# frozen_string_literal: true require 'spec_helper' RSpec.describe Projects::IssuesController do include ProjectForksHelper include_context 'includes Spam constants' let_it_be(:project, reload: true) { create(:project) } let_it_be(:user, reload: true) { create(:user) } let(:issue) { create(:issue, project: project) } let(:spam_action_response_fields) { { 'stub_spam_action_response_fields' => true } } describe "GET #index" do context 'external issue tracker' do before do sign_in(user) project.add_developer(user) create(:jira_integration, project: project) end context 'when GitLab issues disabled' do it 'returns 404 status' do project.issues_enabled = false project.save! get :index, params: { namespace_id: project.namespace, project_id: project } expect(response).to have_gitlab_http_status(:not_found) end end context 'when GitLab issues enabled' do it 'renders the "index" template' do get :index, params: { namespace_id: project.namespace, project_id: project } expect(response).to have_gitlab_http_status(:ok) expect(response).to render_template(:index) end end context 'when project has moved' do let_it_be(:new_project) { create(:project) } let_it_be(:issue) { create(:issue, project: new_project) } before do project.route.destroy! new_project.redirect_routes.create!(path: project.full_path) new_project.add_developer(user) end it 'redirects to the new issue tracker from the old one' do get :index, params: { namespace_id: project.namespace, project_id: project } expect(response).to redirect_to(project_issues_path(new_project)) expect(response).to have_gitlab_http_status(:moved_permanently) end it 'redirects from an old issue correctly' do get :show, params: { namespace_id: project.namespace, project_id: project, id: issue } expect(response).to redirect_to(project_issue_path(new_project, issue)) expect(response).to have_gitlab_http_status(:moved_permanently) end end end context 'internal issue tracker' do before do sign_in(user) project.add_developer(user) end it_behaves_like 'set sort order from user preference' do let(:sorting_param) { 'updated_asc' } end it "returns index" do get :index, params: { namespace_id: project.namespace, project_id: project } expect(response).to have_gitlab_http_status(:ok) end it "returns 301 if request path doesn't match project path" do get :index, params: { namespace_id: project.namespace, project_id: project.path.upcase } expect(response).to redirect_to(project_issues_path(project)) end it "returns 404 when issues are disabled" do project.issues_enabled = false project.save! get :index, params: { namespace_id: project.namespace, project_id: project } expect(response).to have_gitlab_http_status(:not_found) end end describe 'pagination' do let!(:issue_list) { create_list(:issue, 2, project: project) } let(:collection) { project.issues } let(:last_page) { collection.page.total_pages } let(:params) do { namespace_id: project.namespace.to_param, project_id: project, state: 'opened' } end before do sign_in(user) project.add_developer(user) allow(Kaminari.config).to receive(:default_per_page).and_return(1) end it 'redirects to last page when out of bounds on non-html requests' do get :index, params: params.merge(page: last_page + 1), format: 'atom' expect(response).to have_gitlab_http_status(:redirect) expect(response).to redirect_to(action: 'index', format: 'atom', page: last_page, state: 'opened') end end context 'external authorization' do before do sign_in user project.add_developer(user) end it_behaves_like 'unauthorized when external service denies access' do subject { get :index, params: { namespace_id: project.namespace, project_id: project } } end end end describe "GET #show" do before do sign_in(user) project.add_developer(user) end context 'issue email participants' do context 'when issue is confidential' do let(:issue) { create(:issue, project: project, confidential: true) } let!(:participants) { create_list(:issue_email_participant, 2, issue: issue) } it "returns issue email participants" do get :show, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }, format: :json expect(response).to have_gitlab_http_status(:ok) expect(json_response).to include( 'issue_email_participants' => contain_exactly( { "email" => participants[0].email }, { "email" => participants[1].email } ), 'type' => 'ISSUE' ) end end context 'when issue is not confidential' do it "returns empty email participants" do get :show, params: { namespace_id: project.namespace, project_id: project, id: issue.iid }, format: :json expect(response).to have_gitlab_http_status(:ok) expect(json_response).to include('issue_email_participants' => []) end end end context 'when issue is not a task and work items feature flag is enabled' do it 'does not redirect to work items route' do get :show, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } expect(response).to render_template(:show) end end context 'when issue is of type task' do let(:query) { {} } let_it_be(:task) { create(:issue, :task, project: project) } shared_examples 'redirects to show work item page' do context 'when use_iid_in_work_items_path feature flag is disabled' do before do stub_feature_flags(use_iid_in_work_items_path: false) end it 'redirects to work item page' do make_request expect(response).to redirect_to(project_work_items_path(project, task.id, query)) end end it 'redirects to work item page using iid' do make_request expect(response).to redirect_to(project_work_items_path(project, task.iid, query.merge(iid_path: true))) end end context 'show action' do let(:query) { { query: 'any' } } it_behaves_like 'redirects to show work item page' do subject(:make_request) do get :show, params: { namespace_id: project.namespace, project_id: project, id: task.iid, **query } end end end context 'edit action' do let(:query) { { query: 'any' } } it_behaves_like 'redirects to show work item page' do subject(:make_request) do get :edit, params: { namespace_id: project.namespace, project_id: project, id: task.iid, **query } end end end context 'update action' do it_behaves_like 'redirects to show work item page' do subject(:make_request) do put :update, params: { namespace_id: project.namespace, project_id: project, id: task.iid, issue: { title: 'New title' } } end end end end end describe 'GET #new' do it 'redirects to signin if not logged in' do get :new, params: { namespace_id: project.namespace, project_id: project } expect(flash[:alert]).to eq I18n.t('devise.failure.unauthenticated') expect(response).to redirect_to(new_user_session_path) end context 'internal issue tracker' do before do sign_in(user) project.add_developer(user) end it 'builds a new issue', :aggregate_failures do get :new, params: { namespace_id: project.namespace, project_id: project } expect(assigns(:issue)).to be_a_new(Issue) expect(assigns(:issue).issue_type).to eq('issue') end where(:conf_value, :conf_result) do [ [true, true], ['true', true], ['TRUE', true], [false, false], ['false', false], ['FALSE', false] ] end with_them do it 'sets the confidential flag to the expected value' do get :new, params: { namespace_id: project.namespace, project_id: project, issue: { confidential: conf_value } } assigned_issue = assigns(:issue) expect(assigned_issue).to be_a_new(Issue) expect(assigned_issue.confidential).to eq conf_result end end context 'setting issue type' do let(:issue_type) { 'issue' } before do get :new, params: { namespace_id: project.namespace, project_id: project, issue: { issue_type: issue_type } } end subject { assigns(:issue).issue_type } it { is_expected.to eq('issue') } context 'incident issue' do let(:issue_type) { 'incident' } it { is_expected.to eq(issue_type) } end end it 'fills in an issue for a merge request' do project_with_repository = create(:project, :repository) project_with_repository.add_developer(user) mr = create(:merge_request_with_diff_notes, source_project: project_with_repository) get :new, params: { namespace_id: project_with_repository.namespace, project_id: project_with_repository, merge_request_to_resolve_discussions_of: mr.iid } expect(assigns(:issue).title).not_to be_empty expect(assigns(:issue).description).not_to be_empty end it 'fills in an issue for a discussion' do note = create(:note_on_merge_request, project: project) expect(Gitlab::UsageDataCounters::MergeRequestActivityUniqueCounter).to receive(:track_resolve_thread_in_issue_action).with(user: user) get :new, params: { namespace_id: project.namespace.path, project_id: project, merge_request_to_resolve_discussions_of: note.noteable.iid, discussion_to_resolve: note.discussion_id } expect(assigns(:issue).title).not_to be_empty expect(assigns(:issue).description).not_to be_empty end end context 'external issue tracker' do let!(:service) do create(:custom_issue_tracker_integration, project: project, new_issue_url: 'http://test.com') end before do sign_in(user) project.add_developer(user) external = double allow(project).to receive(:external_issue_tracker).and_return(external) end context 'when GitLab issues disabled' do it 'returns 404 status' do project.issues_enabled = false project.save! get :new, params: { namespace_id: project.namespace, project_id: project } expect(response).to have_gitlab_http_status(:not_found) end end context 'when GitLab issues enabled' do it 'renders the "new" template' do get :new, params: { namespace_id: project.namespace, project_id: project } expect(response).to have_gitlab_http_status(:ok) expect(response).to render_template(:new) end end end end describe '#related_branches' do subject { get :related_branches, params: params, format: :json } before do sign_in(user) project.add_developer(developer) end let_it_be(:issue) { create(:issue, project: project) } let(:developer) { user } let(:params) do { namespace_id: project.namespace, project_id: project, id: issue.iid } end context 'the current user cannot read code' do it 'prevents access' do allow(controller).to receive(:can?).with(any_args).and_return(true) allow(controller).to receive(:can?).with(user, :read_code, project).and_return(false) subject expect(response).to have_gitlab_http_status(:not_found) end end context 'there are no related branches' do it 'assigns empty arrays', :aggregate_failures do subject expect(response).to have_gitlab_http_status(:ok) expect(assigns(:related_branches)).to be_empty expect(response).to render_template('projects/issues/_related_branches') expect(json_response).to eq('html' => '') end end context 'there are related branches' do let(:missing_branch) { "#{issue.to_branch_name}-missing" } let(:unreadable_branch) { "#{issue.to_branch_name}-unreadable" } let(:pipeline) { build(:ci_pipeline, :success, project: project) } let(:master_branch) { 'master' } let(:related_branches) do [ branch_info(issue.to_branch_name, pipeline.detailed_status(user)), branch_info(missing_branch, nil), branch_info(unreadable_branch, nil) ] end def branch_info(name, status) { name: name, link: controller.project_compare_path(project, from: master_branch, to: name), pipeline_status: status } end before do allow(controller).to receive(:find_routable!).and_return(project) allow(project).to receive(:default_branch).and_return(master_branch) allow_next_instance_of(Issues::RelatedBranchesService) do |service| allow(service).to receive(:execute).and_return(related_branches) end end it 'finds and assigns the appropriate branch information', :aggregate_failures do subject expect(response).to have_gitlab_http_status(:ok) expect(assigns(:related_branches)).to contain_exactly( branch_info(issue.to_branch_name, an_instance_of(Gitlab::Ci::Status::Success)), branch_info(missing_branch, be_nil), branch_info(unreadable_branch, be_nil) ) expect(response).to render_template('projects/issues/_related_branches') expect(json_response).to match('html' => String) end end end # This spec runs as a request-style spec in order to invoke the # Rails router. A controller-style spec matches the wrong route, and # session['user_return_to'] becomes incorrect. describe 'Redirect after sign in', type: :request do before_all do project.add_developer(user) end before do login_as(user) end context 'with a JSON request' do it 'does not store the visited URL' do get project_issue_path(project, issue, format: :json) expect(session['user_return_to']).to be_blank end end context 'with an HTML request' do it 'stores the visited URL' do get project_issue_path(project, issue) expect(session['user_return_to']).to eq(project_issue_path(project, issue)) end end end describe 'POST #move' do before do sign_in(user) project.add_developer(user) end context 'when moving issue to another private project' do let_it_be(:another_project) { create(:project, :private) } context 'when user has access to move issue' do before do another_project.add_reporter(user) end it 'moves issue to another project' do move_issue expect(response).to have_gitlab_http_status :ok expect(another_project.issues).not_to be_empty end end context 'when user does not have access to move issue' do it 'responds with 404' do move_issue expect(response).to have_gitlab_http_status :not_found end end def move_issue post :move, params: { namespace_id: project.namespace.to_param, project_id: project, id: issue.iid, move_to_project_id: another_project.id }, format: :json end end end describe 'PUT #reorder' do let_it_be(:group) { create(:group, projects: [project]) } let_it_be(:issue1) { create(:issue, project: project, relative_position: 10) } let_it_be(:issue2) { create(:issue, project: project, relative_position: 20) } let_it_be(:issue3) { create(:issue, project: project, relative_position: 30) } before do sign_in(user) end context 'when user has access' do before do project.add_developer(user) end context 'with valid params' do it 'reorders issues and returns a successful 200 response' do reorder_issue(issue1, move_after_id: issue2.id, move_before_id: issue3.id) [issue1, issue2, issue3].map(&:reload) expect(response).to have_gitlab_http_status(:ok) expect(issue1.relative_position) .to be_between(issue2.relative_position, issue3.relative_position) end end context 'with invalid params' do it 'returns a unprocessable entity 422 response for invalid move ids' do reorder_issue(issue1, move_after_id: 99, move_before_id: non_existing_record_id) expect(response).to have_gitlab_http_status(:unprocessable_entity) end it 'returns a not found 404 response for invalid issue id' do reorder_issue(object_double(issue1, iid: non_existing_record_iid), move_after_id: issue2.id, move_before_id: issue3.id) expect(response).to have_gitlab_http_status(:not_found) end it 'returns a unprocessable entity 422 response for issues not in group' do other_group_project = create(:project, group: create(:group)) other_group_issue = create(:issue, project: other_group_project) reorder_issue(issue1, move_after_id: issue2.id, move_before_id: other_group_issue.id) expect(response).to have_gitlab_http_status(:unprocessable_entity) end end end context 'with unauthorized user' do before do project.add_guest(user) end it 'responds with 404' do reorder_issue(issue1, move_after_id: issue2.id, move_before_id: issue3.id) expect(response).to have_gitlab_http_status(:not_found) end end def reorder_issue(issue, move_after_id: nil, move_before_id: nil) put :reorder, params: { namespace_id: project.namespace.to_param, project_id: project, id: issue.iid, move_after_id: move_after_id, move_before_id: move_before_id }, format: :json end end describe 'PUT #update' do let(:issue_params) { { title: 'New title' } } subject do put :update, params: { namespace_id: project.namespace, project_id: project, id: issue.to_param, issue: issue_params }, format: :json end before do sign_in(user) end context 'when user has access to update issue' do before do project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC) project.add_developer(user) end it 'updates the issue' do subject expect(response).to have_gitlab_http_status(:ok) expect(issue.reload.title).to eq('New title') end context 'with issue_type param' do let(:issue_params) { { issue_type: 'incident' } } it 'permits the parameter' do subject expect(response).to have_gitlab_http_status(:ok) expect(issue.reload.issue_type).to eql('incident') end end context 'when an issue is identified as spam' do before do stub_application_setting(recaptcha_enabled: true) allow_next_instance_of(Spam::AkismetService) do |akismet_service| allow(akismet_service).to receive(:spam?).and_return(true) end end context 'when allow_possible_spam feature flag is false' do before do stub_feature_flags(allow_possible_spam: false) expect(controller).to(receive(:spam_action_response_fields).with(issue)) do spam_action_response_fields end end it 'renders json with spam_action_response_fields' do subject expect(json_response).to eq(spam_action_response_fields) end end context 'when allow_possible_spam feature flag is true' do it 'updates the issue' do subject expect(response).to have_gitlab_http_status(:ok) expect(issue.reload.title).to eq('New title') end end end end context 'when user does not have access to update issue' do before do project.add_guest(user) end it 'responds with 404' do subject expect(response).to have_gitlab_http_status(:not_found) end end end describe 'GET #realtime_changes' do def go(id:) get :realtime_changes, params: { namespace_id: project.namespace.to_param, project_id: project, id: id } end context 'when an issue was edited' do before do project.add_developer(user) issue.update!(last_edited_by: user, last_edited_at: issue.created_at + 1.minute) sign_in(user) end it 'returns last edited time' do go(id: issue.iid) expect(json_response).to include('updated_at') expect(json_response['updated_at']).to eq(issue.last_edited_at.to_time.iso8601) end end context 'when an issue was edited by a deleted user' do let(:deleted_user) { create(:user) } before do project.add_developer(user) issue.update!(last_edited_by: deleted_user, last_edited_at: Time.current) deleted_user.destroy! sign_in(user) end it 'returns 200' do go(id: issue.iid) expect(response).to have_gitlab_http_status(:ok) end end context 'when getting the changes' do before do project.add_developer(user) sign_in(user) end it 'returns the necessary data' do go(id: issue.iid) expect(json_response).to include('title_text', 'description', 'description_text') expect(json_response).to include('task_status', 'lock_version') end end end describe 'Confidential Issues' do let_it_be(:project) { create(:project_empty_repo, :public) } let_it_be(:assignee) { create(:assignee) } let_it_be(:author) { create(:user) } let_it_be(:non_member) { create(:user) } let_it_be(:member) { create(:user) } let_it_be(:admin) { create(:admin) } let_it_be(:issue) { create(:issue, project: project) } let_it_be(:unescaped_parameter_value) { create(:issue, :confidential, project: project, author: author) } let_it_be(:request_forgery_timing_attack) { create(:issue, :confidential, project: project, assignees: [assignee]) } shared_examples_for 'restricted action' do |http_status| it 'returns 404 for guests' do sign_out(:user) go(id: unescaped_parameter_value.to_param) expect(response).to have_gitlab_http_status :not_found end it 'returns 404 for non project members' do sign_in(non_member) go(id: unescaped_parameter_value.to_param) expect(response).to have_gitlab_http_status :not_found end it 'returns 404 for project members with guest role' do sign_in(member) project.add_guest(member) go(id: unescaped_parameter_value.to_param) expect(response).to have_gitlab_http_status :not_found end it "returns #{http_status[:success]} for author" do sign_in(author) go(id: unescaped_parameter_value.to_param) expect(response).to have_gitlab_http_status http_status[:success] end it "returns #{http_status[:success]} for assignee" do sign_in(assignee) go(id: request_forgery_timing_attack.to_param) expect(response).to have_gitlab_http_status http_status[:success] end it "returns #{http_status[:success]} for project members" do sign_in(member) project.add_developer(member) go(id: unescaped_parameter_value.to_param) expect(response).to have_gitlab_http_status http_status[:success] end context 'when admin mode is enabled', :enable_admin_mode do it "returns #{http_status[:success]} for admin" do sign_in(admin) go(id: unescaped_parameter_value.to_param) expect(response).to have_gitlab_http_status http_status[:success] end end context 'when admin mode is disabled' do xit 'returns 404 for admin' do sign_in(admin) go(id: unescaped_parameter_value.to_param) expect(response).to have_gitlab_http_status :not_found end end end describe 'PUT #update' do def update_issue(issue_params: {}, additional_params: {}, id: nil) id ||= issue.iid params = { namespace_id: project.namespace.to_param, project_id: project, id: id, issue: { title: 'New title' }.merge(issue_params), format: :json }.merge(additional_params) put :update, params: params end def go(id:) update_issue(id: id) end before do sign_in(user) project.add_developer(user) end it_behaves_like 'restricted action', success: 200 it_behaves_like 'update invalid issuable', Issue context 'changing the assignee' do it 'limits the attributes exposed on the assignee' do assignee = create(:user) project.add_developer(assignee) update_issue(issue_params: { assignee_ids: [assignee.id] }) expect(json_response['assignees'].first.keys) .to include(*%w(id name username avatar_url state web_url)) end end context 'Recaptcha is enabled' do before do project.update!(visibility_level: Gitlab::VisibilityLevel::PUBLIC) stub_application_setting(recaptcha_enabled: true) end context 'when SpamVerdictService allows the issue' do before do expect_next_instance_of(Spam::SpamVerdictService) do |verdict_service| expect(verdict_service).to receive(:execute).and_return(ALLOW) end end it 'normally updates the issue' do expect { update_issue(issue_params: { title: 'Foo' }) }.to change { issue.reload.title }.to('Foo') end end context 'when an issue is identified as spam' do context 'when recaptcha is not verified' do before do allow_next_instance_of(Spam::AkismetService) do |akismet_service| allow(akismet_service).to receive(:spam?).and_return(true) end end context 'when allow_possible_spam feature flag is false' do before do stub_feature_flags(allow_possible_spam: false) end it 'rejects an issue recognized as spam' do expect { update_issue }.not_to change { issue.reload.title } end it 'rejects an issue recognized as a spam when reCAPTCHA disabled' do stub_application_setting(recaptcha_enabled: false) expect { update_issue }.not_to change { issue.reload.title } end it 'creates a spam log' do expect { update_issue(issue_params: { title: 'Spam title' }) } .to log_spam(title: 'Spam title', noteable_type: 'Issue') end context 'renders properly' do render_views before do expect(controller).to(receive(:spam_action_response_fields).with(issue)) do spam_action_response_fields end end it 'renders spam_action_response_fields json response' do update_issue expect(response).to have_gitlab_http_status(:conflict) expect(json_response).to eq(spam_action_response_fields) end end end context 'when allow_possible_spam feature flag is true' do it 'updates the issue recognized as spam' do expect { update_issue }.to change { issue.reload.title } end it 'creates a spam log' do expect { update_issue(issue_params: { title: 'Spam title' }) } .to log_spam( title: 'Spam title', description: issue.description, noteable_type: 'Issue', recaptcha_verified: false ) end it 'returns 200 status' do update_issue expect(response).to have_gitlab_http_status(:ok) end end end context 'when recaptcha is verified' do let(:spammy_title) { 'Whatever' } let!(:spam_logs) { create_list(:spam_log, 2, user: user, title: spammy_title) } before do request.headers['X-GitLab-Captcha-Response'] = 'a-valid-captcha-response' request.headers['X-GitLab-Spam-Log-Id'] = spam_logs.last.id end def update_verified_issue update_issue(issue_params: { title: spammy_title }) end it 'returns 200 status' do update_verified_issue expect(response).to have_gitlab_http_status(:ok) end it 'accepts an issue after reCAPTCHA is verified' do expect { update_verified_issue }.to change { issue.reload.title }.to(spammy_title) end it 'marks spam log as recaptcha_verified' do expect { update_verified_issue }.to change { SpamLog.last.recaptcha_verified }.from(false).to(true) end it 'does not mark spam log as recaptcha_verified when it does not belong to current_user' do spam_log = create(:spam_log) request.headers['X-GitLab-Spam-Log-Id'] = spam_log.id expect { update_issue } .not_to change { SpamLog.last.recaptcha_verified } end end end end end describe 'GET #show' do it_behaves_like 'restricted action', success: 200 def go(id:) get :show, params: { namespace_id: project.namespace.to_param, project_id: project, id: id } end it 'avoids (most) N+1s loading labels', :request_store do label = create(:label, project: project).to_reference labels = create_list(:label, 10, project: project).map(&:to_reference) issue = create(:issue, project: project, description: 'Test issue') control_count = ActiveRecord::QueryRecorder.new { issue.update!(description: [issue.description, label].join(' ')) }.count # Follow-up to get rid of this `2 * label.count` requirement: https://gitlab.com/gitlab-org/gitlab-foss/issues/52230 expect { issue.update!(description: [issue.description, labels].join(' ')) } .not_to exceed_query_limit(control_count + 2 * labels.count) end it 'logs the view with Gitlab::Search::RecentIssues' do sign_in(user) recent_issues_double = instance_double(::Gitlab::Search::RecentIssues, log_view: nil) expect(::Gitlab::Search::RecentIssues).to receive(:new).with(user: user).and_return(recent_issues_double) go(id: issue.to_param) expect(response).to be_successful expect(recent_issues_double).to have_received(:log_view).with(issue) end context 'when not logged in' do it 'does not log the view with Gitlab::Search::RecentIssues' do expect(::Gitlab::Search::RecentIssues).not_to receive(:new) go(id: issue.to_param) end end end describe 'GET #realtime_changes' do it_behaves_like 'restricted action', success: 200 def go(id:) get :realtime_changes, params: { namespace_id: project.namespace.to_param, project_id: project, id: id } end end describe 'GET #edit' do it_behaves_like 'restricted action', success: 200 def go(id:) get :edit, params: { namespace_id: project.namespace.to_param, project_id: project, id: id } end end describe 'PUT #update' do it_behaves_like 'restricted action', success: 302 def go(id:) put :update, params: { namespace_id: project.namespace.to_param, project_id: project, id: id, issue: { title: 'New title' } } end end end describe 'POST #create' do def post_new_issue(issue_attrs = {}, additional_params = {}) sign_in(user) project = create(:project, :public) project.add_developer(user) post :create, params: { namespace_id: project.namespace.to_param, project_id: project, issue: { title: 'Title', description: 'Description' }.merge(issue_attrs) }.merge(additional_params) project.issues.first end context 'when creating an incident' do it 'sets the correct issue_type' do issue = post_new_issue(issue_type: 'incident') expect(issue.issue_type).to eq('incident') expect(issue.work_item_type.base_type).to eq('incident') end end context 'when trying to create a task' do it 'defaults to issue type' do issue = post_new_issue(issue_type: 'task') expect(issue.issue_type).to eq('issue') expect(issue.work_item_type.base_type).to eq('issue') end end context 'when trying to create a objective' do it 'defaults to issue type' do issue = post_new_issue(issue_type: 'objective') expect(issue.issue_type).to eq('issue') expect(issue.work_item_type.base_type).to eq('issue') end end context 'when trying to create a key_result' do it 'defaults to issue type' do issue = post_new_issue(issue_type: 'key_result') expect(issue.issue_type).to eq('issue') expect(issue.work_item_type.base_type).to eq('issue') end end context 'when create service return an unrecoverable error with http_status' do let(:http_status) { 403 } before do allow_next_instance_of(::Issues::CreateService) do |create_service| allow(create_service).to receive(:execute).and_return( ServiceResponse.error(message: 'unrecoverable error', http_status: http_status) ) end end it 'renders 403 and logs the error' do expect(Gitlab::AppLogger).to receive(:warn).with( message: 'Cannot create issue', errors: ['unrecoverable error'], http_status: http_status ) post_new_issue expect(response).to have_gitlab_http_status :forbidden end context 'when no render method is found for the returned http_status' do let(:http_status) { nil } it 'renders 404 and logs the error' do expect(Gitlab::AppLogger).to receive(:warn).with( message: 'Cannot create issue', errors: ['unrecoverable error'], http_status: http_status ) post_new_issue expect(response).to have_gitlab_http_status :not_found end end end it 'creates the issue successfully', :aggregate_failures do issue = post_new_issue expect(issue).to be_a(Issue) expect(issue.persisted?).to eq(true) expect(issue.issue_type).to eq('issue') expect(issue.work_item_type.base_type).to eq('issue') end context 'resolving discussions in MergeRequest' do let_it_be(:discussion) { create(:diff_note_on_merge_request).to_discussion } let(:merge_request) { discussion.noteable } let(:project) { merge_request.source_project } before do project.add_maintainer(user) sign_in user end let(:merge_request_params) do { merge_request_to_resolve_discussions_of: merge_request.iid } end def post_issue(other_params: {}, **issue_params) post :create, params: { namespace_id: project.namespace.to_param, project_id: project, issue: issue_params, merge_request_to_resolve_discussions_of: merge_request.iid }.merge(other_params) end it 'creates an issue for the project' do expect { post_issue(title: 'Hello') }.to change { project.issues.reload.size }.by(1) end it "doesn't overwrite given params" do post_issue(description: 'Manually entered description') expect(assigns(:issue).description).to eq('Manually entered description') end it 'resolves the discussion in the merge_request' do post_issue(title: 'Hello') discussion.first_note.reload expect(discussion.resolved?).to eq(true) end it 'sets a flash message' do post_issue(title: 'Hello') expect(flash[:notice]).to eq(_('Resolved all discussions.')) end describe "resolving a single discussion" do before do post_issue(title: 'Hello', other_params: { discussion_to_resolve: discussion.id }) end it 'resolves a single discussion' do discussion.first_note.reload expect(discussion.resolved?).to eq(true) end it 'sets a flash message that one discussion was resolved' do expect(flash[:notice]).to eq(_('Resolved 1 discussion.')) end end end context 'Recaptcha is enabled' do before do stub_application_setting(recaptcha_enabled: true) end context 'when SpamVerdictService allows the issue' do before do stub_feature_flags(allow_possible_spam: false) expect_next_instance_of(Spam::SpamVerdictService) do |verdict_service| expect(verdict_service).to receive(:execute).and_return(ALLOW) end end it 'creates an issue' do expect { post_new_issue(title: 'Some title') }.to change(Issue, :count) end end context 'when an issue is identified as spam and requires recaptcha' do context 'when captcha is not verified' do before do allow_next_instance_of(Spam::AkismetService) do |akismet_service| allow(akismet_service).to receive(:spam?).and_return(true) end end def post_spam_issue post_new_issue(title: 'Spam Title', description: 'Spam lives here') end context 'when allow_possible_spam feature flag is false' do before do stub_feature_flags(allow_possible_spam: false) end it 'rejects an issue recognized as spam' do expect { post_spam_issue }.not_to change(Issue, :count) end it 'creates a spam log' do expect { post_spam_issue } .to log_spam(title: 'Spam Title', noteable_type: 'Issue', recaptcha_verified: false) end it 'does not create an issue when it is not valid' do expect { post_new_issue(title: '') }.not_to change(Issue, :count) end it 'does not create an issue when reCAPTCHA is not enabled' do stub_application_setting(recaptcha_enabled: false) expect { post_spam_issue }.not_to change(Issue, :count) end end context 'when allow_possible_spam feature flag is true' do it 'creates an issue recognized as spam' do expect { post_spam_issue }.to change(Issue, :count) end it 'creates a spam log' do expect { post_spam_issue } .to log_spam(title: 'Spam Title', noteable_type: 'Issue', recaptcha_verified: false) end it 'does not create an issue when it is not valid' do expect { post_new_issue(title: '') }.not_to change(Issue, :count) end end end context 'when Recaptcha is verified' do let!(:spam_logs) { create_list(:spam_log, 2, user: user, title: 'Title') } let!(:last_spam_log) { spam_logs.last } def post_verified_issue post_new_issue({}, { spam_log_id: last_spam_log.id, 'g-recaptcha-response': 'abc123' }) end before do expect_next_instance_of(Captcha::CaptchaVerificationService) do |instance| expect(instance).to receive(:execute) { true } end end it 'accepts an issue after reCAPTCHA is verified' do expect { post_verified_issue }.to change(Issue, :count) end it 'marks spam log as recaptcha_verified' do expect { post_verified_issue }.to change { last_spam_log.reload.recaptcha_verified }.from(false).to(true) end it 'does not mark spam log as recaptcha_verified when it does not belong to current_user' do spam_log = create(:spam_log) expect { post_new_issue({}, { spam_log_id: spam_log.id, 'g-recaptcha-response': true }) } .not_to change { last_spam_log.recaptcha_verified } end end end end context 'user agent details are saved' do before do request.env['action_dispatch.remote_ip'] = '127.0.0.1' end it 'creates a user agent detail' do expect { post_new_issue }.to change(UserAgentDetail, :count).by(1) end end context 'when description has quick actions' do before do sign_in(user) end it 'can add spent time' do issue = post_new_issue(description: '/spend 1h') expect(issue.total_time_spent).to eq(3600) end it 'can set the time estimate' do issue = post_new_issue(description: '/estimate 2h') expect(issue.time_estimate).to eq(7200) end end context 'when created from sentry error' do subject { post_new_issue(sentry_issue_attributes: { sentry_issue_identifier: 1234567 }) } it 'creates an issue' do expect { subject }.to change(Issue, :count) end it 'creates a sentry issue' do expect { subject }.to change(SentryIssue, :count) end end context 'when the endpoint receives requests above the limit', :freeze_time, :clean_gitlab_redis_rate_limiting do before do stub_application_setting(issues_create_limit: 1) end context 'when issue creation limits imposed' do it 'prevents from creating more issues', :request_store do post_new_issue expect { post_new_issue } .to change { Gitlab::GitalyClient.get_request_count }.by(1) # creates 1 projects and 0 issues post_new_issue expect(response.body).to eq(_('This endpoint has been requested too many times. Try again later.')) expect(response).to have_gitlab_http_status(:too_many_requests) end it 'logs the event on auth.log' do attributes = { message: 'Application_Rate_Limiter_Request', env: :issues_create_request_limit, remote_ip: '0.0.0.0', request_method: 'POST', path: "/#{project.full_path}/-/issues", user_id: user.id, username: user.username } expect(Gitlab::AuthLogger).to receive(:error).with(attributes).once project.add_developer(user) sign_in(user) 2.times do post :create, params: { namespace_id: project.namespace.to_param, project_id: project, issue: { title: 'Title', description: 'Description' } } end end end end context 'setting issue type' do let(:issue_type) { 'issue' } subject { post_new_issue(issue_type: issue_type)&.issue_type } it { is_expected.to eq('issue') } context 'incident issue' do let(:issue_type) { 'incident' } it { is_expected.to eq(issue_type) } end end end describe 'POST #mark_as_spam' do context 'properly submits to Akismet' do before do expect_next_instance_of(Spam::AkismetService) do |akismet_service| expect(akismet_service).to receive_messages(submit_spam: true) end stub_application_setting(akismet_enabled: true) end def post_spam admin = create(:admin) create(:user_agent_detail, subject: issue) project.add_maintainer(admin) sign_in(admin) post :mark_as_spam, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } end it 'updates issue', :enable_admin_mode do post_spam expect(issue.submittable_as_spam?).to be_falsey end end end describe "DELETE #destroy" do context "when the user is a developer" do before do sign_in(user) end it "does not delete the issue, returning :not_found" do delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } expect(response).to have_gitlab_http_status(:not_found) end end context "when the user is owner" do let_it_be(:owner) { create(:user) } let_it_be(:namespace) { create(:namespace, owner: owner) } let_it_be(:project) { create(:project, namespace: namespace) } before do sign_in(owner) end it "deletes the issue" do delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid, destroy_confirm: true } expect(response).to have_gitlab_http_status(:found) expect(controller).to set_flash[:notice].to(/The issue was successfully deleted\./) end it "prevents deletion if destroy_confirm is not set" do expect(Gitlab::ErrorTracking).to receive(:track_exception).and_call_original delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } expect(response).to have_gitlab_http_status(:found) expect(controller).to set_flash[:notice].to('Destroy confirmation not provided for issue') end it "prevents deletion in JSON format if destroy_confirm is not set" do expect(Gitlab::ErrorTracking).to receive(:track_exception).and_call_original delete :destroy, params: { namespace_id: project.namespace, project_id: project, id: issue.iid, format: 'json' } expect(response).to have_gitlab_http_status(:unprocessable_entity) expect(json_response).to eq({ 'errors' => 'Destroy confirmation not provided for issue' }) end end end describe 'POST #toggle_award_emoji' do before do sign_in(user) project.add_developer(user) end subject do post(:toggle_award_emoji, params: { namespace_id: project.namespace, project_id: project, id: issue.iid, name: emoji_name }) end let(:emoji_name) { 'thumbsup' } it "toggles the award emoji" do expect do subject end.to change { issue.award_emoji.count }.by(1) expect(response).to have_gitlab_http_status(:ok) end it "removes the already awarded emoji" do create(:award_emoji, awardable: issue, name: emoji_name, user: user) expect { subject }.to change { AwardEmoji.count }.by(-1) expect(response).to have_gitlab_http_status(:ok) end it 'marks Todos on the Issue as done' do todo = create(:todo, target: issue, project: project, user: user) subject expect(todo.reload).to be_done end end describe 'POST create_merge_request' do let(:target_project_id) { nil } let_it_be(:project) { create(:project, :repository, :public) } before do project.add_developer(user) sign_in(user) end it 'creates a new merge request' do expect { create_merge_request }.to change(project.merge_requests, :count).by(1) end it 'render merge request as json' do create_merge_request expect(response).to have_gitlab_http_status(:ok) expect(response).to match_response_schema('merge_request') end it 'is not available when the project is archived' do project.update!(archived: true) create_merge_request expect(response).to have_gitlab_http_status(:not_found) end it 'is not available for users who cannot create merge requests' do sign_in(create(:user)) create_merge_request expect(response).to have_gitlab_http_status(:not_found) end context 'invalid branch name' do it 'is unprocessable' do post( :create_merge_request, params: { target_project_id: nil, branch_name: 'master', ref: 'master', namespace_id: project.namespace.to_param, project_id: project.to_param, id: issue.to_param }, format: :json ) expect(response.body).to eq('Branch already exists') expect(response).to have_gitlab_http_status(:unprocessable_entity) end end context 'target_project_id is set' do let(:target_project) { fork_project(project, user, repository: true) } let(:target_project_id) { target_project.id } it 'creates a new merge request', :sidekiq_might_not_need_inline do expect { create_merge_request }.to change(target_project.merge_requests, :count).by(1) end end def create_merge_request post( :create_merge_request, params: { namespace_id: project.namespace.to_param, project_id: project.to_param, id: issue.to_param, target_project_id: target_project_id }, format: :json ) end end describe 'POST #import_csv' do let_it_be(:project) { create(:project, :public) } let(:file) { fixture_file_upload('spec/fixtures/csv_comma.csv') } context 'unauthorized' do it 'returns 404 for guests' do sign_out(:user) import_csv expect(response).to have_gitlab_http_status :not_found end it 'returns 404 for project members with reporter role' do sign_in(user) project.add_reporter(user) import_csv expect(response).to have_gitlab_http_status :not_found end end context 'authorized' do before do sign_in(user) project.add_developer(user) end context 'when upload proceeds correctly' do it "returns 302 for project members with developer role" do import_csv expect(flash[:notice]).to eq(_("Your issues are being imported. Once finished, you'll get a confirmation email.")) expect(response).to redirect_to(project_issues_path(project)) end it 'enqueues an import job' do expect(ImportIssuesCsvWorker).to receive(:perform_async).with(user.id, project.id, Integer) import_csv end end context 'when upload fails' do it "shows error when upload fails" do expect_next_instance_of(UploadService) do |upload_service| expect(upload_service).to receive(:execute).and_return(nil) end import_csv expect(flash[:alert]).to include(_('File upload error.')) expect(response).to redirect_to(project_issues_path(project)) end end end def import_csv post :import_csv, params: { namespace_id: project.namespace.to_param, project_id: project.to_param, file: file } end end describe 'POST export_csv' do let(:viewer) { user } let(:issue) { create(:issue, project: project) } before do project.add_developer(user) end def request_csv post :export_csv, params: { namespace_id: project.namespace.to_param, project_id: project.to_param } end context 'when logged in' do before do sign_in(viewer) end it 'allows CSV export' do expect(IssuableExportCsvWorker).to receive(:perform_async) .with(:issue, viewer.id, project.id, hash_including('issue_types' => Issue::TYPES_FOR_LIST)) request_csv expect(response).to redirect_to(project_issues_path(project)) expect(controller).to set_flash[:notice].to match(/\AYour CSV export has started/i) end end context 'when not logged in' do let(:empty_project) { create(:project_empty_repo, :public) } it 'redirects to the sign in page' do request_csv expect(IssuableExportCsvWorker).not_to receive(:perform_async) expect(response).to redirect_to(new_user_session_path) end end end describe 'GET service_desk' do let_it_be(:project) { create(:project_empty_repo, :public) } let_it_be(:support_bot) { User.support_bot } let_it_be(:other_user) { create(:user) } let_it_be(:service_desk_issue_1) { create(:issue, project: project, author: support_bot) } let_it_be(:service_desk_issue_2) { create(:issue, project: project, author: support_bot, assignees: [other_user]) } let_it_be(:other_user_issue) { create(:issue, project: project, author: other_user) } def get_service_desk(extra_params = {}) get :service_desk, params: extra_params.merge(namespace_id: project.namespace, project_id: project) end it 'adds an author filter for the support bot user' do get_service_desk expect(assigns(:issues)).to contain_exactly(service_desk_issue_1, service_desk_issue_2) end it 'does not allow any other author to be set' do get_service_desk(author_username: other_user.username) expect(assigns(:issues)).to contain_exactly(service_desk_issue_1, service_desk_issue_2) end it 'supports other filters' do get_service_desk(assignee_username: other_user.username) expect(assigns(:issues)).to contain_exactly(service_desk_issue_2) end it 'allows an assignee to be specified by id' do get_service_desk(assignee_id: other_user.id) expect(assigns(:users)).to contain_exactly(other_user, support_bot) end end describe 'GET #discussions' do let!(:discussion) { create(:discussion_note_on_issue, noteable: issue, project: issue.project) } context 'when authenticated' do before do project.add_developer(user) sign_in(user) end context do it_behaves_like 'discussions provider' do let!(:author) { create(:user) } let!(:project) { create(:project) } let!(:issue) { create(:issue, project: project, author: user) } let!(:note_on_issue1) { create(:discussion_note_on_issue, noteable: issue, project: issue.project, author: create(:user)) } let!(:note_on_issue2) { create(:discussion_note_on_issue, noteable: issue, project: issue.project, author: create(:user)) } let(:requested_iid) { issue.iid } let(:expected_discussion_count) { 3 } let(:expected_discussion_ids) do [ issue.notes.first.discussion_id, note_on_issue1.discussion_id, note_on_issue2.discussion_id ] end end end it 'returns discussion json' do get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } expect(json_response.first.keys).to match_array(%w[id reply_id expanded notes diff_discussion discussion_path individual_note resolvable resolved resolved_at resolved_by resolved_by_push commit_id for_commit project_id confidential]) end it 'renders the author status html if there is a status' do create(:user_status, user: discussion.author) get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } note_json = json_response.first['notes'].first expect(note_json['author']['status_tooltip_html']).to be_present end it 'does not cause an extra query for the status' do control = ActiveRecord::QueryRecorder.new do get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } end create(:user_status, user: discussion.author) second_discussion = create(:discussion_note_on_issue, noteable: issue, project: issue.project, author: create(:user)) create(:user_status, user: second_discussion.author) expect { get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } } .not_to exceed_query_limit(control) end context 'when user is setting notes filters' do let(:issuable) { issue } let(:issuable_parent) { project } let!(:discussion_note) { create(:discussion_note_on_issue, :system, noteable: issuable, project: project) } it_behaves_like 'issuable notes filter' end context 'with cross-reference system note', :request_store do let_it_be(:new_issue) { create(:issue) } let(:cross_reference) { "mentioned in #{new_issue.to_reference(issue.project)}" } before do create(:discussion_note_on_issue, :system, noteable: issue, project: issue.project, note: cross_reference) end it 'filters notes that the user should not see' do get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } expect(json_response.count).to eq(1) end it 'does not result in N+1 queries' do # Instantiate the controller variables to ensure QueryRecorder has an accurate base count get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } RequestStore.clear! control_count = ActiveRecord::QueryRecorder.new do get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } end.count RequestStore.clear! create_list(:discussion_note_on_issue, 2, :system, noteable: issue, project: issue.project, note: cross_reference) expect { get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } }.not_to exceed_query_limit(control_count) end end context 'private project' do let!(:branch_note) { create(:discussion_note_on_issue, :system, noteable: issue, project: project) } let!(:commit_note) { create(:discussion_note_on_issue, :system, noteable: issue, project: project) } let!(:branch_note_meta) { create(:system_note_metadata, note: branch_note, action: "branch") } let!(:commit_note_meta) { create(:system_note_metadata, note: commit_note, action: "commit") } context 'user is allowed access' do before do project.add_member(user, :maintainer) end it 'displays all available notes' do get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } expect(json_response.length).to eq(3) end end context 'user is a guest' do let(:json_response_note_ids) do json_response.collect { |discussion| discussion["notes"] }.flatten .collect { |note| note["id"].to_i } end before do project.add_guest(user) end it 'does not display notes w/type listed in TYPES_RESTRICTED_BY_ACCESS_LEVEL' do get :discussions, params: { namespace_id: project.namespace, project_id: project, id: issue.iid } expect(json_response.length).to eq(2) expect(json_response_note_ids).not_to include(branch_note.id) end end end end end describe 'GET #designs' do context 'when project has moved' do let(:new_project) { create(:project) } let(:issue) { create(:issue, project: new_project) } before do sign_in(user) project.route.destroy! new_project.redirect_routes.create!(path: project.full_path) new_project.add_developer(user) end it 'redirects from an old issue/designs correctly' do get :designs, params: { namespace_id: project.namespace, project_id: project, id: issue } expect(response).to redirect_to(designs_project_issue_path(new_project, issue)) expect(response).to have_gitlab_http_status(:moved_permanently) end end end end