Commit fbf618fc authored by Valery Sizov's avatar Valery Sizov

Fix: Project deletion may not log audit events during user deletion

parent 5bf9f5b6
...@@ -83,9 +83,6 @@ module Projects ...@@ -83,9 +83,6 @@ module Projects
end end
def remove_repository(path) def remove_repository(path)
# Skip repository removal. We use this flag when remove user or group
return true if params[:skip_repo] == true
# There is a possibility project does not have repository or wiki # There is a possibility project does not have repository or wiki
return true unless repo_exists?(path) return true unless repo_exists?(path)
......
...@@ -2,6 +2,8 @@ ...@@ -2,6 +2,8 @@
module Users module Users
class DestroyService class DestroyService
DestroyError = Class.new(StandardError)
attr_accessor :current_user attr_accessor :current_user
def initialize(current_user) def initialize(current_user)
...@@ -46,9 +48,8 @@ module Users ...@@ -46,9 +48,8 @@ module Users
namespace.prepare_for_destroy namespace.prepare_for_destroy
user.personal_projects.each do |project| user.personal_projects.each do |project|
# Skip repository removal because we remove directory with namespace success = ::Projects::DestroyService.new(project, current_user).execute
# that contain all this repositories raise DestroyError, "Project #{project.id} can't be deleted" unless success
::Projects::DestroyService.new(project, current_user, skip_repo: project.legacy_storage?).execute
end end
yield(user) if block_given? yield(user) if block_given?
......
---
title: 'Fix: Project deletion may not log audit events during user deletion'
merge_request:
author:
type: fixed
...@@ -20,7 +20,7 @@ describe Users::DestroyService do ...@@ -20,7 +20,7 @@ describe Users::DestroyService do
it 'will delete the project' do it 'will delete the project' do
expect_next_instance_of(Projects::DestroyService) do |destroy_service| expect_next_instance_of(Projects::DestroyService) do |destroy_service|
expect(destroy_service).to receive(:execute).once expect(destroy_service).to receive(:execute).once.and_return(true)
end end
service.execute(user) service.execute(user)
...@@ -35,7 +35,7 @@ describe Users::DestroyService do ...@@ -35,7 +35,7 @@ describe Users::DestroyService do
it 'destroys a project in pending_delete' do it 'destroys a project in pending_delete' do
expect_next_instance_of(Projects::DestroyService) do |destroy_service| expect_next_instance_of(Projects::DestroyService) do |destroy_service|
expect(destroy_service).to receive(:execute).once expect(destroy_service).to receive(:execute).once.and_return(true)
end end
service.execute(user) service.execute(user)
...@@ -172,23 +172,36 @@ describe Users::DestroyService do ...@@ -172,23 +172,36 @@ describe Users::DestroyService do
end end
describe "user personal's repository removal" do describe "user personal's repository removal" do
before do context 'storages' do
perform_enqueued_jobs { service.execute(user) } before do
end perform_enqueued_jobs { service.execute(user) }
end
context 'legacy storage' do
let!(:project) { create(:project, :empty_repo, :legacy_storage, namespace: user.namespace) }
it 'removes repository' do
expect(gitlab_shell.exists?(project.repository_storage, "#{project.disk_path}.git")).to be_falsey
end
end
context 'legacy storage' do context 'hashed storage' do
let!(:project) { create(:project, :empty_repo, :legacy_storage, namespace: user.namespace) } let!(:project) { create(:project, :empty_repo, namespace: user.namespace) }
it 'removes repository' do it 'removes repository' do
expect(gitlab_shell.exists?(project.repository_storage, "#{project.disk_path}.git")).to be_falsey expect(gitlab_shell.exists?(project.repository_storage, "#{project.disk_path}.git")).to be_falsey
end
end end
end end
context 'hashed storage' do context 'repository removal status is taken into account' do
let!(:project) { create(:project, :empty_repo, namespace: user.namespace) } it 'raises exception' do
expect_next_instance_of(::Projects::DestroyService) do |destroy_service|
expect(destroy_service).to receive(:execute).and_return(false)
end
it 'removes repository' do expect { service.execute(user) }
expect(gitlab_shell.exists?(project.repository_storage, "#{project.disk_path}.git")).to be_falsey .to raise_error(Users::DestroyService::DestroyError, "Project #{project.id} can't be deleted" )
end end
end end
end end
......
...@@ -18,13 +18,6 @@ describe ProjectDestroyWorker do ...@@ -18,13 +18,6 @@ describe ProjectDestroyWorker do
expect(Dir.exist?(path)).to be_falsey expect(Dir.exist?(path)).to be_falsey
end end
it 'deletes the project but skips repo deletion' do
subject.perform(project.id, project.owner.id, { "skip_repo" => true })
expect(Project.all).not_to include(project)
expect(Dir.exist?(path)).to be_truthy
end
it 'does not raise error when project could not be found' do it 'does not raise error when project could not be found' do
expect do expect do
subject.perform(-1, project.owner.id, {}) subject.perform(-1, project.owner.id, {})
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment