Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Jérome Perrin
gitlab-ce
Commits
c10064aa
Commit
c10064aa
authored
Feb 21, 2017
by
Douwe Maan
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Enable Style/SpaceInsideBrackets
parent
b7d8df50
Changes
33
Show whitespace changes
Inline
Side-by-side
Showing
33 changed files
with
75 additions
and
77 deletions
+75
-77
.rubocop.yml
.rubocop.yml
+3
-0
.rubocop_todo.yml
.rubocop_todo.yml
+0
-5
app/helpers/submodule_helper.rb
app/helpers/submodule_helper.rb
+4
-4
app/models/concerns/issuable.rb
app/models/concerns/issuable.rb
+1
-1
app/models/concerns/reactive_service.rb
app/models/concerns/reactive_service.rb
+1
-1
app/models/project_services/kubernetes_service.rb
app/models/project_services/kubernetes_service.rb
+2
-2
config/initializers/1_settings.rb
config/initializers/1_settings.rb
+2
-2
config/initializers/devise.rb
config/initializers/devise.rb
+4
-4
config/initializers/trusted_proxies.rb
config/initializers/trusted_proxies.rb
+1
-1
lib/api/api_guard.rb
lib/api/api_guard.rb
+1
-1
lib/api/award_emoji.rb
lib/api/award_emoji.rb
+1
-1
lib/api/projects.rb
lib/api/projects.rb
+1
-1
lib/api/repositories.rb
lib/api/repositories.rb
+1
-1
lib/api/v3/projects.rb
lib/api/v3/projects.rb
+1
-1
spec/helpers/issues_helper_spec.rb
spec/helpers/issues_helper_spec.rb
+1
-1
spec/helpers/submodule_helper_spec.rb
spec/helpers/submodule_helper_spec.rb
+22
-22
spec/initializers/trusted_proxies_spec.rb
spec/initializers/trusted_proxies_spec.rb
+2
-2
spec/lib/bitbucket/representation/repo_spec.rb
spec/lib/bitbucket/representation/repo_spec.rb
+1
-1
spec/lib/ci/gitlab_ci_yaml_processor_spec.rb
spec/lib/ci/gitlab_ci_yaml_processor_spec.rb
+1
-1
spec/lib/gitlab/ci/config/entry/key_spec.rb
spec/lib/gitlab/ci/config/entry/key_spec.rb
+1
-1
spec/lib/gitlab/ci/config/entry/paths_spec.rb
spec/lib/gitlab/ci/config/entry/paths_spec.rb
+1
-1
spec/lib/gitlab/ci/config/entry/variables_spec.rb
spec/lib/gitlab/ci/config/entry/variables_spec.rb
+1
-1
spec/lib/gitlab/git/diff_collection_spec.rb
spec/lib/gitlab/git/diff_collection_spec.rb
+1
-1
spec/lib/gitlab/o_auth/user_spec.rb
spec/lib/gitlab/o_auth/user_spec.rb
+2
-2
spec/lib/gitlab/saml/user_spec.rb
spec/lib/gitlab/saml/user_spec.rb
+3
-3
spec/models/ci/build_spec.rb
spec/models/ci/build_spec.rb
+2
-2
spec/models/cycle_analytics/staging_spec.rb
spec/models/cycle_analytics/staging_spec.rb
+1
-1
spec/models/members/project_member_spec.rb
spec/models/members/project_member_spec.rb
+4
-4
spec/models/project_services/kubernetes_service_spec.rb
spec/models/project_services/kubernetes_service_spec.rb
+2
-2
spec/requests/api/groups_spec.rb
spec/requests/api/groups_spec.rb
+3
-3
spec/services/protected_branches/create_service_spec.rb
spec/services/protected_branches/create_service_spec.rb
+2
-2
spec/support/kubernetes_helpers.rb
spec/support/kubernetes_helpers.rb
+1
-1
spec/support/services/issuable_create_service_slash_commands_shared_examples.rb
...issuable_create_service_slash_commands_shared_examples.rb
+1
-1
No files found.
.rubocop.yml
View file @
c10064aa
...
...
@@ -413,6 +413,9 @@ Style/SpaceBeforeComment:
Style/SpaceBeforeSemicolon
:
Enabled
:
true
Style/SpaceInsideBrackets
:
Enabled
:
true
# Use spaces inside hash literal braces - or don't.
Style/SpaceInsideHashLiteralBraces
:
Enabled
:
true
...
...
.rubocop_todo.yml
View file @
c10064aa
...
...
@@ -729,11 +729,6 @@ Style/SpaceInLambdaLiteral:
Style/SpaceInsideBlockBraces
:
Enabled
:
false
# Offense count: 120
# Cop supports --auto-correct.
Style/SpaceInsideBrackets
:
Enabled
:
false
# Offense count: 90
# Cop supports --auto-correct.
Style/SpaceInsideParens
:
...
...
app/helpers/submodule_helper.rb
View file @
c10064aa
...
...
@@ -37,8 +37,8 @@ module SubmoduleHelper
end
def
self_url?
(
url
,
namespace
,
project
)
return
true
if
url
==
[
Gitlab
.
config
.
gitlab
.
url
,
'/'
,
namespace
,
'/'
,
project
,
'.git'
].
join
(
''
)
return
true
if
url
==
[
Gitlab
.
config
.
gitlab
.
url
,
'/'
,
namespace
,
'/'
,
project
,
'.git'
].
join
(
''
)
url
==
gitlab_shell
.
url_to_repo
([
namespace
,
'/'
,
project
].
join
(
''
))
end
...
...
@@ -48,8 +48,8 @@ module SubmoduleHelper
end
def
standard_links
(
host
,
namespace
,
project
,
commit
)
base
=
[
'https://'
,
host
,
'/'
,
namespace
,
'/'
,
project
].
join
(
''
)
[
base
,
[
base
,
'/tree/'
,
commit
].
join
(
''
)]
base
=
[
'https://'
,
host
,
'/'
,
namespace
,
'/'
,
project
].
join
(
''
)
[
base
,
[
base
,
'/tree/'
,
commit
].
join
(
''
)]
end
def
relative_self_links
(
url
,
commit
)
...
...
app/models/concerns/issuable.rb
View file @
c10064aa
...
...
@@ -68,7 +68,7 @@ module Issuable
scope
:without_label
,
->
{
joins
(
"LEFT OUTER JOIN label_links ON label_links.target_type = '
#{
name
}
' AND label_links.target_id =
#{
table_name
}
.id"
).
where
(
label_links:
{
id:
nil
})
}
scope
:join_project
,
->
{
joins
(
:project
)
}
scope
:inc_notes_with_associations
,
->
{
includes
(
notes:
[
:project
,
:author
,
:award_emoji
])
}
scope
:inc_notes_with_associations
,
->
{
includes
(
notes:
[
:project
,
:author
,
:award_emoji
])
}
scope
:references_project
,
->
{
references
(
:project
)
}
scope
:non_archived
,
->
{
join_project
.
where
(
projects:
{
archived:
false
})
}
...
...
app/models/concerns/reactive_service.rb
View file @
c10064aa
...
...
@@ -5,6 +5,6 @@ module ReactiveService
include
ReactiveCaching
# Default cache key: class name + project_id
self
.
reactive_cache_key
=
->
(
service
)
{
[
service
.
class
.
model_name
.
singular
,
service
.
project_id
]
}
self
.
reactive_cache_key
=
->
(
service
)
{
[
service
.
class
.
model_name
.
singular
,
service
.
project_id
]
}
end
end
app/models/project_services/kubernetes_service.rb
View file @
c10064aa
...
...
@@ -3,7 +3,7 @@ class KubernetesService < DeploymentService
include
Gitlab
::
Kubernetes
include
ReactiveCaching
self
.
reactive_cache_key
=
->
(
service
)
{
[
service
.
class
.
model_name
.
singular
,
service
.
project_id
]
}
self
.
reactive_cache_key
=
->
(
service
)
{
[
service
.
class
.
model_name
.
singular
,
service
.
project_id
]
}
# Namespace defaults to the project path, but can be overridden in case that
# is an invalid or inappropriate name
...
...
@@ -167,7 +167,7 @@ class KubernetesService < DeploymentService
url
=
URI
.
parse
(
api_url
)
prefix
=
url
.
path
.
sub
(
%r{/+
\z
}
,
''
)
url
.
path
=
[
prefix
,
*
parts
].
join
(
"/"
)
url
.
path
=
[
prefix
,
*
parts
].
join
(
"/"
)
url
.
to_s
end
...
...
config/initializers/1_settings.rb
View file @
c10064aa
...
...
@@ -19,7 +19,7 @@ class Settings < Settingslogic
else
custom_port
=
":
#{
gitlab
.
port
}
"
end
[
gitlab
.
protocol
,
[
gitlab
.
protocol
,
"://"
,
gitlab
.
host
,
custom_port
,
...
...
@@ -80,7 +80,7 @@ class Settings < Settingslogic
def
base_url
(
config
)
custom_port
=
on_standard_port?
(
config
)
?
nil
:
":
#{
config
.
port
}
"
[
config
.
protocol
,
[
config
.
protocol
,
"://"
,
config
.
host
,
custom_port
...
...
config/initializers/devise.rb
View file @
c10064aa
...
...
@@ -24,7 +24,7 @@ Devise.setup do |config|
# session. If you need permissions, you should implement that in a before filter.
# You can also supply a hash where the value is a boolean determining whether
# or not authentication should be aborted when the value is not present.
config
.
authentication_keys
=
[
:login
]
config
.
authentication_keys
=
[
:login
]
# Configure parameters from the request object used for authentication. Each entry
# given should be a request method and it will automatically be passed to the
...
...
@@ -36,12 +36,12 @@ Devise.setup do |config|
# Configure which authentication keys should be case-insensitive.
# These keys will be downcased upon creating or modifying a user and when used
# to authenticate or find a user. Default is :email.
config
.
case_insensitive_keys
=
[
:email
]
config
.
case_insensitive_keys
=
[
:email
]
# Configure which authentication keys should have whitespace stripped.
# These keys will have whitespace before and after removed upon creating or
# modifying a user and when used to authenticate or find a user. Default is :email.
config
.
strip_whitespace_keys
=
[
:email
]
config
.
strip_whitespace_keys
=
[
:email
]
# Tell if authentication through request.params is enabled. True by default.
# config.params_authenticatable = true
...
...
@@ -124,7 +124,7 @@ Devise.setup do |config|
config
.
lock_strategy
=
:failed_attempts
# Defines which key will be used when locking and unlocking an account
config
.
unlock_keys
=
[
:email
]
config
.
unlock_keys
=
[
:email
]
# Defines which strategy will be used to unlock an account.
# :email = Sends an unlock link to the user email
...
...
config/initializers/trusted_proxies.rb
View file @
c10064aa
...
...
@@ -21,4 +21,4 @@ gitlab_trusted_proxies = Array(Gitlab.config.gitlab.trusted_proxies).map do |pro
end
.
compact
Rails
.
application
.
config
.
action_dispatch
.
trusted_proxies
=
(
[
'127.0.0.1'
,
'::1'
]
+
gitlab_trusted_proxies
)
[
'127.0.0.1'
,
'::1'
]
+
gitlab_trusted_proxies
)
lib/api/api_guard.rb
View file @
c10064aa
...
...
@@ -114,7 +114,7 @@ module API
private
def
install_error_responders
(
base
)
error_classes
=
[
MissingTokenError
,
TokenNotFoundError
,
error_classes
=
[
MissingTokenError
,
TokenNotFoundError
,
ExpiredError
,
RevokedError
,
InsufficientScopeError
]
base
.
send
:rescue_from
,
*
error_classes
,
oauth2_bearer_token_error_handler
...
...
lib/api/award_emoji.rb
View file @
c10064aa
...
...
@@ -15,7 +15,7 @@ module API
requires
:"
#{
awardable_id_string
}
"
,
type:
Integer
,
desc:
"The ID of an Issue, Merge Request or Snippet"
end
[
":id/
#{
awardable_string
}
/:
#{
awardable_id_string
}
/award_emoji"
,
[
":id/
#{
awardable_string
}
/:
#{
awardable_id_string
}
/award_emoji"
,
":id/
#{
awardable_string
}
/:
#{
awardable_id_string
}
/notes/:note_id/award_emoji"
].
each
do
|
endpoint
|
...
...
lib/api/projects.rb
View file @
c10064aa
...
...
@@ -19,7 +19,7 @@ module API
optional
:visibility_level
,
type:
Integer
,
values:
[
Gitlab
::
VisibilityLevel
::
PRIVATE
,
Gitlab
::
VisibilityLevel
::
INTERNAL
,
Gitlab
::
VisibilityLevel
::
PUBLIC
],
desc:
'Create a public project. The same as visibility_level = 20.'
Gitlab
::
VisibilityLevel
::
PUBLIC
],
desc:
'Create a public project. The same as visibility_level = 20.'
optional
:public_builds
,
type:
Boolean
,
desc:
'Perform public builds'
optional
:request_access_enabled
,
type:
Boolean
,
desc:
'Allow users to request member access'
optional
:only_allow_merge_if_build_succeeds
,
type:
Boolean
,
desc:
'Only allow to merge if builds succeed'
...
...
lib/api/repositories.rb
View file @
c10064aa
...
...
@@ -45,7 +45,7 @@ module API
requires
:sha
,
type:
String
,
desc:
'The commit, branch name, or tag name'
requires
:filepath
,
type:
String
,
desc:
'The path to the file to display'
end
get
[
":id/repository/blobs/:sha"
,
":id/repository/commits/:sha/blob"
]
do
get
[
":id/repository/blobs/:sha"
,
":id/repository/commits/:sha/blob"
]
do
repo
=
user_project
.
repository
commit
=
repo
.
commit
(
params
[
:sha
])
...
...
lib/api/v3/projects.rb
View file @
c10064aa
...
...
@@ -20,7 +20,7 @@ module API
optional
:visibility_level
,
type:
Integer
,
values:
[
Gitlab
::
VisibilityLevel
::
PRIVATE
,
Gitlab
::
VisibilityLevel
::
INTERNAL
,
Gitlab
::
VisibilityLevel
::
PUBLIC
],
desc:
'Create a public project. The same as visibility_level = 20.'
Gitlab
::
VisibilityLevel
::
PUBLIC
],
desc:
'Create a public project. The same as visibility_level = 20.'
optional
:public_builds
,
type:
Boolean
,
desc:
'Perform public builds'
optional
:request_access_enabled
,
type:
Boolean
,
desc:
'Allow users to request member access'
optional
:only_allow_merge_if_build_succeeds
,
type:
Boolean
,
desc:
'Only allow to merge if builds succeed'
...
...
spec/helpers/issues_helper_spec.rb
View file @
c10064aa
...
...
@@ -55,7 +55,7 @@ describe IssuesHelper do
describe
"merge_requests_sentence"
do
subject
{
merge_requests_sentence
(
merge_requests
)}
let
(
:merge_requests
)
do
[
build
(
:merge_request
,
iid:
1
),
build
(
:merge_request
,
iid:
2
),
[
build
(
:merge_request
,
iid:
1
),
build
(
:merge_request
,
iid:
2
),
build
(
:merge_request
,
iid:
3
)]
end
...
...
spec/helpers/submodule_helper_spec.rb
View file @
c10064aa
...
...
@@ -20,97 +20,97 @@ describe SubmoduleHelper do
it
'detects ssh on standard port'
do
allow
(
Gitlab
.
config
.
gitlab_shell
).
to
receive
(
:ssh_port
).
and_return
(
22
)
# set this just to be sure
allow
(
Gitlab
.
config
.
gitlab_shell
).
to
receive
(
:ssh_path_prefix
).
and_return
(
Settings
.
send
(
:build_gitlab_shell_ssh_path_prefix
))
stub_url
([
config
.
user
,
'@'
,
config
.
host
,
':gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
stub_url
([
config
.
user
,
'@'
,
config
.
host
,
':gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
end
it
'detects ssh on non-standard port'
do
allow
(
Gitlab
.
config
.
gitlab_shell
).
to
receive
(
:ssh_port
).
and_return
(
2222
)
allow
(
Gitlab
.
config
.
gitlab_shell
).
to
receive
(
:ssh_path_prefix
).
and_return
(
Settings
.
send
(
:build_gitlab_shell_ssh_path_prefix
))
stub_url
([
'ssh://'
,
config
.
user
,
'@'
,
config
.
host
,
':2222/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
stub_url
([
'ssh://'
,
config
.
user
,
'@'
,
config
.
host
,
':2222/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
end
it
'detects http on standard port'
do
allow
(
Gitlab
.
config
.
gitlab
).
to
receive
(
:port
).
and_return
(
80
)
allow
(
Gitlab
.
config
.
gitlab
).
to
receive
(
:url
).
and_return
(
Settings
.
send
(
:build_gitlab_url
))
stub_url
([
'http://'
,
config
.
host
,
'/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
stub_url
([
'http://'
,
config
.
host
,
'/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
end
it
'detects http on non-standard port'
do
allow
(
Gitlab
.
config
.
gitlab
).
to
receive
(
:port
).
and_return
(
3000
)
allow
(
Gitlab
.
config
.
gitlab
).
to
receive
(
:url
).
and_return
(
Settings
.
send
(
:build_gitlab_url
))
stub_url
([
'http://'
,
config
.
host
,
':3000/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
stub_url
([
'http://'
,
config
.
host
,
':3000/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
end
it
'works with relative_url_root'
do
allow
(
Gitlab
.
config
.
gitlab
).
to
receive
(
:port
).
and_return
(
80
)
# set this just to be sure
allow
(
Gitlab
.
config
.
gitlab
).
to
receive
(
:relative_url_root
).
and_return
(
'/gitlab/root'
)
allow
(
Gitlab
.
config
.
gitlab
).
to
receive
(
:url
).
and_return
(
Settings
.
send
(
:build_gitlab_url
))
stub_url
([
'http://'
,
config
.
host
,
'/gitlab/root/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
stub_url
([
'http://'
,
config
.
host
,
'/gitlab/root/gitlab-org/gitlab-ce.git'
].
join
(
''
))
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
namespace_project_path
(
'gitlab-org'
,
'gitlab-ce'
),
namespace_project_tree_path
(
'gitlab-org'
,
'gitlab-ce'
,
'hash'
)
])
end
end
context
'submodule on github.com'
do
it
'detects ssh'
do
stub_url
(
'git@github.com:gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://github.com/gitlab-org/gitlab-ce'
,
'https://github.com/gitlab-org/gitlab-ce/tree/hash'
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://github.com/gitlab-org/gitlab-ce'
,
'https://github.com/gitlab-org/gitlab-ce/tree/hash'
])
end
it
'detects http'
do
stub_url
(
'http://github.com/gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://github.com/gitlab-org/gitlab-ce'
,
'https://github.com/gitlab-org/gitlab-ce/tree/hash'
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://github.com/gitlab-org/gitlab-ce'
,
'https://github.com/gitlab-org/gitlab-ce/tree/hash'
])
end
it
'detects https'
do
stub_url
(
'https://github.com/gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://github.com/gitlab-org/gitlab-ce'
,
'https://github.com/gitlab-org/gitlab-ce/tree/hash'
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://github.com/gitlab-org/gitlab-ce'
,
'https://github.com/gitlab-org/gitlab-ce/tree/hash'
])
end
it
'returns original with non-standard url'
do
stub_url
(
'http://github.com/gitlab-org/gitlab-ce'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
stub_url
(
'http://github.com/another/gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
end
end
context
'submodule on gitlab.com'
do
it
'detects ssh'
do
stub_url
(
'git@gitlab.com:gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://gitlab.com/gitlab-org/gitlab-ce'
,
'https://gitlab.com/gitlab-org/gitlab-ce/tree/hash'
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://gitlab.com/gitlab-org/gitlab-ce'
,
'https://gitlab.com/gitlab-org/gitlab-ce/tree/hash'
])
end
it
'detects http'
do
stub_url
(
'http://gitlab.com/gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://gitlab.com/gitlab-org/gitlab-ce'
,
'https://gitlab.com/gitlab-org/gitlab-ce/tree/hash'
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://gitlab.com/gitlab-org/gitlab-ce'
,
'https://gitlab.com/gitlab-org/gitlab-ce/tree/hash'
])
end
it
'detects https'
do
stub_url
(
'https://gitlab.com/gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://gitlab.com/gitlab-org/gitlab-ce'
,
'https://gitlab.com/gitlab-org/gitlab-ce/tree/hash'
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
'https://gitlab.com/gitlab-org/gitlab-ce'
,
'https://gitlab.com/gitlab-org/gitlab-ce/tree/hash'
])
end
it
'returns original with non-standard url'
do
stub_url
(
'http://gitlab.com/gitlab-org/gitlab-ce'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
stub_url
(
'http://gitlab.com/another/gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
end
end
context
'submodule on unsupported'
do
it
'returns original'
do
stub_url
(
'http://mygitserver.com/gitlab-org/gitlab-ce'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
stub_url
(
'http://mygitserver.com/gitlab-org/gitlab-ce.git'
)
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
expect
(
submodule_links
(
submodule_item
)).
to
eq
([
repo
.
submodule_url_for
,
nil
])
end
end
...
...
spec/initializers/trusted_proxies_spec.rb
View file @
c10064aa
...
...
@@ -27,7 +27,7 @@ describe 'trusted_proxies', lib: true do
context
'with private IP ranges added'
do
before
do
set_trusted_proxies
([
"10.0.0.0/8"
,
"172.16.0.0/12"
,
"192.168.0.0/16"
])
set_trusted_proxies
([
"10.0.0.0/8"
,
"172.16.0.0/12"
,
"192.168.0.0/16"
])
end
it
'filters out private and local IPs'
do
...
...
@@ -39,7 +39,7 @@ describe 'trusted_proxies', lib: true do
context
'with proxy IP added'
do
before
do
set_trusted_proxies
([
"60.98.25.47"
])
set_trusted_proxies
([
"60.98.25.47"
])
end
it
'filters out proxy IP'
do
...
...
spec/lib/bitbucket/representation/repo_spec.rb
View file @
c10064aa
...
...
@@ -42,7 +42,7 @@ describe Bitbucket::Representation::Repo do
describe
'#clone_url'
do
it
'builds url'
do
data
=
{
'links'
=>
{
'clone'
=>
[
{
'name'
=>
'https'
,
'href'
=>
'https://bibucket.org/test/test.git'
}]
}
}
data
=
{
'links'
=>
{
'clone'
=>
[{
'name'
=>
'https'
,
'href'
=>
'https://bibucket.org/test/test.git'
}]
}
}
expect
(
described_class
.
new
(
data
).
clone_url
(
'abc'
)).
to
eq
(
'https://x-token-auth:abc@bibucket.org/test/test.git'
)
end
end
...
...
spec/lib/ci/gitlab_ci_yaml_processor_spec.rb
View file @
c10064aa
...
...
@@ -580,7 +580,7 @@ module Ci
context
'when syntax is incorrect'
do
context
'when variables defined but invalid'
do
let
(
:variables
)
do
[
'VAR1'
,
'value1'
,
'VAR2'
,
'value2'
]
[
'VAR1'
,
'value1'
,
'VAR2'
,
'value2'
]
end
it
'raises error'
do
...
...
spec/lib/gitlab/ci/config/entry/key_spec.rb
View file @
c10064aa
...
...
@@ -21,7 +21,7 @@ describe Gitlab::Ci::Config::Entry::Key do
end
context
'when entry value is not correct'
do
let
(
:config
)
{
[
'incorrect'
]
}
let
(
:config
)
{
[
'incorrect'
]
}
describe
'#errors'
do
it
'saves errors'
do
...
...
spec/lib/gitlab/ci/config/entry/paths_spec.rb
View file @
c10064aa
...
...
@@ -21,7 +21,7 @@ describe Gitlab::Ci::Config::Entry::Paths do
end
context
'when entry value is not valid'
do
let
(
:config
)
{
[
1
]
}
let
(
:config
)
{
[
1
]
}
describe
'#errors'
do
it
'saves errors'
do
...
...
spec/lib/gitlab/ci/config/entry/variables_spec.rb
View file @
c10064aa
...
...
@@ -29,7 +29,7 @@ describe Gitlab::Ci::Config::Entry::Variables do
end
context
'when entry value is not correct'
do
let
(
:config
)
{
[
:VAR
,
'test'
]
}
let
(
:config
)
{
[
:VAR
,
'test'
]
}
describe
'#errors'
do
it
'saves errors'
do
...
...
spec/lib/gitlab/git/diff_collection_spec.rb
View file @
c10064aa
...
...
@@ -365,7 +365,7 @@ describe Gitlab::Git::DiffCollection, seed_helper: true do
end
context
'when go over safe limits on files'
do
let
(
:iterator
)
{
[
fake_diff
(
1
,
1
)
]
*
4
}
let
(
:iterator
)
{
[
fake_diff
(
1
,
1
)
]
*
4
}
before
(
:each
)
do
stub_const
(
'Gitlab::Git::DiffCollection::DEFAULT_LIMITS'
,
{
max_files:
2
,
max_lines:
max_lines
})
...
...
spec/lib/gitlab/o_auth/user_spec.rb
View file @
c10064aa
...
...
@@ -151,7 +151,7 @@ describe Gitlab::OAuth::User, lib: true do
expect
(
gl_user
.
identities
.
length
).
to
eql
2
identities_as_hash
=
gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
(
[
{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
[{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
{
provider:
'twitter'
,
extern_uid:
uid
}
])
end
...
...
@@ -170,7 +170,7 @@ describe Gitlab::OAuth::User, lib: true do
expect
(
gl_user
.
identities
.
length
).
to
eql
2
identities_as_hash
=
gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
(
[
{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
[{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
{
provider:
'twitter'
,
extern_uid:
uid
}
])
end
...
...
spec/lib/gitlab/saml/user_spec.rb
View file @
c10064aa
...
...
@@ -157,7 +157,7 @@ describe Gitlab::Saml::User, lib: true do
expect
(
gl_user
.
email
).
to
eql
'john@mail.com'
expect
(
gl_user
.
identities
.
length
).
to
eql
2
identities_as_hash
=
gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
([
{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
expect
(
identities_as_hash
).
to
match_array
([{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
{
provider:
'saml'
,
extern_uid:
uid
}
])
end
...
...
@@ -180,7 +180,7 @@ describe Gitlab::Saml::User, lib: true do
expect
(
gl_user
.
email
).
to
eql
'john@mail.com'
expect
(
gl_user
.
identities
.
length
).
to
eql
2
identities_as_hash
=
gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
([
{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
expect
(
identities_as_hash
).
to
match_array
([{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
{
provider:
'saml'
,
extern_uid:
uid
}
])
end
...
...
@@ -206,7 +206,7 @@ describe Gitlab::Saml::User, lib: true do
expect
(
local_gl_user
).
to
be_valid
expect
(
local_gl_user
.
identities
.
length
).
to
eql
2
identities_as_hash
=
local_gl_user
.
identities
.
map
{
|
id
|
{
provider:
id
.
provider
,
extern_uid:
id
.
extern_uid
}
}
expect
(
identities_as_hash
).
to
match_array
([
{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
expect
(
identities_as_hash
).
to
match_array
([{
provider:
'ldapmain'
,
extern_uid:
'uid=user1,ou=People,dc=example'
},
{
provider:
'saml'
,
extern_uid:
'uid=user1,ou=People,dc=example'
}
])
end
...
...
spec/models/ci/build_spec.rb
View file @
c10064aa
...
...
@@ -1262,8 +1262,8 @@ describe Ci::Build, :models do
context
'when build has user'
do
let
(
:user_variables
)
do
[
{
key:
'GITLAB_USER_ID'
,
value:
user
.
id
.
to_s
,
public:
true
},
{
key:
'GITLAB_USER_EMAIL'
,
value:
user
.
email
,
public:
true
}
]
[{
key:
'GITLAB_USER_ID'
,
value:
user
.
id
.
to_s
,
public:
true
},
{
key:
'GITLAB_USER_EMAIL'
,
value:
user
.
email
,
public:
true
}]
end
before
do
...
...
spec/models/cycle_analytics/staging_spec.rb
View file @
c10064aa
...
...
@@ -18,7 +18,7 @@ describe 'CycleAnalytics#staging', feature: true do
start_time_conditions:
[[
"merge request that closes issue is merged"
,
->
(
context
,
data
)
do
context
.
merge_merge_requests_closing_issue
(
data
[
:issue
])
end
]],
end
]],
end_time_conditions:
[[
"merge request that closes issue is deployed to production"
,
->
(
context
,
data
)
do
context
.
deploy_master
...
...
spec/models/members/project_member_spec.rb
View file @
c10064aa
...
...
@@ -89,8 +89,8 @@ describe ProjectMember, models: true do
@user_1
=
create
:user
@user_2
=
create
:user
@project_1
.
team
<<
[
@user_1
,
:developer
]
@project_2
.
team
<<
[
@user_2
,
:reporter
]
@project_1
.
team
<<
[
@user_1
,
:developer
]
@project_2
.
team
<<
[
@user_2
,
:reporter
]
@status
=
@project_2
.
team
.
import
(
@project_1
)
end
...
...
@@ -137,8 +137,8 @@ describe ProjectMember, models: true do
@user_1
=
create
:user
@user_2
=
create
:user
@project_1
.
team
<<
[
@user_1
,
:developer
]
@project_2
.
team
<<
[
@user_2
,
:reporter
]
@project_1
.
team
<<
[
@user_1
,
:developer
]
@project_2
.
team
<<
[
@user_2
,
:reporter
]
ProjectMember
.
truncate_teams
([
@project_1
.
id
,
@project_2
.
id
])
end
...
...
spec/models/project_services/kubernetes_service_spec.rb
View file @
c10064aa
...
...
@@ -171,7 +171,7 @@ describe KubernetesService, models: true, caching: true do
context
'with invalid pods'
do
it
'returns no terminals'
do
stub_reactive_cache
(
service
,
pods:
[
{
"bad"
=>
"pod"
}
])
stub_reactive_cache
(
service
,
pods:
[
{
"bad"
=>
"pod"
}
])
is_expected
.
to
be_empty
end
...
...
@@ -184,7 +184,7 @@ describe KubernetesService, models: true, caching: true do
before
do
stub_reactive_cache
(
service
,
pods:
[
pod
,
pod
,
kube_pod
(
app:
"should-be-filtered-out"
)
]
pods:
[
pod
,
pod
,
kube_pod
(
app:
"should-be-filtered-out"
)
]
)
end
...
...
spec/requests/api/groups_spec.rb
View file @
c10064aa
...
...
@@ -303,7 +303,7 @@ describe API::Groups, api: true do
expect
(
response
).
to
have_http_status
(
200
)
expect
(
response
).
to
include_pagination_headers
expect
(
json_response
.
length
).
to
eq
(
2
)
project_names
=
json_response
.
map
{
|
proj
|
proj
[
'name'
]
}
project_names
=
json_response
.
map
{
|
proj
|
proj
[
'name'
]
}
expect
(
project_names
).
to
match_array
([
project1
.
name
,
project3
.
name
])
expect
(
json_response
.
first
[
'visibility_level'
]).
to
be_present
end
...
...
@@ -314,7 +314,7 @@ describe API::Groups, api: true do
expect
(
response
).
to
have_http_status
(
200
)
expect
(
response
).
to
include_pagination_headers
expect
(
json_response
.
length
).
to
eq
(
2
)
project_names
=
json_response
.
map
{
|
proj
|
proj
[
'name'
]
}
project_names
=
json_response
.
map
{
|
proj
|
proj
[
'name'
]
}
expect
(
project_names
).
to
match_array
([
project1
.
name
,
project3
.
name
])
expect
(
json_response
.
first
[
'visibility_level'
]).
not_to
be_present
end
...
...
@@ -398,7 +398,7 @@ describe API::Groups, api: true do
expect
(
response
).
to
have_http_status
(
200
)
expect
(
response
).
to
include_pagination_headers
project_names
=
json_response
.
map
{
|
proj
|
proj
[
'name'
]
}
project_names
=
json_response
.
map
{
|
proj
|
proj
[
'name'
]
}
expect
(
project_names
).
to
match_array
([
project1
.
name
,
project3
.
name
])
end
...
...
spec/services/protected_branches/create_service_spec.rb
View file @
c10064aa
...
...
@@ -6,8 +6,8 @@ describe ProtectedBranches::CreateService, services: true do
let
(
:params
)
do
{
name:
'master'
,
merge_access_levels_attributes:
[
{
access_level:
Gitlab
::
Access
::
MASTER
}
],
push_access_levels_attributes:
[
{
access_level:
Gitlab
::
Access
::
MASTER
}
]
merge_access_levels_attributes:
[
{
access_level:
Gitlab
::
Access
::
MASTER
}
],
push_access_levels_attributes:
[
{
access_level:
Gitlab
::
Access
::
MASTER
}
]
}
end
...
...
spec/support/kubernetes_helpers.rb
View file @
c10064aa
...
...
@@ -11,7 +11,7 @@ module KubernetesHelpers
def
kube_pods_body
(
*
pods
)
{
"kind"
=>
"PodList"
,
"items"
=>
[
kube_pod
],
"items"
=>
[
kube_pod
],
}
end
...
...
spec/support/services/issuable_create_service_slash_commands_shared_examples.rb
View file @
c10064aa
...
...
@@ -11,7 +11,7 @@ shared_examples 'new issuable record that supports slash commands' do
let
(
:params
)
{
base_params
.
merge
(
defined?
(
default_params
)
?
default_params
:
{}).
merge
(
example_params
)
}
let
(
:issuable
)
{
described_class
.
new
(
project
,
user
,
params
).
execute
}
before
{
project
.
team
<<
[
assignee
,
:master
]
}
before
{
project
.
team
<<
[
assignee
,
:master
]
}
context
'with labels in command only'
do
let
(
:example_params
)
do
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment