PageRenderTime 52ms CodeModel.GetById 25ms RepoModel.GetById 1ms app.codeStats 0ms

/spec/services/merge_requests/create_service_spec.rb

https://gitlab.com/savitojs/gitlab-ce
Ruby | 385 lines | 312 code | 73 blank | 0 comment | 0 complexity | 6d6473f19ae44a8d19d1d655cd40c00a MD5 | raw file
  1. require 'spec_helper'
  2. describe MergeRequests::CreateService do
  3. include ProjectForksHelper
  4. let(:project) { create(:project, :repository) }
  5. let(:user) { create(:user) }
  6. let(:assignee) { create(:user) }
  7. describe '#execute' do
  8. context 'valid params' do
  9. let(:opts) do
  10. {
  11. title: 'Awesome merge_request',
  12. description: 'please fix',
  13. source_branch: 'feature',
  14. target_branch: 'master',
  15. force_remove_source_branch: '1'
  16. }
  17. end
  18. let(:service) { described_class.new(project, user, opts) }
  19. let(:merge_request) { service.execute }
  20. before do
  21. project.add_master(user)
  22. project.add_developer(assignee)
  23. allow(service).to receive(:execute_hooks)
  24. end
  25. it 'creates an MR' do
  26. expect(merge_request).to be_valid
  27. expect(merge_request.work_in_progress?).to be(false)
  28. expect(merge_request.title).to eq('Awesome merge_request')
  29. expect(merge_request.assignee).to be_nil
  30. expect(merge_request.merge_params['force_remove_source_branch']).to eq('1')
  31. end
  32. it 'executes hooks with default action' do
  33. expect(service).to have_received(:execute_hooks).with(merge_request)
  34. end
  35. it 'refreshes the number of open merge requests', :use_clean_rails_memory_store_caching do
  36. expect { service.execute }
  37. .to change { project.open_merge_requests_count }.from(0).to(1)
  38. end
  39. it 'does not creates todos' do
  40. attributes = {
  41. project: project,
  42. target_id: merge_request.id,
  43. target_type: merge_request.class.name
  44. }
  45. expect(Todo.where(attributes).count).to be_zero
  46. end
  47. it 'creates exactly 1 create MR event' do
  48. attributes = {
  49. action: Event::CREATED,
  50. target_id: merge_request.id,
  51. target_type: merge_request.class.name
  52. }
  53. expect(Event.where(attributes).count).to eq(1)
  54. end
  55. describe 'when marked with /wip' do
  56. context 'in title and in description' do
  57. let(:opts) do
  58. {
  59. title: 'WIP: Awesome merge_request',
  60. description: "well this is not done yet\n/wip",
  61. source_branch: 'feature',
  62. target_branch: 'master',
  63. assignee: assignee
  64. }
  65. end
  66. it 'sets MR to WIP' do
  67. expect(merge_request.work_in_progress?).to be(true)
  68. end
  69. end
  70. context 'in description only' do
  71. let(:opts) do
  72. {
  73. title: 'Awesome merge_request',
  74. description: "well this is not done yet\n/wip",
  75. source_branch: 'feature',
  76. target_branch: 'master',
  77. assignee: assignee
  78. }
  79. end
  80. it 'sets MR to WIP' do
  81. expect(merge_request.work_in_progress?).to be(true)
  82. end
  83. end
  84. end
  85. context 'when merge request is assigned to someone' do
  86. let(:opts) do
  87. {
  88. title: 'Awesome merge_request',
  89. description: 'please fix',
  90. source_branch: 'feature',
  91. target_branch: 'master',
  92. assignee: assignee
  93. }
  94. end
  95. it { expect(merge_request.assignee).to eq assignee }
  96. it 'creates a todo for new assignee' do
  97. attributes = {
  98. project: project,
  99. author: user,
  100. user: assignee,
  101. target_id: merge_request.id,
  102. target_type: merge_request.class.name,
  103. action: Todo::ASSIGNED,
  104. state: :pending
  105. }
  106. expect(Todo.where(attributes).count).to eq 1
  107. end
  108. end
  109. context 'when head pipelines already exist for merge request source branch' do
  110. let(:sha) { project.commit(opts[:source_branch]).id }
  111. let!(:pipeline_1) { create(:ci_pipeline, project: project, ref: opts[:source_branch], project_id: project.id, sha: sha) }
  112. let!(:pipeline_2) { create(:ci_pipeline, project: project, ref: opts[:source_branch], project_id: project.id, sha: sha) }
  113. let!(:pipeline_3) { create(:ci_pipeline, project: project, ref: "other_branch", project_id: project.id) }
  114. before do
  115. project.merge_requests
  116. .where(source_branch: opts[:source_branch], target_branch: opts[:target_branch])
  117. .destroy_all
  118. end
  119. it 'sets head pipeline' do
  120. merge_request = service.execute
  121. expect(merge_request.head_pipeline).to eq(pipeline_2)
  122. expect(merge_request).to be_persisted
  123. end
  124. context 'when merge request head commit sha does not match pipeline sha' do
  125. it 'sets the head pipeline correctly' do
  126. pipeline_2.update(sha: 1234)
  127. merge_request = service.execute
  128. expect(merge_request.head_pipeline).to eq(pipeline_1)
  129. expect(merge_request).to be_persisted
  130. end
  131. end
  132. end
  133. end
  134. it_behaves_like 'new issuable record that supports quick actions' do
  135. let(:default_params) do
  136. {
  137. source_branch: 'feature',
  138. target_branch: 'master'
  139. }
  140. end
  141. end
  142. context 'Quick actions' do
  143. context 'with assignee and milestone in params and command' do
  144. let(:merge_request) { described_class.new(project, user, opts).execute }
  145. let(:milestone) { create(:milestone, project: project) }
  146. let(:opts) do
  147. {
  148. assignee_id: create(:user).id,
  149. milestone_id: 1,
  150. title: 'Title',
  151. description: %(/assign @#{assignee.username}\n/milestone %"#{milestone.name}"),
  152. source_branch: 'feature',
  153. target_branch: 'master'
  154. }
  155. end
  156. before do
  157. project.add_master(user)
  158. project.add_master(assignee)
  159. end
  160. it 'assigns and sets milestone to issuable from command' do
  161. expect(merge_request).to be_persisted
  162. expect(merge_request.assignee).to eq(assignee)
  163. expect(merge_request.milestone).to eq(milestone)
  164. end
  165. end
  166. end
  167. context 'merge request create service' do
  168. context 'asssignee_id' do
  169. let(:assignee) { create(:user) }
  170. before do
  171. project.add_master(user)
  172. end
  173. it 'removes assignee_id when user id is invalid' do
  174. opts = { title: 'Title', description: 'Description', assignee_id: -1 }
  175. merge_request = described_class.new(project, user, opts).execute
  176. expect(merge_request.assignee_id).to be_nil
  177. end
  178. it 'removes assignee_id when user id is 0' do
  179. opts = { title: 'Title', description: 'Description', assignee_id: 0 }
  180. merge_request = described_class.new(project, user, opts).execute
  181. expect(merge_request.assignee_id).to be_nil
  182. end
  183. it 'saves assignee when user id is valid' do
  184. project.add_master(assignee)
  185. opts = { title: 'Title', description: 'Description', assignee_id: assignee.id }
  186. merge_request = described_class.new(project, user, opts).execute
  187. expect(merge_request.assignee).to eq(assignee)
  188. end
  189. context 'when assignee is set' do
  190. let(:opts) do
  191. {
  192. title: 'Title',
  193. description: 'Description',
  194. assignee_id: assignee.id,
  195. source_branch: 'feature',
  196. target_branch: 'master'
  197. }
  198. end
  199. it 'invalidates open merge request counter for assignees when merge request is assigned' do
  200. project.add_master(assignee)
  201. described_class.new(project, user, opts).execute
  202. expect(assignee.assigned_open_merge_requests_count).to eq 1
  203. end
  204. end
  205. context "when issuable feature is private" do
  206. before do
  207. project.project_feature.update(issues_access_level: ProjectFeature::PRIVATE,
  208. merge_requests_access_level: ProjectFeature::PRIVATE)
  209. end
  210. levels = [Gitlab::VisibilityLevel::INTERNAL, Gitlab::VisibilityLevel::PUBLIC]
  211. levels.each do |level|
  212. it "removes not authorized assignee when project is #{Gitlab::VisibilityLevel.level_name(level)}" do
  213. project.update(visibility_level: level)
  214. opts = { title: 'Title', description: 'Description', assignee_id: assignee.id }
  215. merge_request = described_class.new(project, user, opts).execute
  216. expect(merge_request.assignee_id).to be_nil
  217. end
  218. end
  219. end
  220. end
  221. end
  222. context 'while saving references to issues that the created merge request closes' do
  223. let(:first_issue) { create(:issue, project: project) }
  224. let(:second_issue) { create(:issue, project: project) }
  225. let(:opts) do
  226. {
  227. title: 'Awesome merge_request',
  228. source_branch: 'feature',
  229. target_branch: 'master',
  230. force_remove_source_branch: '1'
  231. }
  232. end
  233. before do
  234. project.add_master(user)
  235. project.add_developer(assignee)
  236. end
  237. it 'creates a `MergeRequestsClosingIssues` record for each issue' do
  238. issue_closing_opts = opts.merge(description: "Closes #{first_issue.to_reference} and #{second_issue.to_reference}")
  239. service = described_class.new(project, user, issue_closing_opts)
  240. allow(service).to receive(:execute_hooks)
  241. merge_request = service.execute
  242. issue_ids = MergeRequestsClosingIssues.where(merge_request: merge_request).pluck(:issue_id)
  243. expect(issue_ids).to match_array([first_issue.id, second_issue.id])
  244. end
  245. end
  246. context 'when source and target projects are different' do
  247. let(:target_project) { fork_project(project, nil, repository: true) }
  248. let(:opts) do
  249. {
  250. title: 'Awesome merge_request',
  251. source_branch: 'feature',
  252. target_branch: 'master',
  253. target_project_id: target_project.id
  254. }
  255. end
  256. context 'when user can not access source project' do
  257. before do
  258. target_project.add_developer(assignee)
  259. target_project.add_master(user)
  260. end
  261. it 'raises an error' do
  262. expect { described_class.new(project, user, opts).execute }
  263. .to raise_error Gitlab::Access::AccessDeniedError
  264. end
  265. end
  266. context 'when user can not access target project' do
  267. before do
  268. target_project.add_developer(assignee)
  269. target_project.add_master(user)
  270. end
  271. it 'raises an error' do
  272. expect { described_class.new(project, user, opts).execute }
  273. .to raise_error Gitlab::Access::AccessDeniedError
  274. end
  275. end
  276. context 'when the user has access to both projects' do
  277. before do
  278. target_project.add_developer(user)
  279. project.add_developer(user)
  280. end
  281. it 'creates the merge request' do
  282. merge_request = described_class.new(project, user, opts).execute
  283. expect(merge_request).to be_persisted
  284. end
  285. it 'does not create the merge request when the target project is archived' do
  286. target_project.update!(archived: true)
  287. expect { described_class.new(project, user, opts).execute }
  288. .to raise_error Gitlab::Access::AccessDeniedError
  289. end
  290. end
  291. end
  292. context 'when user sets source project id' do
  293. let(:another_project) { create(:project) }
  294. let(:opts) do
  295. {
  296. title: 'Awesome merge_request',
  297. source_branch: 'feature',
  298. target_branch: 'master',
  299. source_project_id: another_project.id
  300. }
  301. end
  302. before do
  303. project.add_developer(assignee)
  304. project.add_master(user)
  305. end
  306. it 'ignores source_project_id' do
  307. merge_request = described_class.new(project, user, opts).execute
  308. expect(merge_request.source_project_id).to eq(project.id)
  309. end
  310. end
  311. end
  312. end