Newer
Older
GitBucket / src / test / scala / gitbucket / core / service / ProtectedBranchServiceSpec.scala
@xuwei-k xuwei-k on 5 Oct 2016 10 KB remove unused scalaz
package gitbucket.core.service

import gitbucket.core.util.GitSpecUtil._
import org.eclipse.jgit.transport.{ReceivePack, ReceiveCommand}
import org.eclipse.jgit.lib.ObjectId
import gitbucket.core.model.CommitState
import gitbucket.core.service.ProtectedBranchService.{ProtectedBranchReceiveHook, ProtectedBranchInfo}
import org.scalatest.FunSpec

class ProtectedBranchServiceSpec extends FunSpec with ServiceSpecBase with ProtectedBranchService with CommitStatusService {

  val receiveHook = new ProtectedBranchReceiveHook()
  val now = new java.util.Date()
  val sha = "0c77148632618b59b6f70004e3084002be2b8804"
  val sha2 = "0c77148632618b59b6f70004e3084002be2b8805"

  describe("getProtectedBranchInfo") {
    it("should empty is disabled") {
      withTestDB { implicit session =>
        assert(getProtectedBranchInfo("user1", "repo1", "branch") == ProtectedBranchInfo.disabled("user1", "repo1"))
      }
    }
    it("should enable and update and disable") {
      withTestDB { implicit session =>
        generateNewUserWithDBRepository("user1", "repo1")
        enableBranchProtection("user1", "repo1", "branch", false, Nil)
        assert(getProtectedBranchInfo("user1", "repo1", "branch") == ProtectedBranchInfo("user1", "repo1", true, Nil, false))
        enableBranchProtection("user1", "repo1", "branch", true, Seq("hoge","huge"))
        assert(getProtectedBranchInfo("user1", "repo1", "branch") == ProtectedBranchInfo("user1", "repo1", true, Seq("hoge","huge"), true))
        disableBranchProtection("user1", "repo1", "branch")
        assert(getProtectedBranchInfo("user1", "repo1", "branch") == ProtectedBranchInfo.disabled("user1", "repo1"))
      }
    }
    it("should empty contexts is no-include-administrators") {
      withTestDB { implicit session =>
        generateNewUserWithDBRepository("user1", "repo1")
        enableBranchProtection("user1", "repo1", "branch", false, Nil)
        assert(getProtectedBranchInfo("user1", "repo1", "branch").includeAdministrators == false)
        enableBranchProtection("user1", "repo1", "branch", true, Nil)
        assert(getProtectedBranchInfo("user1", "repo1", "branch").includeAdministrators == false)
      }
    }
    it("getProtectedBranchList") {
      withTestDB { implicit session =>
        generateNewUserWithDBRepository("user1", "repo1")
        enableBranchProtection("user1", "repo1", "branch", false, Nil)
        enableBranchProtection("user1", "repo1", "branch2", false, Seq("fuga"))
        enableBranchProtection("user1", "repo1", "branch3", true, Seq("hoge"))
        assert(getProtectedBranchList("user1", "repo1").toSet == Set("branch", "branch2", "branch3"))
      }
    }
    it("getBranchProtectedReason on force push from admin") {
      withTestDB { implicit session =>
        withTestRepository { git =>
          val rp = new ReceivePack(git.getRepository)
          rp.setAllowNonFastForwards(true)
          val rc = new ReceiveCommand(ObjectId.fromString(sha), ObjectId.fromString(sha2), "refs/heads/branch", ReceiveCommand.Type.UPDATE_NONFASTFORWARD)
          generateNewUserWithDBRepository("user1", "repo1")
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == None)
          enableBranchProtection("user1", "repo1", "branch", false, Nil)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == Some("Cannot force-push to a protected branch"))
        }
      }
    }
    it("getBranchProtectedReason on force push from other") {
      withTestDB { implicit session =>
        withTestRepository { git =>
          val rp = new ReceivePack(git.getRepository)
          rp.setAllowNonFastForwards(true)
          val rc = new ReceiveCommand(ObjectId.fromString(sha), ObjectId.fromString(sha2), "refs/heads/branch", ReceiveCommand.Type.UPDATE_NONFASTFORWARD)
          generateNewUserWithDBRepository("user1", "repo1")
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == None)
          enableBranchProtection("user1", "repo1", "branch", false, Nil)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == Some("Cannot force-push to a protected branch"))
        }
      }
    }
    it("getBranchProtectedReason check status on push from other") {
      withTestDB { implicit session =>
        withTestRepository { git =>
          val rp = new ReceivePack(git.getRepository)
          rp.setAllowNonFastForwards(false)
          val rc = new ReceiveCommand(ObjectId.fromString(sha), ObjectId.fromString(sha2), "refs/heads/branch", ReceiveCommand.Type.UPDATE)
          val user1 = generateNewUserWithDBRepository("user1", "repo1")
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == None)
          enableBranchProtection("user1", "repo1", "branch", false, Seq("must"))
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == Some("Required status check \"must\" is expected"))
          enableBranchProtection("user1", "repo1", "branch", false, Seq("must", "must2"))
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == Some("2 of 2 required status checks are expected"))
          createCommitStatus("user1", "repo1", sha2, "context", CommitState.SUCCESS, None, None, now, user1)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == Some("2 of 2 required status checks are expected"))
          createCommitStatus("user1", "repo1", sha2, "must", CommitState.SUCCESS, None, None, now, user1)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == Some("Required status check \"must2\" is expected"))
          createCommitStatus("user1", "repo1", sha2, "must2", CommitState.SUCCESS, None, None, now, user1)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user2") == None)
        }
      }
    }
    it("getBranchProtectedReason check status on push from admin") {
      withTestDB { implicit session =>
        withTestRepository { git =>
          val rp = new ReceivePack(git.getRepository)
            rp.setAllowNonFastForwards(false)
          val rc = new ReceiveCommand(ObjectId.fromString(sha), ObjectId.fromString(sha2), "refs/heads/branch", ReceiveCommand.Type.UPDATE)
          val user1 = generateNewUserWithDBRepository("user1", "repo1")
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == None)
          enableBranchProtection("user1", "repo1", "branch", false, Seq("must"))
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == None)
          enableBranchProtection("user1", "repo1", "branch", true, Seq("must"))
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == Some("Required status check \"must\" is expected"))
          enableBranchProtection("user1", "repo1", "branch", false, Seq("must", "must2"))
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == None)
          enableBranchProtection("user1", "repo1", "branch", true, Seq("must", "must2"))
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == Some("2 of 2 required status checks are expected"))
          createCommitStatus("user1", "repo1", sha2, "context", CommitState.SUCCESS, None, None, now, user1)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == Some("2 of 2 required status checks are expected"))
          createCommitStatus("user1", "repo1", sha2, "must", CommitState.SUCCESS, None, None, now, user1)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == Some("Required status check \"must2\" is expected"))
          createCommitStatus("user1", "repo1", sha2, "must2", CommitState.SUCCESS, None, None, now, user1)
          assert(receiveHook.preReceive("user1", "repo1", rp, rc, "user1") == None)
        }
      }
    }
  }
  describe("ProtectedBranchInfo") {
    it("administrator is owner") {
      withTestDB { implicit session =>
        generateNewUserWithDBRepository("user1", "repo1")
        val x = ProtectedBranchInfo("user1", "repo1", true, Nil, false)
        assert(x.isAdministrator("user1") == true)
        assert(x.isAdministrator("user2") == false)
      }
    }
    it("administrator is manager") {
      withTestDB { implicit session =>
        val x = ProtectedBranchInfo("grp1", "repo1", true, Nil, false)
        x.createGroup("grp1", None)
        generateNewAccount("user1")
        generateNewAccount("user2")
        generateNewAccount("user3")

        x.updateGroupMembers("grp1", List("user1"->true, "user2"->false))
        assert(x.isAdministrator("user1") == true)
        assert(x.isAdministrator("user2") == false)
        assert(x.isAdministrator("user3") == false)
      }
    }
    it("unSuccessedContexts") {
      withTestDB { implicit session =>
        val user1 = generateNewUserWithDBRepository("user1", "repo1")
        val x = ProtectedBranchInfo("user1", "repo1", true, List("must"), false)
        assert(x.unSuccessedContexts(sha) == Set("must"))
        createCommitStatus("user1", "repo1", sha, "context", CommitState.SUCCESS, None, None, now, user1)
        assert(x.unSuccessedContexts(sha) == Set("must"))
        createCommitStatus("user1", "repo1", sha, "must", CommitState.ERROR, None, None, now, user1)
        assert(x.unSuccessedContexts(sha) == Set("must"))
        createCommitStatus("user1", "repo1", sha, "must", CommitState.PENDING, None, None, now, user1)
        assert(x.unSuccessedContexts(sha) == Set("must"))
        createCommitStatus("user1", "repo1", sha, "must", CommitState.FAILURE, None, None, now, user1)
        assert(x.unSuccessedContexts(sha) == Set("must"))
        createCommitStatus("user1", "repo1", sha, "must", CommitState.SUCCESS, None, None, now, user1)
        assert(x.unSuccessedContexts(sha) == Set())
      }
    }
    it("unSuccessedContexts when empty") {
      withTestDB { implicit session =>
        val user1 = generateNewUserWithDBRepository("user1", "repo1")
        val x = ProtectedBranchInfo("user1", "repo1", true, Nil, false)
        val sha = "0c77148632618b59b6f70004e3084002be2b8804"
        assert(x.unSuccessedContexts(sha) == Set())
        createCommitStatus("user1", "repo1", sha, "context", CommitState.SUCCESS, None, None, now, user1)
        assert(x.unSuccessedContexts(sha) == Set())
      }
    }
    it("if disabled, needStatusCheck is false") {
      withTestDB { implicit session =>
        assert(ProtectedBranchInfo("user1", "repo1", false, Seq("must"), true).needStatusCheck("user1") == false)
      }
    }
    it("needStatusCheck includeAdministrators") {
      withTestDB { implicit session =>
        assert(ProtectedBranchInfo("user1", "repo1", true, Seq("must"), false).needStatusCheck("user2") == true)
        assert(ProtectedBranchInfo("user1", "repo1", true, Seq("must"), false).needStatusCheck("user1") == false)
        assert(ProtectedBranchInfo("user1", "repo1", true, Seq("must"), true ).needStatusCheck("user2") == true)
        assert(ProtectedBranchInfo("user1", "repo1", true, Seq("must"), true ).needStatusCheck("user1") == true)
      }
    }
  }
}