with('Lfs::UnlockFileService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Lfs::UnlockFileService, feature_category: :source_code_management do
let(:project) { create(:project) }
let(:current_user) { create(:user) }
let(:lock_author) { create(:user) }
let!(:lock) { create(:lfs_file_lock, user: lock_author, project: project) }
let(:params) { {} }
subject { described_class.new(project, current_user, params) }
describe '#execute' do
context 'when not authorized' do
it "doesn't succeed" do
result = subject.execute
expect(result[:status]).to eq(:error)
expect(result[:http_status]).to eq(403)
expect(result[:message]).to eq(_('You have no permissions'))
end
end
context 'when authorized' do
before do
project.add_developer(current_user)
end
context 'when lock does not exists' do
let(:params) { { id: 123 } }
it "doesn't succeed" do
result = subject.execute
expect(result[:status]).to eq(:error)
expect(result[:http_status]).to eq(404)
end
end
context 'when unlocked by the author' do
let(:current_user) { lock_author }
let(:params) { { id: lock.id } }
it "succeeds" do
result = subject.execute
expect(result[:status]).to eq(:success)
expect(result[:lock]).to be_present
end
end
context 'when unlocked by a different user' do
let(:current_user) { create(:user) }
let(:params) { { id: lock.id } }
it "doesn't succeed" do
result = subject.execute
expect(result[:status]).to eq(:error)
expect(result[:message]).to match(/is locked by GitLab User #{lock_author.id}/)
expect(result[:http_status]).to eq(403)
end
end
context 'when forced' do
let(:developer) { create(:user) }
let(:maintainer) { create(:user) }
before do
project.add_developer(developer)
project.add_maintainer(maintainer)
end
context 'by a regular user' do
let(:current_user) { developer }
let(:params) do
{ id: lock.id,
force: true }
end
it "doesn't succeed" do
result = subject.execute
expect(result[:status]).to eq(:error)
expect(result[:message]).to eq(_('You must have maintainer access to force delete a lock'))
expect(result[:http_status]).to eq(403)
end
end
context 'by a maintainer user' do
let(:current_user) { maintainer }
let(:params) do
{ id: lock.id,
force: true }
end
it "succeeds" do
result = subject.execute
expect(result[:status]).to eq(:success)
expect(result[:lock]).to be_present
end
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Lfs
# Usage: Calling `new_file` check to see if a file should be in LFS and
# return a transformed result with `content` and `encoding` to commit.
#
# The `repository` passed to the initializer can be a Repository or
# class that inherits from Repository.
#
# The `repository_type` property will be one of the types named in
# `Gitlab::GlRepository.types`, and is recorded on the `LfsObjectsProject`
# in order to identify the repository location of the blob.
#
# For LFS an LfsObject linked to the project is stored and an LFS
# pointer returned. If the file isn't in LFS the untransformed content
# is returned to save in the commit.
#
# transformer = Lfs::FileTransformer.new(project, repository, @branch_name)
# content_or_lfs_pointer = transformer.new_file(file_path, content).content
# create_transformed_commit(content_or_lfs_pointer)
#
class FileTransformer
attr_reader :project, :repository, :repository_type, :branch_name
def initialize(project, repository, branch_name)
@project = project
@repository = repository
@repository_type = repository.repo_type.name
@branch_name = branch_name
end
def new_file(file_path, file_content, encoding: nil, detect_content_type: false)
if project.lfs_enabled? && lfs_file?(file_path)
file_content = parse_file_content(file_content, encoding: encoding)
lfs_pointer_file = Gitlab::Git::LfsPointerFile.new(file_content)
lfs_object = create_lfs_object!(lfs_pointer_file, file_content, detect_content_type)
link_lfs_object!(lfs_object)
Result.new(content: lfs_pointer_file.pointer, encoding: 'text')
else
Result.new(content: file_content, encoding: encoding)
end
end
class Result
attr_reader :content, :encoding
def initialize(content:, encoding:)
@content = content
@encoding = encoding
end
end
private
def lfs_file?(file_path)
cached_attributes.attributes(file_path)['filter'] == 'lfs'
end
def cached_attributes
@cached_attributes ||= repository.attributes_at(branch_name)
end
# rubocop: disable CodeReuse/ActiveRecord
def create_lfs_object!(lfs_pointer_file, file_content, detect_content_type)
LfsObject.find_or_create_by(oid: lfs_pointer_file.sha256, size: lfs_pointer_file.size) do |lfs_object|
lfs_object.file = if detect_content_type && (content_type = Gitlab::Utils::MimeType.from_string(file_content))
CarrierWaveStringFile.new_file(
file_content: file_content,
filename: '',
content_type: content_type
)
else
CarrierWaveStringFile.new(file_content)
end
end
end
# rubocop: enable CodeReuse/ActiveRecord
def link_lfs_object!(lfs_object)
LfsObjectsProject.safe_find_or_create_by!(
project: project,
lfs_object: lfs_object,
repository_type: repository_type
)
end
def parse_file_content(file_content, encoding: nil)
return file_content.read if file_content.respond_to?(:read)
return Base64.decode64(file_content) if encoding == 'base64'
file_content
end
end
end
``` | # frozen_string_literal: true
require "spec_helper"
RSpec.describe Lfs::FileTransformer, feature_category: :source_code_management do
let(:project) { create(:project, :repository, :wiki_repo) }
let(:repository) { project.repository }
let(:file_content) { 'Test file content' }
let(:branch_name) { 'lfs' }
let(:file_path) { 'test_file.lfs' }
subject { described_class.new(project, repository, branch_name) }
describe '#new_file' do
context 'with lfs disabled' do
before do
allow(project).to receive(:lfs_enabled?).and_return(false)
end
it 'skips gitattributes check' do
expect(repository.raw).not_to receive(:blob_at)
subject.new_file(file_path, file_content)
end
it 'returns untransformed content' do
result = subject.new_file(file_path, file_content)
expect(result.content).to eq(file_content)
end
it 'returns untransformed encoding' do
result = subject.new_file(file_path, file_content, encoding: 'base64')
expect(result.encoding).to eq('base64')
end
end
context 'with lfs enabled' do
before do
allow(project).to receive(:lfs_enabled?).and_return(true)
end
it 'reuses cached gitattributes' do
second_file = 'another_file.lfs'
expect(repository.raw).to receive(:blob_at).with(branch_name, '.gitattributes').once
subject.new_file(file_path, file_content)
subject.new_file(second_file, file_content)
end
it "creates an LfsObject with the file's content" do
subject.new_file(file_path, file_content)
expect(LfsObject.last.file.read).to eq file_content
end
it 'returns an LFS pointer' do
result = subject.new_file(file_path, file_content)
expect(result.content).to start_with(Gitlab::Git::LfsPointerFile::VERSION_LINE)
end
it 'returns LFS pointer encoding as text' do
result = subject.new_file(file_path, file_content, encoding: 'base64')
expect(result.encoding).to eq('text')
end
context 'when an actual file is passed' do
let(:file) { Tempfile.new(file_path) }
before do
file.write(file_content)
file.rewind
end
after do
file.unlink
end
it "creates an LfsObject with the file's content" do
subject.new_file(file_path, file)
expect(LfsObject.last.file.read).to eq file_content
end
context 'when repository is a design repository' do
let(:file_path) { "/#{DesignManagement.designs_directory}/test_file.lfs" }
let(:repository) { project.design_repository }
it "creates an LfsObject with the file's content" do
subject.new_file(file_path, file)
expect(LfsObject.last.file.read).to eq(file_content)
end
it 'saves the correct repository_type to LfsObjectsProject' do
subject.new_file(file_path, file)
expect(project.lfs_objects_projects.first.repository_type).to eq('design')
end
end
context 'when content type detection enabled' do
let(:detect_content_type) { true }
before do
allow(Gitlab::Utils::MimeType).to receive(:from_string).with(file_content).and_return(mime_type)
end
context 'when mime type detected' do
let(:mime_type) { 'image/tiff' }
it 'creates a file with custom content type' do
expect(CarrierWaveStringFile).to receive(:new_file).with({
file_content: file_content,
filename: anything,
content_type: mime_type
})
subject.new_file(file_path, file, detect_content_type: detect_content_type)
end
end
context 'when mime type not detected' do
let(:mime_type) { nil }
it 'creates a file with default content type' do
expect(CarrierWaveStringFile).to receive(:new).with(file_content)
subject.new_file(file_path, file, detect_content_type: detect_content_type)
end
end
end
end
context "when doesn't use LFS" do
let(:file_path) { 'other.filetype' }
it "doesn't create LFS pointers" do
new_content = subject.new_file(file_path, file_content).content
expect(new_content).not_to start_with(Gitlab::Git::LfsPointerFile::VERSION_LINE)
expect(new_content).to eq(file_content)
end
end
it 'links LfsObjects to project' do
expect do
subject.new_file(file_path, file_content)
end.to change { project.lfs_objects.count }.by(1)
end
it 'saves the repository_type to LfsObjectsProject' do
subject.new_file(file_path, file_content)
expect(project.lfs_objects_projects.first.repository_type).to eq('project')
end
context 'when LfsObject already exists' do
let(:lfs_pointer) { Gitlab::Git::LfsPointerFile.new(file_content) }
before do
create(:lfs_object, oid: lfs_pointer.sha256, size: lfs_pointer.size)
end
it 'links LfsObjects to project' do
expect do
subject.new_file(file_path, file_content)
end.to change { project.lfs_objects.count }.by(1)
end
end
context 'when the LfsObject is already linked to project' do
before do
subject.new_file(file_path, file_content)
end
shared_examples 'a new LfsObject is not created' do
it do
expect do
second_service.new_file(file_path, file_content)
end.not_to change { project.lfs_objects.count }
end
end
context 'and the service is called again with the same repository type' do
let(:second_service) { described_class.new(project, repository, branch_name) }
include_examples 'a new LfsObject is not created'
it 'does not create a new LfsObjectsProject record' do
expect do
second_service.new_file(file_path, file_content)
end.not_to change { project.lfs_objects_projects.count }
end
end
context 'and the service is called again with a different repository type' do
let(:second_service) { described_class.new(project, project.wiki.repository, branch_name) }
before do
expect(second_service).to receive(:lfs_file?).and_return(true)
end
include_examples 'a new LfsObject is not created'
it 'creates a new LfsObjectsProject record' do
expect do
second_service.new_file(file_path, file_content)
end.to change { project.lfs_objects_projects.count }.by(1)
end
it 'sets the correct repository_type on the new LfsObjectsProject record' do
second_service.new_file(file_path, file_content)
repository_types = project.lfs_objects_projects.order(:id).pluck(:repository_type)
expect(repository_types).to eq(%w[project wiki])
end
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Lfs
class LocksFinderService < BaseService
def execute
success(locks: find_locks)
rescue StandardError => ex
error(ex.message, 500)
end
private
# rubocop: disable CodeReuse/ActiveRecord
def find_locks
options = params.slice(:id, :path).to_h.compact.symbolize_keys
project.lfs_file_locks.where(options)
end
# rubocop: enable CodeReuse/ActiveRecord
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Lfs::LocksFinderService, feature_category: :source_code_management do
let(:project) { create(:project) }
let(:user) { create(:user) }
let(:params) { {} }
subject { described_class.new(project, user, params) }
shared_examples 'no results' do
it 'returns an empty list' do
result = subject.execute
expect(result[:status]).to eq(:success)
expect(result[:locks]).to be_blank
end
end
describe '#execute' do
let!(:lock_1) { create(:lfs_file_lock, project: project) }
let!(:lock_2) { create(:lfs_file_lock, project: project, path: 'README') }
context 'find by id' do
context 'with results' do
let(:params) do
{ id: lock_1.id }
end
it 'returns the record' do
result = subject.execute
expect(result[:status]).to eq(:success)
expect(result[:locks].size).to eq(1)
expect(result[:locks].first).to eq(lock_1)
end
end
context 'without results' do
let(:params) do
{ id: 123 }
end
include_examples 'no results'
end
end
context 'find by path' do
context 'with results' do
let(:params) do
{ path: lock_1.path }
end
it 'returns the record' do
result = subject.execute
expect(result[:status]).to eq(:success)
expect(result[:locks].size).to eq(1)
expect(result[:locks].first).to eq(lock_1)
end
end
context 'without results' do
let(:params) do
{ path: 'not-found' }
end
include_examples 'no results'
end
end
context 'find all' do
context 'with results' do
it 'returns all the records' do
result = subject.execute
expect(result[:status]).to eq(:success)
expect(result[:locks].size).to eq(2)
end
end
context 'without results' do
before do
LfsFileLock.delete_all
end
include_examples 'no results'
end
end
context 'when an error is raised' do
it "doesn't succeed" do
allow_next_instance_of(described_class) do |instance|
allow(instance).to receive(:find_locks).and_raise(StandardError)
end
result = subject.execute
expect(result[:status]).to eq(:error)
expect(result[:locks]).to be_blank
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Lfs
class LockFileService < BaseService
def execute
unless can?(current_user, :push_code, project)
raise Gitlab::GitAccess::ForbiddenError, 'You have no permissions'
end
create_lock!
rescue ActiveRecord::RecordNotUnique
error('already locked', 409, current_lock)
rescue Gitlab::GitAccess::ForbiddenError => ex
error(ex.message, 403)
rescue StandardError => ex
error(ex.message, 500)
end
private
# rubocop: disable CodeReuse/ActiveRecord
def current_lock
project.lfs_file_locks.find_by(path: params[:path])
end
# rubocop: enable CodeReuse/ActiveRecord
def create_lock!
lock = project.lfs_file_locks.create!(user: current_user,
path: params[:path])
success(http_status: 201, lock: lock)
end
def error(message, http_status, lock = nil)
{
status: :error,
message: message,
http_status: http_status,
lock: lock
}
end
end
end
Lfs::LockFileService.prepend_mod_with('Lfs::LockFileService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Lfs::LockFileService, feature_category: :source_code_management do
let(:project) { create(:project) }
let(:current_user) { create(:user) }
subject { described_class.new(project, current_user, params) }
describe '#execute' do
let(:params) { { path: 'README.md' } }
context 'when not authorized' do
it "doesn't succeed" do
result = subject.execute
expect(result[:status]).to eq(:error)
expect(result[:http_status]).to eq(403)
expect(result[:message]).to eq('You have no permissions')
end
end
context 'when authorized' do
before do
project.add_developer(current_user)
end
context 'with an existent lock' do
let!(:lock) { create(:lfs_file_lock, project: project) }
it "doesn't succeed" do
expect(subject.execute[:status]).to eq(:error)
end
it "doesn't create the Lock" do
expect do
subject.execute
end.not_to change { LfsFileLock.count }
end
end
context 'without an existent lock' do
it "succeeds" do
expect(subject.execute[:status]).to eq(:success)
end
it "creates the Lock" do
expect do
subject.execute
end.to change { LfsFileLock.count }.by(1)
end
end
context 'when an error is raised' do
it "doesn't succeed" do
allow_next_instance_of(described_class) do |instance|
allow(instance).to receive(:create_lock!).and_raise(StandardError)
end
expect(subject.execute[:status]).to eq(:error)
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Keys
class LastUsedService
TIMEOUT = 1.day
attr_reader :key
# key - The Key for which to update the last used timestamp.
def initialize(key)
@key = key
end
def execute
return unless update?
# We _only_ want to update last_used_at and not also updated_at (which
# would be updated when using #touch).
key.update_column(:last_used_at, Time.zone.now)
end
def execute_async
return unless update?
::SshKeys::UpdateLastUsedAtWorker.perform_async(key.id)
end
def update?
return false if ::Gitlab::Database.read_only?
last_used = key.last_used_at
last_used.blank? || last_used <= TIMEOUT.ago
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Keys::LastUsedService, feature_category: :source_code_management do
describe '#execute', :clean_gitlab_redis_shared_state do
context 'when it has not been used recently' do
let(:key) { create(:key, last_used_at: 1.year.ago) }
let(:time) { Time.zone.now }
it 'updates the key' do
travel_to(time) { described_class.new(key).execute }
expect(key.reload.last_used_at).to be_like_time(time)
end
end
context 'when it has been used recently' do
let(:time) { 1.minute.ago }
let(:key) { create(:key, last_used_at: time) }
it 'does not update the key' do
described_class.new(key).execute
expect(key.reload.last_used_at).to be_like_time(time)
end
end
end
describe '#execute_async', :clean_gitlab_redis_shared_state do
context 'when it has not been used recently' do
let(:key) { create(:key, last_used_at: 1.year.ago) }
let(:time) { Time.zone.now }
it 'schedules a job to update last_used_at' do
expect(::SshKeys::UpdateLastUsedAtWorker).to receive(:perform_async)
travel_to(time) { described_class.new(key).execute_async }
end
end
context 'when it has been used recently' do
let(:key) { create(:key, last_used_at: 1.minute.ago) }
it 'does not schedule a job to update last_used_at' do
expect(::SshKeys::UpdateLastUsedAtWorker).not_to receive(:perform_async)
described_class.new(key).execute_async
end
end
end
describe '#update?', :clean_gitlab_redis_shared_state do
it 'returns true when no last used timestamp is present' do
key = build(:key, last_used_at: nil)
service = described_class.new(key)
expect(service.update?).to eq(true)
end
it 'returns true when the key needs to be updated' do
key = build(:key, last_used_at: 1.year.ago)
service = described_class.new(key)
expect(service.update?).to eq(true)
end
it 'returns false when the key does not yet need to be updated' do
key = build(:key, last_used_at: 1.minute.ago)
service = described_class.new(key)
expect(service.update?).to eq(false)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Keys
class ExpiryNotificationService < ::Keys::BaseService
attr_accessor :keys, :expiring_soon
def initialize(user, params)
@keys = params[:keys]
@expiring_soon = params[:expiring_soon]
super
end
def execute
return unless allowed?
if expiring_soon
trigger_expiring_soon_notification
else
trigger_expired_notification
end
end
private
def allowed?
user.can?(:receive_notifications)
end
def trigger_expiring_soon_notification
notification_service.ssh_key_expiring_soon(user, keys.map(&:fingerprint))
keys.update_all(before_expiry_notification_delivered_at: Time.current.utc)
end
def trigger_expired_notification
notification_service.ssh_key_expired(user, keys.map(&:fingerprint))
keys.update_all(expiry_notification_delivered_at: Time.current.utc)
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Keys::ExpiryNotificationService, feature_category: :source_code_management do
let_it_be_with_reload(:user) { create(:user) }
let(:params) { { keys: user.keys, expiring_soon: expiring_soon } }
subject { described_class.new(user, params) }
shared_examples 'sends a notification' do
it do
perform_enqueued_jobs do
subject.execute
end
should_email(user)
end
end
shared_examples 'uses notification service to send email to the user' do |notification_method|
it do
expect_next_instance_of(NotificationService) do |notification_service|
expect(notification_service).to receive(notification_method).with(key.user, [key.fingerprint])
end
subject.execute
end
end
shared_examples 'does not send notification' do
it do
perform_enqueued_jobs do
subject.execute
end
should_not_email(user)
end
end
shared_context 'block user' do
before do
user.block!
end
end
context 'with key expiring today', :mailer do
let_it_be_with_reload(:key) { create(:key, expires_at: 10.minutes.from_now, user: user) }
let(:expiring_soon) { false }
context 'when user has permission to receive notification' do
it_behaves_like 'sends a notification'
it_behaves_like 'uses notification service to send email to the user', :ssh_key_expired
it 'updates notified column' do
expect { subject.execute }.to change { key.reload.expiry_notification_delivered_at }
end
end
context 'when user does NOT have permission to receive notification' do
include_context 'block user'
it_behaves_like 'does not send notification'
it 'does not update notified column' do
expect { subject.execute }.not_to change { key.reload.expiry_notification_delivered_at }
end
end
end
context 'with key expiring soon', :mailer do
let_it_be_with_reload(:key) { create(:key, expires_at: 3.days.from_now, user: user) }
let(:expiring_soon) { true }
context 'when user has permission to receive notification' do
it_behaves_like 'sends a notification'
it_behaves_like 'uses notification service to send email to the user', :ssh_key_expiring_soon
it 'updates notified column' do
expect { subject.execute }.to change { key.reload.before_expiry_notification_delivered_at }
end
end
context 'when user does NOT have permission to receive notification' do
include_context 'block user'
it_behaves_like 'does not send notification'
it 'does not update notified column' do
expect { subject.execute }.not_to change { key.reload.before_expiry_notification_delivered_at }
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Keys
class RevokeService < ::Keys::DestroyService
def execute(key)
key.transaction do
unverify_associated_signatures(key)
raise ActiveRecord::Rollback unless super(key)
end
end
private
def unverify_associated_signatures(key)
key.ssh_signatures.each_batch do |batch|
batch.update_all(
verification_status: CommitSignatures::SshSignature.verification_statuses[:revoked_key],
updated_at: Time.zone.now
)
end
end
end
end
Keys::DestroyService.prepend_mod
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Keys::RevokeService, feature_category: :source_code_management do
let(:user) { create(:user) }
subject(:service) { described_class.new(user) }
it 'destroys a key' do
key = create(:key)
expect { service.execute(key) }.to change { key.persisted? }.from(true).to(false)
end
it 'unverifies associated signatures' do
key = create(:key)
signature = create(:ssh_signature, key: key)
expect do
service.execute(key)
end.to change { signature.reload.key }.from(key).to(nil)
.and change { signature.reload.verification_status }.from('verified').to('revoked_key')
end
it 'does not unverifies signatures if destroy fails' do
key = create(:key)
signature = create(:ssh_signature, key: key)
expect(key).to receive(:destroy).and_return(false)
expect { service.execute(key) }.not_to change { signature.reload.verification_status }
expect(key).to be_persisted
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Keys
class DestroyService < ::Keys::BaseService
def execute(key)
return unless destroy_possible?(key)
destroy(key)
end
private
# overridden in EE::Keys::DestroyService
def destroy_possible?(key)
true
end
def destroy(key)
key.destroy
end
end
end
Keys::DestroyService.prepend_mod
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Keys::DestroyService, feature_category: :source_code_management do
let(:user) { create(:user) }
subject { described_class.new(user) }
it 'destroys a key' do
key = create(:personal_key)
expect { subject.execute(key) }.to change(Key, :count).by(-1)
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Keys
class CreateService < ::Keys::BaseService
attr_accessor :current_user
def initialize(current_user, params = {})
@current_user = current_user
@params = params
@ip_address = @params.delete(:ip_address)
@user = params.delete(:user) || current_user
end
def execute
key = user.keys.create(params)
notification_service.new_key(key) if key.persisted?
key
end
end
end
Keys::CreateService.prepend_mod_with('Keys::CreateService')
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Keys::CreateService, feature_category: :source_code_management do
let(:user) { create(:user) }
let(:params) { attributes_for(:key) }
subject { described_class.new(user, params) }
context 'notification', :mailer do
it 'sends a notification' do
perform_enqueued_jobs do
subject.execute
end
should_email(user)
end
end
it 'creates a key' do
expect { subject.execute }.to change { user.keys.where(params).count }.by(1)
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Members
class InviteMemberBuilder < StandardMemberBuilder
def execute
if user_by_email
find_or_initialize_member_by_user(user_by_email.id)
else
source.members_and_requesters.find_or_initialize_by(invite_email: invitee) # rubocop:disable CodeReuse/ActiveRecord
end
end
private
def user_by_email
source.users_by_emails([invitee])[invitee]
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Members::InviteMemberBuilder, feature_category: :groups_and_projects do
let_it_be(:source) { create(:group) }
let_it_be(:existing_member) { create(:group_member) }
let(:existing_members) { { existing_member.user.id => existing_member } }
describe '#execute' do
context 'when user record found by email' do
it 'returns member from existing members hash' do
expect(described_class.new(source, existing_member.user.email, existing_members).execute).to eq existing_member
end
it 'builds a new member' do
user = create(:user)
member = described_class.new(source, user.email, existing_members).execute
expect(member).to be_new_record
expect(member.user).to eq user
end
end
end
context 'when no existing users found by the email' do
it 'finds existing member' do
member = create(:group_member, :invited, source: source)
expect(described_class.new(source, member.invite_email, existing_members).execute).to eq member
end
it 'builds a new member' do
email = '[email protected]'
member = described_class.new(source, email, existing_members).execute
expect(member).to be_new_record
expect(member.invite_email).to eq email
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Members
class InvitationReminderEmailService
include Gitlab::Utils::StrongMemoize
attr_reader :invitation
MAX_INVITATION_LIFESPAN = 14.0
REMINDER_RATIO = [2, 5, 10].freeze
def initialize(invitation)
@invitation = invitation
end
def execute
reminder_index = days_on_which_to_send_reminders.index(days_after_invitation_sent)
return unless reminder_index
invitation.send_invitation_reminder(reminder_index)
end
private
def days_after_invitation_sent
(Date.today - invitation.created_at.to_date).to_i
end
def days_on_which_to_send_reminders
# Don't send any reminders if the invitation has expired or expires today
return [] if invitation.expires_at && invitation.expires_at <= Date.today
# Calculate the number of days on which to send reminders based on the MAX_INVITATION_LIFESPAN and the REMINDER_RATIO
REMINDER_RATIO.map { |number_of_days| ((number_of_days * invitation_lifespan_in_days) / MAX_INVITATION_LIFESPAN).ceil }.uniq
end
def invitation_lifespan_in_days
# When the invitation lifespan is more than 14 days or does not expire, send the reminders within 14 days
strong_memoize(:invitation_lifespan_in_days) do
if invitation.expires_at
[(invitation.expires_at - invitation.created_at.to_date).to_i, MAX_INVITATION_LIFESPAN].min
else
MAX_INVITATION_LIFESPAN
end
end
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Members::InvitationReminderEmailService, feature_category: :groups_and_projects do
describe 'sending invitation reminders' do
subject { described_class.new(invitation).execute }
let_it_be(:frozen_time) { Date.today.beginning_of_day }
let_it_be(:invitation) { build(:group_member, :invited, created_at: frozen_time) }
before do
invitation.expires_at = frozen_time + expires_at_days.days if expires_at_days
end
using RSpec::Parameterized::TableSyntax
where(:expires_at_days, :send_reminder_at_days) do
0 | []
1 | []
2 | [1]
3 | [1, 2]
4 | [1, 2, 3]
5 | [1, 2, 4]
6 | [1, 3, 5]
7 | [1, 3, 5]
8 | [2, 3, 6]
9 | [2, 4, 7]
10 | [2, 4, 8]
11 | [2, 4, 8]
12 | [2, 5, 9]
13 | [2, 5, 10]
14 | [2, 5, 10]
15 | [2, 5, 10]
nil | [2, 5, 10]
end
with_them do
# Create an invitation today with an expiration date from 0 to 10 days in the future or without an expiration date
# We chose 10 days here, because we fetch invitations that were created at most 10 days ago.
11.times do |day|
it 'sends an invitation reminder only on the expected days' do
next if day > (expires_at_days || 10) # We don't need to test after the invitation has already expired
# We are traveling in a loop from today to 10 days from now
travel_to(frozen_time + day.days) do
# Given an expiration date and the number of days after the creation of the invitation based on the current day in the loop, a reminder may be sent
if (reminder_index = send_reminder_at_days.index(day))
expect(invitation).to receive(:send_invitation_reminder).with(reminder_index)
else
expect(invitation).not_to receive(:send_invitation_reminder)
end
subject
end
end
end
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Members
class BaseService < ::BaseService
# current_user - The user that performs the action
# params - A hash of parameters
def initialize(current_user = nil, params = {})
@current_user = current_user
@params = params
# could be a string, force to an integer, part of fix
# https://gitlab.com/gitlab-org/gitlab/-/issues/219496
# Allow the ArgumentError to be raised if it can't be converted to an integer.
@params[:access_level] = Integer(@params[:access_level]) if @params[:access_level]
end
def after_execute(args)
# overridden in EE::Members modules
end
private
def update_member_permission(member)
case member
when GroupMember
:update_group_member
when ProjectMember
:update_project_member
else
raise "Unknown member type: #{member}!"
end
end
def override_member_permission(member)
case member
when GroupMember
:override_group_member
when ProjectMember
:override_project_member
else
raise "Unknown member type: #{member}!"
end
end
def action_member_permission(action, member)
case action
when :update
update_member_permission(member)
when :override
override_member_permission(member)
else
raise "Unknown action '#{action}' on #{member}!"
end
end
def resolve_access_request_todos(member)
todo_service.resolve_access_request_todos(member)
end
def enqueue_delete_todos(member)
type = member.is_a?(GroupMember) ? 'Group' : 'Project'
# don't enqueue immediately to prevent todos removal in case of a mistake
member.run_after_commit_or_now do
TodosDestroyer::EntityLeaveWorker.perform_in(Todo::WAIT_FOR_DELETE, member.user_id, member.source_id, type)
end
end
def cannot_assign_owner_responsibilities_to_member_in_project?(member)
# The purpose of this check is -
# We can have direct members who are "Owners" in a project going forward and
# we do not want Maintainers of the project updating/adding/removing other "Owners"
# within the project.
# Only OWNERs in a project should be able to manage any action around OWNERship in that project.
member.is_a?(ProjectMember) &&
!can?(current_user, :manage_owners, member.source)
end
alias_method :cannot_revoke_owner_responsibilities_from_member_in_project?,
:cannot_assign_owner_responsibilities_to_member_in_project?
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Members::BaseService, feature_category: :groups_and_projects do
let_it_be(:access_requester) { create(:group_member) }
describe '#resolve_access_request_todos' do
it 'calls the resolve_access_request_todos of todo service' do
expect_next_instance_of(TodoService) do |todo_service|
expect(todo_service)
.to receive(:resolve_access_request_todos).with(access_requester)
end
described_class.new.send(:resolve_access_request_todos, access_requester)
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Members
class UnassignIssuablesService
attr_reader :user, :entity
def initialize(user, entity)
@user = user
@entity = entity
end
def execute
return unless entity && user
project_ids = entity.is_a?(Group) ? entity.all_projects.select(:id) : [entity.id]
user.issue_assignees.on_issues(Issue.in_projects(project_ids).select(:id)).delete_all
user.merge_request_assignees.in_projects(project_ids).delete_all
user.invalidate_cache_counts
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Members::UnassignIssuablesService, feature_category: :groups_and_projects do
let_it_be(:group) { create(:group, :private) }
let_it_be(:project) { create(:project, group: group) }
let_it_be(:user, reload: true) { create(:user) }
let_it_be(:assigned_issue1, reload: true) { create(:issue, project: project, assignees: [user]) }
let_it_be(:assigned_issue2, reload: true) { create(:issue, project: project, assignees: [user]) }
let!(:assigned_merge_request1) { create(:merge_request, :simple, :closed, target_project: project, source_project: project, assignees: [user], title: 'Test1') }
let!(:assigned_merge_request2) { create(:merge_request, :simple, :opened, target_project: project, source_project: project, assignees: [user], title: 'Test2') }
describe '#execute' do
RSpec.shared_examples 'un-assigning issuables' do |issue_count, mr_count, open_issue_count, open_mr_count|
it 'removes issuable assignments', :aggregate_failures do
expect(user.assigned_issues.count).to eq(issue_count)
expect(user.assigned_merge_requests.count).to eq(mr_count)
subject
expect(user.assigned_issues.count).to eq(0)
expect(user.assigned_merge_requests.count).to eq(0)
end
it 'invalidates user cache', :aggregate_failures, :clean_gitlab_redis_cache do
expect(user.assigned_open_merge_requests_count).to eq(open_mr_count)
expect(user.assigned_open_issues_count).to eq(open_issue_count)
subject
expect(user.assigned_open_merge_requests_count).to eq(0)
expect(user.assigned_open_issues_count).to eq(0)
end
end
context 'when a user leaves a project' do
before do
project.add_maintainer(user)
end
subject { described_class.new(user, project).execute }
it_behaves_like 'un-assigning issuables', 2, 2, 2, 1
end
context 'when a user leaves a group' do
let_it_be(:project2) { create(:project, group: group) }
let_it_be(:assigned_issue3, reload: true) { create(:issue, project: project2, assignees: [user]) }
let_it_be(:assigned_issue4, reload: true) { create(:issue, project: project2, assignees: [user]) }
let!(:assigned_merge_request3) { create(:merge_request, :simple, :closed, target_project: project2, source_project: project2, assignees: [user], title: 'Test1') }
let!(:assigned_merge_request4) { create(:merge_request, :simple, :opened, target_project: project2, source_project: project2, assignees: [user], title: 'Test2') }
before do
group.add_maintainer(user)
end
subject { described_class.new(user, group).execute }
it_behaves_like 'un-assigning issuables', 4, 4, 4, 2
end
end
end
|
Write RSpec test file for following ruby class
```ruby
# frozen_string_literal: true
module Members
class StandardMemberBuilder
def initialize(source, invitee, existing_members)
@source = source
@invitee = invitee
@existing_members = existing_members
end
def execute
find_or_initialize_member_by_user(invitee.id)
end
private
attr_reader :source, :invitee, :existing_members
def find_or_initialize_member_by_user(user_id)
existing_members[user_id] || source.members_and_requesters.build(user_id: user_id) # rubocop:disable CodeReuse/ActiveRecord
end
end
end
``` | # frozen_string_literal: true
require 'spec_helper'
RSpec.describe Members::StandardMemberBuilder, feature_category: :groups_and_projects do
let_it_be(:source) { create(:group) }
let_it_be(:existing_member) { create(:group_member) }
let(:existing_members) { { existing_member.user.id => existing_member } }
describe '#execute' do
it 'returns member from existing members hash' do
expect(described_class.new(source, existing_member.user, existing_members).execute).to eq existing_member
end
it 'builds a new member' do
user = create(:user)
member = described_class.new(source, user, existing_members).execute
expect(member).to be_new_record
expect(member.user).to eq user
end
end
end
|