summaryrefslogtreecommitdiff
path: root/spec/lib/gitlab/import_export
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2020-08-10 13:31:48 +0000
committerGitLab Bot <gitlab-bot@gitlab.com>2020-08-10 13:31:48 +0000
commit0a3f1f55493660acfabd198d2e1649a881d8852b (patch)
tree3edcd287de2cd0f7e72917865a5e5c4111b74ecb /spec/lib/gitlab/import_export
parentea4766228b5536c83f1917d6058be913472ffa2d (diff)
downloadgitlab-ce-0a3f1f55493660acfabd198d2e1649a881d8852b.tar.gz
Add latest changes from gitlab-org/gitlab@13-2-stable-ee
Diffstat (limited to 'spec/lib/gitlab/import_export')
-rw-r--r--spec/lib/gitlab/import_export/decompressed_archive_size_validator_spec.rb58
-rw-r--r--spec/lib/gitlab/import_export/file_importer_spec.rb39
2 files changed, 97 insertions, 0 deletions
diff --git a/spec/lib/gitlab/import_export/decompressed_archive_size_validator_spec.rb b/spec/lib/gitlab/import_export/decompressed_archive_size_validator_spec.rb
new file mode 100644
index 00000000000..efb271086a0
--- /dev/null
+++ b/spec/lib/gitlab/import_export/decompressed_archive_size_validator_spec.rb
@@ -0,0 +1,58 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe Gitlab::ImportExport::DecompressedArchiveSizeValidator do
+ let_it_be(:filepath) { File.join(Dir.tmpdir, 'decompressed_archive_size_validator_spec.gz') }
+
+ before(:all) do
+ create_compressed_file
+ end
+
+ after(:all) do
+ FileUtils.rm(filepath)
+ end
+
+ subject { described_class.new(archive_path: filepath, max_bytes: max_bytes) }
+
+ describe '#valid?' do
+ let(:max_bytes) { 1 }
+
+ context 'when file does not exceed allowed decompressed size' do
+ let(:max_bytes) { 20 }
+
+ it 'returns true' do
+ expect(subject.valid?).to eq(true)
+ end
+ end
+
+ context 'when file exceeds allowed decompressed size' do
+ it 'returns false' do
+ expect(subject.valid?).to eq(false)
+ end
+ end
+
+ context 'when something goes wrong during decompression' do
+ before do
+ allow(subject.archive_file).to receive(:eof?).and_raise(StandardError)
+ end
+
+ it 'logs and tracks raised exception' do
+ expect(Gitlab::ErrorTracking).to receive(:track_exception).with(instance_of(StandardError))
+ expect(Gitlab::Import::Logger).to receive(:info).with(hash_including(message: 'Decompressed archive size validation failed.'))
+
+ subject.valid?
+ end
+
+ it 'returns false' do
+ expect(subject.valid?).to eq(false)
+ end
+ end
+ end
+
+ def create_compressed_file
+ Zlib::GzipWriter.open(filepath) do |gz|
+ gz.write('Hello World!')
+ end
+ end
+end
diff --git a/spec/lib/gitlab/import_export/file_importer_spec.rb b/spec/lib/gitlab/import_export/file_importer_spec.rb
index 47485cc7edb..dc668e972cf 100644
--- a/spec/lib/gitlab/import_export/file_importer_spec.rb
+++ b/spec/lib/gitlab/import_export/file_importer_spec.rb
@@ -98,6 +98,45 @@ RSpec.describe Gitlab::ImportExport::FileImporter do
end
end
+ context 'when file exceeds acceptable decompressed size' do
+ let(:project) { create(:project) }
+ let(:shared) { Gitlab::ImportExport::Shared.new(project) }
+ let(:filepath) { File.join(Dir.tmpdir, 'file_importer_spec.gz') }
+
+ subject { described_class.new(importable: project, archive_file: filepath, shared: shared) }
+
+ before do
+ Zlib::GzipWriter.open(filepath) do |gz|
+ gz.write('Hello World!')
+ end
+ end
+
+ context 'when validate_import_decompressed_archive_size feature flag is enabled' do
+ before do
+ stub_feature_flags(validate_import_decompressed_archive_size: true)
+
+ allow(Gitlab::ImportExport::DecompressedArchiveSizeValidator).to receive(:max_bytes).and_return(1)
+ end
+
+ it 'returns false' do
+ expect(subject.import).to eq(false)
+ expect(shared.errors.join).to eq('Decompressed archive size validation failed.')
+ end
+ end
+
+ context 'when validate_import_decompressed_archive_size feature flag is disabled' do
+ before do
+ stub_feature_flags(validate_import_decompressed_archive_size: false)
+ end
+
+ it 'skips validation' do
+ expect(subject).to receive(:validate_decompressed_archive_size).never
+
+ subject.import
+ end
+ end
+ end
+
def setup_files
FileUtils.mkdir_p("#{shared.export_path}/subfolder/")
FileUtils.touch(valid_file)