Commit 6683fdcf authored by Dmitriy Zaporozhets's avatar Dmitriy Zaporozhets

Add nested groups support to the routing

Signed-off-by: default avatarDmitriy Zaporozhets <dmitriy.zaporozhets@gmail.com>
parent b1b5060d
...@@ -49,6 +49,14 @@ class ApplicationController < ActionController::Base ...@@ -49,6 +49,14 @@ class ApplicationController < ActionController::Base
render_404 render_404
end end
def route_not_found
if current_user
not_found
else
redirect_to new_user_session_path
end
end
protected protected
# This filter handles both private tokens and personal access tokens # This filter handles both private tokens and personal access tokens
......
...@@ -174,6 +174,7 @@ class Project < ActiveRecord::Base ...@@ -174,6 +174,7 @@ class Project < ActiveRecord::Base
message: Gitlab::Regex.project_name_regex_message } message: Gitlab::Regex.project_name_regex_message }
validates :path, validates :path,
presence: true, presence: true,
project_path: true,
length: { within: 0..255 }, length: { within: 0..255 },
format: { with: Gitlab::Regex.project_path_regex, format: { with: Gitlab::Regex.project_path_regex,
message: Gitlab::Regex.project_path_regex_message } message: Gitlab::Regex.project_path_regex_message }
......
...@@ -291,8 +291,12 @@ class User < ActiveRecord::Base ...@@ -291,8 +291,12 @@ class User < ActiveRecord::Base
end end
end end
def find_by_username(username)
iwhere(username: username).take
end
def find_by_username!(username) def find_by_username!(username)
find_by!('lower(username) = ?', username.downcase) iwhere(username: username).take!
end end
def find_by_personal_access_token(token_string) def find_by_personal_access_token(token_string)
......
...@@ -35,8 +35,22 @@ class NamespaceValidator < ActiveModel::EachValidator ...@@ -35,8 +35,22 @@ class NamespaceValidator < ActiveModel::EachValidator
users users
].freeze ].freeze
def self.valid?(value)
!reserved?(value) && follow_format?(value)
end
def self.reserved?(value)
RESERVED.include?(value)
end
def self.follow_format?(value)
value =~ Gitlab::Regex.namespace_regex
end
delegate :reserved?, :follow_format?, to: :class
def validate_each(record, attribute, value) def validate_each(record, attribute, value)
unless value =~ Gitlab::Regex.namespace_regex unless follow_format?(value)
record.errors.add(attribute, Gitlab::Regex.namespace_regex_message) record.errors.add(attribute, Gitlab::Regex.namespace_regex_message)
end end
...@@ -44,10 +58,4 @@ class NamespaceValidator < ActiveModel::EachValidator ...@@ -44,10 +58,4 @@ class NamespaceValidator < ActiveModel::EachValidator
record.errors.add(attribute, "#{value} is a reserved name") record.errors.add(attribute, "#{value} is a reserved name")
end end
end end
private
def reserved?(value)
RESERVED.include?(value)
end
end end
# ProjectPathValidator
#
# Custom validator for GitLab project path values.
#
# Values are checked for formatting and exclusion from a list of reserved path
# names.
class ProjectPathValidator < ActiveModel::EachValidator
# All project routes with wildcard argument must be listed here.
# Otherwise it can lead to routing issues when route considered as project name.
#
# Example:
# /group/project/tree/deploy_keys
#
# without tree as reserved name routing can match 'group/project' as group name,
# 'tree' as project name and 'deploy_keys' as route.
#
RESERVED = (NamespaceValidator::RESERVED +
%w[tree commits wikis new edit create update logs_tree
preview blob blame raw files create_dir find_file]).freeze
def self.valid?(value)
!reserved?(value)
end
def self.reserved?(value)
RESERVED.include?(value)
end
delegate :reserved?, to: :class
def validate_each(record, attribute, value)
if reserved?(value)
record.errors.add(attribute, "#{value} is a reserved name")
end
end
end
...@@ -7,7 +7,7 @@ ...@@ -7,7 +7,7 @@
= link_to 'Home', namespace_project_wiki_path(@project.namespace, @project, :home) = link_to 'Home', namespace_project_wiki_path(@project.namespace, @project, :home)
= nav_link(path: 'wikis#pages') do = nav_link(path: 'wikis#pages') do
= link_to 'Pages', namespace_project_wiki_pages_path(@project.namespace, @project) = link_to 'Pages', namespace_project_wikis_pages_path(@project.namespace, @project)
= nav_link(path: 'wikis#git_access') do = nav_link(path: 'wikis#git_access') do
= link_to namespace_project_wikis_git_access_path(@project.namespace, @project) do = link_to namespace_project_wikis_git_access_path(@project.namespace, @project) do
......
---
title: Add nested groups support to the routing
merge_request: 7459
author:
require 'sidekiq/web' require 'sidekiq/web'
require 'sidekiq/cron/web' require 'sidekiq/cron/web'
require 'api/api' require 'api/api'
require 'constraints/group_url_constrainer'
Rails.application.routes.draw do Rails.application.routes.draw do
concern :access_requestable do concern :access_requestable do
...@@ -78,10 +79,21 @@ Rails.application.routes.draw do ...@@ -78,10 +79,21 @@ Rails.application.routes.draw do
draw :user draw :user
draw :project draw :project
# Get all keys of user
get ':username.keys' => 'profiles/keys#get_keys', constraints: { username: /.*/ }
root to: "root#index" root to: "root#index"
get '*unmatched_route', to: 'application#not_found' # Since group show page is wildcard routing
# we want all other routing to be checked before matching this one
constraints(GroupUrlConstrainer.new) do
scope(path: '*id',
as: :group,
constraints: { id: Gitlab::Regex.namespace_route_regex, format: /(html|json|atom)/ },
controller: :groups) do
get '/', action: :show
patch '/', action: :update
put '/', action: :update
delete '/', action: :destroy
end
end
get '*unmatched_route', to: 'application#route_not_found'
end end
scope constraints: { id: /.+\.git/, format: nil } do scope(path: '*namespace_id/:project_id', constraints: { format: nil }) do
scope(constraints: { project_id: Gitlab::Regex.project_git_route_regex }, module: :projects) do
# Git HTTP clients ('git clone' etc.) # Git HTTP clients ('git clone' etc.)
get '/info/refs', to: 'git_http#info_refs' scope(controller: :git_http) do
post '/git-upload-pack', to: 'git_http#git_upload_pack' get '/info/refs', action: :info_refs
post '/git-receive-pack', to: 'git_http#git_receive_pack' post '/git-upload-pack', action: :git_upload_pack
post '/git-receive-pack', action: :git_receive_pack
end
# Git LFS API (metadata) # Git LFS API (metadata)
post '/info/lfs/objects/batch', to: 'lfs_api#batch' scope(path: 'info/lfs/objects', controller: :lfs_api) do
post '/info/lfs/objects', to: 'lfs_api#deprecated' post :batch
get '/info/lfs/objects/*oid', to: 'lfs_api#deprecated' post '/', action: :deprecated
get '/*oid', action: :deprecated
end
# GitLab LFS object storage # GitLab LFS object storage
scope constraints: { oid: /[a-f0-9]{64}/ } do scope(path: 'gitlab-lfs/objects/*oid', controller: :lfs_storage, constraints: { oid: /[a-f0-9]{64}/ }) do
get '/gitlab-lfs/objects/*oid', to: 'lfs_storage#download' get '/', action: :download
scope constraints: { size: /[0-9]+/ } do scope constraints: { size: /[0-9]+/ } do
put '/gitlab-lfs/objects/*oid/*size/authorize', to: 'lfs_storage#upload_authorize' put '/*size/authorize', action: :upload_authorize
put '/gitlab-lfs/objects/*oid/*size', to: 'lfs_storage#upload_finalize' put '/*size', action: :upload_finalize
end
end end
end end
end
# Allow /info/refs, /info/refs?service=git-upload-pack, and # Redirect /group/project/info/refs to /group/project.git/info/refs
# /info/refs?service=git-receive-pack, but nothing else. scope(constraints: { project_id: Gitlab::Regex.project_route_regex }) do
# # Allow /info/refs, /info/refs?service=git-upload-pack, and
git_http_handshake = lambda do |request| # /info/refs?service=git-receive-pack, but nothing else.
request.query_string.blank? || #
request.query_string.match(/\Aservice=git-(upload|receive)-pack\z/) git_http_handshake = lambda do |request|
end ProjectUrlConstrainer.new.matches?(request) &&
(request.query_string.blank? ||
request.query_string.match(/\Aservice=git-(upload|receive)-pack\z/))
end
ref_redirect = redirect do |params, request| ref_redirect = redirect do |params, request|
path = "#{params[:namespace_id]}/#{params[:project_id]}.git/info/refs" path = "#{params[:namespace_id]}/#{params[:project_id]}.git/info/refs"
path << "?#{request.query_string}" unless request.query_string.blank? path << "?#{request.query_string}" unless request.query_string.blank?
path path
end end
get '/info/refs', constraints: git_http_handshake, to: ref_redirect get '/info/refs', constraints: git_http_handshake, to: ref_redirect
end
end
require 'constraints/group_url_constrainer'
constraints(GroupUrlConstrainer.new) do
scope(path: ':id',
as: :group,
constraints: { id: Gitlab::Regex.namespace_route_regex },
controller: :groups) do
get '/', action: :show
patch '/', action: :update
put '/', action: :update
delete '/', action: :destroy
end
end
resources :groups, only: [:index, :new, :create] resources :groups, only: [:index, :new, :create]
scope(path: 'groups/:id', scope(path: 'groups/*id',
controller: :groups, controller: :groups,
constraints: { id: Gitlab::Regex.namespace_route_regex }) do constraints: { id: Gitlab::Regex.namespace_route_regex }) do
get :edit, as: :edit_group get :edit, as: :edit_group
...@@ -24,7 +10,7 @@ scope(path: 'groups/:id', ...@@ -24,7 +10,7 @@ scope(path: 'groups/:id',
get :activity, as: :activity_group get :activity, as: :activity_group
end end
scope(path: 'groups/:group_id', scope(path: 'groups/*group_id',
module: :groups, module: :groups,
as: :group, as: :group,
constraints: { group_id: Gitlab::Regex.namespace_route_regex }) do constraints: { group_id: Gitlab::Regex.namespace_route_regex }) do
...@@ -42,4 +28,4 @@ scope(path: 'groups/:group_id', ...@@ -42,4 +28,4 @@ scope(path: 'groups/:group_id',
end end
# Must be last route in this file # Must be last route in this file
get 'groups/:id' => 'groups#show', as: :group_canonical, constraints: { id: Gitlab::Regex.namespace_route_regex } get 'groups/*id' => 'groups#show', as: :group_canonical, constraints: { id: Gitlab::Regex.namespace_route_regex }
resources :projects, constraints: { id: /[^\/]+/ }, only: [:index, :new, :create] require 'constraints/project_url_constrainer'
resources :namespaces, path: '/', constraints: { id: /[a-zA-Z.0-9_\-]+/ }, only: [] do resources :projects, only: [:index, :new, :create]
resources(:projects, constraints: { id: /[a-zA-Z.0-9_\-]+(?<!\.atom)/ }, except:
[:new, :create, :index], path: "/") do
member do
put :transfer
delete :remove_fork
post :archive
post :unarchive
post :housekeeping
post :toggle_star
post :preview_markdown
post :export
post :remove_export
post :generate_new_export
get :download_export
get :autocomplete_sources
get :activity
get :refs
put :new_issue_address
end
scope module: :projects do draw :git_http
draw :git_http
constraints(ProjectUrlConstrainer.new) do
scope(path: '*namespace_id', as: :namespace) do
scope(path: ':project_id',
constraints: { project_id: Gitlab::Regex.project_route_regex },
module: :projects,
as: :project) do
# #
# Templates # Templates
...@@ -311,5 +298,28 @@ resources :namespaces, path: '/', constraints: { id: /[a-zA-Z.0-9_\-]+/ }, only: ...@@ -311,5 +298,28 @@ resources :namespaces, path: '/', constraints: { id: /[a-zA-Z.0-9_\-]+/ }, only:
draw :wiki draw :wiki
draw :repository draw :repository
end end
resources(:projects,
path: '/',
constraints: { id: Gitlab::Regex.project_route_regex },
only: [:edit, :show, :update, :destroy]) do
member do
put :transfer
delete :remove_fork
post :archive
post :unarchive
post :housekeeping
post :toggle_star
post :preview_markdown
post :export
post :remove_export
post :generate_new_export
get :download_export
get :autocomplete_sources
get :activity
get :refs
put :new_issue_address
end
end
end end
end end
...@@ -29,82 +29,60 @@ get '/edit/*id', to: 'blob#edit', constraints: { id: /.+/ }, as: 'edit_blob' ...@@ -29,82 +29,60 @@ get '/edit/*id', to: 'blob#edit', constraints: { id: /.+/ }, as: 'edit_blob'
put '/update/*id', to: 'blob#update', constraints: { id: /.+/ }, as: 'update_blob' put '/update/*id', to: 'blob#update', constraints: { id: /.+/ }, as: 'update_blob'
post '/preview/*id', to: 'blob#preview', constraints: { id: /.+/ }, as: 'preview_blob' post '/preview/*id', to: 'blob#preview', constraints: { id: /.+/ }, as: 'preview_blob'
scope do scope('/blob/*id', as: :blob, controller: :blob, constraints: { id: /.+/, format: false }) do
get( get :diff
'/blob/*id/diff', get '/', action: :show
to: 'blob#diff', delete '/', action: :destroy
constraints: { id: /.+/, format: false }, post '/', action: :create
as: :blob_diff put '/', action: :update
) end
get(
'/blob/*id',
to: 'blob#show',
constraints: { id: /.+/, format: false },
as: :blob
)
delete(
'/blob/*id',
to: 'blob#destroy',
constraints: { id: /.+/, format: false }
)
put(
'/blob/*id',
to: 'blob#update',
constraints: { id: /.+/, format: false }
)
post(
'/blob/*id',
to: 'blob#create',
constraints: { id: /.+/, format: false }
)
get( get(
'/raw/*id', '/raw/*id',
to: 'raw#show', to: 'raw#show',
constraints: { id: /.+/, format: /(html|js)/ }, constraints: { id: /.+/, format: /(html|js)/ },
as: :raw as: :raw
) )
get( get(
'/tree/*id', '/tree/*id',
to: 'tree#show', to: 'tree#show',
constraints: { id: /.+/, format: /(html|js)/ }, constraints: { id: /.+/, format: /(html|js)/ },
as: :tree as: :tree
) )
get( get(
'/find_file/*id', '/find_file/*id',
to: 'find_file#show', to: 'find_file#show',
constraints: { id: /.+/, format: /html/ }, constraints: { id: /.+/, format: /html/ },
as: :find_file as: :find_file
) )
get( get(
'/files/*id', '/files/*id',
to: 'find_file#list', to: 'find_file#list',
constraints: { id: /(?:[^.]|\.(?!json$))+/, format: /json/ }, constraints: { id: /(?:[^.]|\.(?!json$))+/, format: /json/ },
as: :files as: :files
) )
post( post(
'/create_dir/*id', '/create_dir/*id',
to: 'tree#create_dir', to: 'tree#create_dir',
constraints: { id: /.+/ }, constraints: { id: /.+/ },
as: 'create_dir' as: 'create_dir'
) )
get( get(
'/blame/*id', '/blame/*id',
to: 'blame#show', to: 'blame#show',
constraints: { id: /.+/, format: /(html|js)/ }, constraints: { id: /.+/, format: /(html|js)/ },
as: :blame as: :blame
) )
# File/dir history # File/dir history
get( get(
'/commits/*id', '/commits/*id',
to: 'commits#show', to: 'commits#show',
constraints: { id: /.+/, format: false }, constraints: { id: /.+/, format: false },
as: :commits as: :commits
) )
end
...@@ -12,6 +12,9 @@ devise_scope :user do ...@@ -12,6 +12,9 @@ devise_scope :user do
end end
constraints(UserUrlConstrainer.new) do constraints(UserUrlConstrainer.new) do
# Get all keys of user
get ':username.keys' => 'profiles/keys#get_keys', constraints: { username: Gitlab::Regex.namespace_route_regex }
scope(path: ':username', scope(path: ':username',
as: :user, as: :user,
constraints: { username: Gitlab::Regex.namespace_route_regex }, constraints: { username: Gitlab::Regex.namespace_route_regex },
......
WIKI_SLUG_ID = { id: /\S+/ } unless defined? WIKI_SLUG_ID WIKI_SLUG_ID = { id: /\S+/ } unless defined? WIKI_SLUG_ID
scope do scope(controller: :wikis) do
# Order matters to give priority to these matches scope(path: 'wikis', as: :wikis) do
get '/wikis/git_access', to: 'wikis#git_access' get :git_access
get '/wikis/pages', to: 'wikis#pages', as: 'wiki_pages' get :pages
post '/wikis', to: 'wikis#create' get '/', to: redirect('/%{namespace_id}/%{project_id}/wikis/home')
post '/', to: 'wikis#create'
end
get '/wikis/*id/history', to: 'wikis#history', as: 'wiki_history', constraints: WIKI_SLUG_ID scope(path: 'wikis/*id', as: :wiki, constraints: WIKI_SLUG_ID, format: false) do
get '/wikis/*id/edit', to: 'wikis#edit', as: 'wiki_edit', constraints: WIKI_SLUG_ID get :edit
get :history
get '/wikis/*id', to: 'wikis#show', as: 'wiki', constraints: WIKI_SLUG_ID post :preview_markdown
delete '/wikis/*id', to: 'wikis#destroy', constraints: WIKI_SLUG_ID get '/', action: :show
put '/wikis/*id', to: 'wikis#update', constraints: WIKI_SLUG_ID put '/', action: :update
post '/wikis/*id/preview_markdown', to: 'wikis#preview_markdown', constraints: WIKI_SLUG_ID, as: 'wiki_preview_markdown' delete '/', action: :destroy
end
end end
...@@ -2,9 +2,7 @@ class Spinach::Features::Labels < Spinach::FeatureSteps ...@@ -2,9 +2,7 @@ class Spinach::Features::Labels < Spinach::FeatureSteps
include SharedAuthentication include SharedAuthentication
include SharedIssuable include SharedIssuable
include SharedProject include SharedProject
include SharedNote
include SharedPaths include SharedPaths
include SharedMarkdown
step 'And I visit project "Shop" labels page' do step 'And I visit project "Shop" labels page' do
visit namespace_project_labels_path(project.namespace, project) visit namespace_project_labels_path(project.namespace, project)
......
module SharedDiffNote module SharedDiffNote
include Spinach::DSL include Spinach::DSL
include RepoHelpers include RepoHelpers
include WaitForAjax
after do
wait_for_ajax if javascript_test?
end
step 'I cancel the diff comment' do step 'I cancel the diff comment' do
page.within(diff_file_selector) do page.within(diff_file_selector) do
......
...@@ -2,6 +2,10 @@ module SharedNote ...@@ -2,6 +2,10 @@ module SharedNote
include Spinach::DSL include Spinach::DSL
include WaitForAjax include WaitForAjax
after do
wait_for_ajax if javascript_test?
end
step 'I delete a comment' do step 'I delete a comment' do
page.within('.main-notes-list') do page.within('.main-notes-list') do
find('.note').hover find('.note').hover
......
module ConstrainerHelper
def extract_resource_path(path)
id = path.dup
id.sub!(/\A#{relative_url_root}/, '') if relative_url_root
id.sub(/\A\/+/, '').sub(/\/+\z/, '').sub(/.atom\z/, '')
end
private
def relative_url_root
if defined?(Gitlab::Application.config.relative_url_root)
Gitlab::Application.config.relative_url_root
end
end
end
require_relative 'constrainer_helper'
class GroupUrlConstrainer class GroupUrlConstrainer
include ConstrainerHelper
def matches?(request) def matches?(request)
id = extract_resource_path(request.path) id = request.params[:id]
return false unless valid?(id)
if id =~ Gitlab::Regex.namespace_regex
Group.find_by(path: id).present? Group.find_by(path: id).present?
else end
false
private
def valid?(id)
id.split('/').all? do |namespace|
NamespaceValidator.valid?(namespace)
end end
end end
end end
class ProjectUrlConstrainer
def matches?(request)
namespace_path = request.params[:namespace_id]
project_path = request.params[:project_id] || request.params[:id]
full_path = namespace_path + '/' + project_path
unless ProjectPathValidator.valid?(project_path)
return false
end
Project.find_with_namespace(full_path).present?
end
end
require_relative 'constrainer_helper'
class UserUrlConstrainer class UserUrlConstrainer
include ConstrainerHelper
def matches?(request) def matches?(request)
id = extract_resource_path(request.path) User.find_by_username(request.params[:username]).present?
if id =~ Gitlab::Regex.namespace_regex
User.find_by('lower(username) = ?', id.downcase).present?
else
false
end
end end
end end
...@@ -8,8 +8,10 @@ module Gitlab ...@@ -8,8 +8,10 @@ module Gitlab
# allow non-regex validatiions, etc), `NAMESPACE_REGEX_STR_SIMPLE` serves as a Javascript-compatible version of # allow non-regex validatiions, etc), `NAMESPACE_REGEX_STR_SIMPLE` serves as a Javascript-compatible version of
# `NAMESPACE_REGEX_STR`, with the negative lookbehind assertion removed. This means that the client-side validation # `NAMESPACE_REGEX_STR`, with the negative lookbehind assertion removed. This means that the client-side validation
# will pass for usernames ending in `.atom` and `.git`, but will be caught by the server-side validation. # will pass for usernames ending in `.atom` and `.git`, but will be caught by the server-side validation.
NAMESPACE_REGEX_STR_SIMPLE = '[a-zA-Z0-9_\.][a-zA-Z0-9_\-\.]*[a-zA-Z0-9_\-]|[a-zA-Z0-9_]'.freeze PATH_REGEX_STR = '[a-zA-Z0-9_\.][a-zA-Z0-9_\-\.]*'.freeze
NAMESPACE_REGEX_STR_SIMPLE = PATH_REGEX_STR + '[a-zA-Z0-9_\-]|[a-zA-Z0-9_]'.freeze
NAMESPACE_REGEX_STR = '(?:' + NAMESPACE_REGEX_STR_SIMPLE + ')(?<!\.git|\.atom)'.freeze NAMESPACE_REGEX_STR = '(?:' + NAMESPACE_REGEX_STR_SIMPLE + ')(?<!\.git|\.atom)'.freeze
PROJECT_REGEX_STR = PATH_REGEX_STR + '(?<!\.git|\.atom)'.freeze
def namespace_regex def namespace_regex
@namespace_regex ||= /\A#{NAMESPACE_REGEX_STR}\z/.freeze @namespace_regex ||= /\A#{NAMESPACE_REGEX_STR}\z/.freeze
...@@ -42,7 +44,15 @@ module Gitlab ...@@ -42,7 +44,15 @@ module Gitlab
end end
def project_path_regex def project_path_regex
@project_path_regex ||= /\A[a-zA-Z0-9_.][a-zA-Z0-9_\-\.]*(?<!\.git|\.atom)\z/.freeze @project_path_regex ||= /\A#{PROJECT_REGEX_STR}\z/.freeze
end
def project_route_regex
@project_route_regex ||= /#{PROJECT_REGEX_STR}/.freeze
end
def project_git_route_regex
@project_route_git_regex ||= /#{PATH_REGEX_STR}\.git/.freeze
end end
def project_path_regex_message def project_path_regex_message
......
require 'spec_helper' require 'spec_helper'
describe ApplicationController do describe ApplicationController do
describe '#check_password_expiration' do
let(:user) { create(:user) } let(:user) { create(:user) }
describe '#check_password_expiration' do
let(:controller) { ApplicationController.new } let(:controller) { ApplicationController.new }
it 'redirects if the user is over their password expiry' do it 'redirects if the user is over their password expiry' do
...@@ -39,8 +40,6 @@ describe ApplicationController do ...@@ -39,8 +40,6 @@ describe ApplicationController do
end end
end end
let(:user) { create(:user) }
context "when the 'private_token' param is populated with the private token" do context "when the 'private_token' param is populated with the private token" do
it "logs the user in" do it "logs the user in" do
get :index, private_token: user.private_token get :index, private_token: user.private_token
...@@ -73,7 +72,6 @@ describe ApplicationController do ...@@ -73,7 +72,6 @@ describe ApplicationController do
end end
end end
let(:user) { create(:user) }
let(:personal_access_token) { create(:personal_access_token, user: user) } let(:personal_access_token) { create(:personal_access_token, user: user) }
context "when the 'personal_access_token' param is populated with the personal access token" do context "when the 'personal_access_token' param is populated with the personal access token" do
...@@ -100,4 +98,21 @@ describe ApplicationController do ...@@ -100,4 +98,21 @@ describe ApplicationController do
end end
end end
end end
describe '#route_not_found' do
let(:controller) { ApplicationController.new }
it 'renders 404 if authenticated' do
allow(controller).to receive(:current_user).and_return(user)
expect(controller).to receive(:not_found)
controller.send(:route_not_found)
end
it 'does redirect to login page if not authenticated' do
allow(controller).to receive(:current_user).and_return(nil)
expect(controller).to receive(:redirect_to)
expect(controller).to receive(:new_user_session_path)
controller.send(:route_not_found)
end
end
end end
require 'spec_helper'
describe ConstrainerHelper, lib: true do
include ConstrainerHelper
describe '#extract_resource_path' do
it { expect(extract_resource_path('/gitlab/')).to eq('gitlab') }
it { expect(extract_resource_path('///gitlab//')).to eq('gitlab') }
it { expect(extract_resource_path('/gitlab.atom')).to eq('gitlab') }
context 'relative url' do
before do
allow(Gitlab::Application.config).to receive(:relative_url_root) { '/gitlab' }
end
it { expect(extract_resource_path('/gitlab/foo')).to eq('foo') }
it { expect(extract_resource_path('/foo/bar')).to eq('foo/bar') }
end
end
end
...@@ -4,16 +4,20 @@ describe GroupUrlConstrainer, lib: true do ...@@ -4,16 +4,20 @@ describe GroupUrlConstrainer, lib: true do
let!(:group) { create(:group, path: 'gitlab') } let!(:group) { create(:group, path: 'gitlab') }
describe '#matches?' do describe '#matches?' do
context 'root group' do context 'valid request' do
it { expect(subject.matches?(request '/gitlab')).to be_truthy } let(:request) { build_request(group.path) }
it { expect(subject.matches?(request '/gitlab.atom')).to be_truthy }
it { expect(subject.matches?(request '/gitlab/edit')).to be_falsey } it { expect(subject.matches?(request)).to be_truthy }
it { expect(subject.matches?(request '/gitlab-ce')).to be_falsey } end
it { expect(subject.matches?(request '/.gitlab')).to be_falsey }
context 'invalid request' do
let(:request) { build_request('foo') }
it { expect(subject.matches?(request)).to be_falsey }
end end
end end
def request(path) def build_request(path)
double(:request, path: path) double(:request, params: { id: path })
end end
end end
require 'spec_helper'
describe ProjectUrlConstrainer, lib: true do
let!(:project) { create(:project) }
let!(:namespace) { project.namespace }
describe '#matches?' do
context 'valid request' do
let(:request) { build_request(namespace.path, project.path) }
it { expect(subject.matches?(request)).to be_truthy }
end
context 'invalid request' do
context "non-existing project" do
let(:request) { build_request('foo', 'bar') }
it { expect(subject.matches?(request)).to be_falsey }
end
context "project id ending with .git" do
let(:request) { build_request(namespace.path, project.path + '.git') }
it { expect(subject.matches?(request)).to be_falsey }
end
end
end
def build_request(namespace, project)
double(:request, params: { namespace_id: namespace, id: project })
end
end
require 'spec_helper' require 'spec_helper'
describe UserUrlConstrainer, lib: true do describe UserUrlConstrainer, lib: true do
let!(:username) { create(:user, username: 'dz') } let!(:user) { create(:user, username: 'dz') }
describe '#matches?' do describe '#matches?' do
it { expect(subject.matches?(request '/dz')).to be_truthy } context 'valid request' do
it { expect(subject.matches?(request '/dz.atom')).to be_truthy } let(:request) { build_request(user.username) }
it { expect(subject.matches?(request '/dz/projects')).to be_falsey }
it { expect(subject.matches?(request '/gitlab')).to be_falsey } it { expect(subject.matches?(request)).to be_truthy }
end
context 'invalid request' do
let(:request) { build_request('foo') }
it { expect(subject.matches?(request)).to be_falsey }
end
end end
def request(path) def build_request(username)
double(:request, path: path) double(:request, params: { username: username })
end end
end end
...@@ -752,6 +752,17 @@ describe User, models: true do ...@@ -752,6 +752,17 @@ describe User, models: true do
end end
end end
describe '.find_by_username' do
it 'returns nil if not found' do
expect(described_class.find_by_username('JohnDoe')).to be_nil
end
it 'is case-insensitive' do
user = create(:user, username: 'JohnDoe')
expect(described_class.find_by_username('JOHNDOE')).to eq user
end
end
describe '.find_by_username!' do describe '.find_by_username!' do
it 'raises RecordNotFound' do it 'raises RecordNotFound' do
expect { described_class.find_by_username!('JohnDoe') }. expect { described_class.find_by_username!('JohnDoe') }.
......
This diff is collapsed.
...@@ -9,7 +9,7 @@ require 'spec_helper' ...@@ -9,7 +9,7 @@ require 'spec_helper'
# user_calendar_activities GET /u/:username/calendar_activities(.:format) # user_calendar_activities GET /u/:username/calendar_activities(.:format)
describe UsersController, "routing" do describe UsersController, "routing" do
it "to #show" do it "to #show" do
allow(User).to receive(:find_by).and_return(true) allow_any_instance_of(UserUrlConstrainer).to receive(:matches?).and_return(true)
expect(get("/User")).to route_to('users#show', username: 'User') expect(get("/User")).to route_to('users#show', username: 'User')
end end
...@@ -195,6 +195,8 @@ describe Profiles::KeysController, "routing" do ...@@ -195,6 +195,8 @@ describe Profiles::KeysController, "routing" do
# get all the ssh-keys of a user # get all the ssh-keys of a user
it "to #get_keys" do it "to #get_keys" do
allow_any_instance_of(UserUrlConstrainer).to receive(:matches?).and_return(true)
expect(get("/foo.keys")).to route_to('profiles/keys#get_keys', username: 'foo') expect(get("/foo.keys")).to route_to('profiles/keys#get_keys', username: 'foo')
end end
end end
...@@ -263,13 +265,17 @@ end ...@@ -263,13 +265,17 @@ end
describe "Groups", "routing" do describe "Groups", "routing" do
let(:name) { 'complex.group-namegit' } let(:name) { 'complex.group-namegit' }
before { allow_any_instance_of(GroupUrlConstrainer).to receive(:matches?).and_return(true) }
it "to #show" do it "to #show" do
expect(get("/groups/#{name}")).to route_to('groups#show', id: name) expect(get("/groups/#{name}")).to route_to('groups#show', id: name)
end end
it "also display group#show on the short path" do it "also supports nested groups" do
allow(Group).to receive(:find_by).and_return(true) expect(get("/#{name}/#{name}")).to route_to('groups#show', id: "#{name}/#{name}")
end
it "also display group#show on the short path" do
expect(get("/#{name}")).to route_to('groups#show', id: name) expect(get("/#{name}")).to route_to('groups#show', id: name)
end end
...@@ -284,6 +290,10 @@ describe "Groups", "routing" do ...@@ -284,6 +290,10 @@ describe "Groups", "routing" do
it "to #members" do it "to #members" do
expect(get("/groups/#{name}/group_members")).to route_to('groups/group_members#index', group_id: name) expect(get("/groups/#{name}/group_members")).to route_to('groups/group_members#index', group_id: name)
end end
it "also display group#show with slash in the path" do
expect(get('/group/subgroup')).to route_to('groups#show', id: 'group/subgroup')
end
end end
describe HealthCheckController, 'routing' do describe HealthCheckController, 'routing' do
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment