summaryrefslogtreecommitdiff
path: root/spec/lib/bulk_imports/projects/pipelines/repository_bundle_pipeline_spec.rb
diff options
context:
space:
mode:
Diffstat (limited to 'spec/lib/bulk_imports/projects/pipelines/repository_bundle_pipeline_spec.rb')
-rw-r--r--spec/lib/bulk_imports/projects/pipelines/repository_bundle_pipeline_spec.rb169
1 files changed, 169 insertions, 0 deletions
diff --git a/spec/lib/bulk_imports/projects/pipelines/repository_bundle_pipeline_spec.rb b/spec/lib/bulk_imports/projects/pipelines/repository_bundle_pipeline_spec.rb
new file mode 100644
index 00000000000..712c37ee578
--- /dev/null
+++ b/spec/lib/bulk_imports/projects/pipelines/repository_bundle_pipeline_spec.rb
@@ -0,0 +1,169 @@
+# frozen_string_literal: true
+
+require 'spec_helper'
+
+RSpec.describe BulkImports::Projects::Pipelines::RepositoryBundlePipeline do
+ let_it_be(:source) { create(:project, :repository) }
+
+ let(:portable) { create(:project) }
+ let(:tmpdir) { Dir.mktmpdir }
+ let(:bundle_path) { File.join(tmpdir, 'repository.bundle') }
+ let(:entity) { create(:bulk_import_entity, :project_entity, project: portable, source_full_path: 'test') }
+ let(:tracker) { create(:bulk_import_tracker, entity: entity) }
+ let(:context) { BulkImports::Pipeline::Context.new(tracker) }
+
+ subject(:pipeline) { described_class.new(context) }
+
+ before do
+ source.repository.bundle_to_disk(bundle_path)
+
+ allow(Dir).to receive(:mktmpdir).with('bulk_imports').and_return(tmpdir)
+ end
+
+ after do
+ FileUtils.remove_entry(tmpdir) if Dir.exist?(tmpdir)
+ end
+
+ describe '#run' do
+ before do
+ allow(pipeline).to receive(:extract).and_return(BulkImports::Pipeline::ExtractedData.new(data: [bundle_path]))
+ end
+
+ it 'imports repository into destination project and removes tmpdir' do
+ expect(portable.repository).to receive(:create_from_bundle).with(bundle_path).and_call_original
+
+ pipeline.run
+
+ expect(portable.repository.exists?).to eq(true)
+ expect(Dir.exist?(tmpdir)).to eq(false)
+ end
+
+ context 'when something goes wrong during import' do
+ it 'marks entity as failed' do
+ allow(pipeline).to receive(:load).and_raise(StandardError)
+
+ pipeline.run
+
+ expect(entity.failed?).to eq(true)
+ end
+ end
+ end
+
+ describe '#extract' do
+ it 'downloads & extracts repository bundle filepath' do
+ download_service = instance_double("BulkImports::FileDownloadService")
+ decompression_service = instance_double("BulkImports::FileDecompressionService")
+ extraction_service = instance_double("BulkImports::ArchiveExtractionService")
+
+ expect(BulkImports::FileDownloadService)
+ .to receive(:new)
+ .with(
+ configuration: context.configuration,
+ relative_url: "/#{entity.pluralized_name}/test/export_relations/download?relation=repository",
+ tmpdir: tmpdir,
+ filename: 'repository.tar.gz')
+ .and_return(download_service)
+ expect(BulkImports::FileDecompressionService)
+ .to receive(:new)
+ .with(tmpdir: tmpdir, filename: 'repository.tar.gz')
+ .and_return(decompression_service)
+ expect(BulkImports::ArchiveExtractionService)
+ .to receive(:new)
+ .with(tmpdir: tmpdir, filename: 'repository.tar')
+ .and_return(extraction_service)
+
+ expect(download_service).to receive(:execute)
+ expect(decompression_service).to receive(:execute)
+ expect(extraction_service).to receive(:execute)
+
+ extracted_data = pipeline.extract(context)
+
+ expect(extracted_data.data).to contain_exactly(bundle_path)
+ end
+ end
+
+ describe '#load' do
+ before do
+ allow(pipeline)
+ .to receive(:extract)
+ .and_return(BulkImports::Pipeline::ExtractedData.new(data: [bundle_path]))
+ end
+
+ it 'creates repository from bundle' do
+ expect(portable.repository).to receive(:create_from_bundle).with(bundle_path).and_call_original
+
+ pipeline.load(context, bundle_path)
+
+ expect(portable.repository.exists?).to eq(true)
+ end
+
+ context 'when file does not exist' do
+ it 'returns' do
+ expect(portable.repository).not_to receive(:create_from_bundle)
+
+ pipeline.load(context, File.join(tmpdir, 'bogus'))
+
+ expect(portable.repository.exists?).to eq(false)
+ end
+ end
+
+ context 'when path is directory' do
+ it 'returns' do
+ expect(portable.repository).not_to receive(:create_from_bundle)
+
+ pipeline.load(context, tmpdir)
+
+ expect(portable.repository.exists?).to eq(false)
+ end
+ end
+
+ context 'when path is symlink' do
+ it 'returns' do
+ symlink = File.join(tmpdir, 'symlink')
+
+ FileUtils.ln_s(File.join(tmpdir, bundle_path), symlink)
+
+ expect(portable.repository).not_to receive(:create_from_bundle)
+
+ pipeline.load(context, symlink)
+
+ expect(portable.repository.exists?).to eq(false)
+ end
+ end
+
+ context 'when path is not under tmpdir' do
+ it 'returns' do
+ expect { pipeline.load(context, '/home/test.txt') }
+ .to raise_error(StandardError, 'path /home/test.txt is not allowed')
+ end
+ end
+
+ context 'when path is being traversed' do
+ it 'raises an error' do
+ expect { pipeline.load(context, File.join(tmpdir, '..')) }
+ .to raise_error(Gitlab::Utils::PathTraversalAttackError, 'Invalid path')
+ end
+ end
+ end
+
+ describe '#after_run' do
+ it 'removes tmpdir' do
+ allow(FileUtils).to receive(:remove_entry).and_call_original
+ expect(FileUtils).to receive(:remove_entry).with(tmpdir).and_call_original
+
+ pipeline.after_run(nil)
+
+ expect(Dir.exist?(tmpdir)).to eq(false)
+ end
+
+ context 'when tmpdir does not exist' do
+ it 'does not attempt to remove tmpdir' do
+ FileUtils.remove_entry(tmpdir)
+
+ expect(FileUtils).not_to receive(:remove_entry).with(tmpdir)
+
+ pipeline.after_run(nil)
+ end
+ end
+ end
+end