projects.rb 15.1 KB
Newer Older
1 2
# frozen_string_literal: true

3
require_relative '../support/helpers/test_env'
4

5
FactoryBot.define do
6 7 8
  # Project without repository
  #
  # Project does not have bare repository.
9
  # Use this factory if you don't need repository in tests
10
  factory :project, class: 'Project' do
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
11 12
    sequence(:name) { |n| "project#{n}" }
    path { name.downcase.gsub(/\s/, '_') }
13 14

    # Behaves differently to nil due to cache_has_external_* methods.
15
    has_external_issue_tracker { false }
16
    has_external_wiki { false }
17

18 19
    # Associations
    namespace
20
    creator { group ? association(:user) : namespace&.owner }
21 22

    transient do
23
      # Nest Project Feature attributes
24 25 26 27
      wiki_access_level { ProjectFeature::ENABLED }
      builds_access_level { ProjectFeature::ENABLED }
      snippets_access_level { ProjectFeature::ENABLED }
      issues_access_level { ProjectFeature::ENABLED }
28
      forking_access_level { ProjectFeature::ENABLED }
29 30
      merge_requests_access_level { ProjectFeature::ENABLED }
      repository_access_level { ProjectFeature::ENABLED }
31
      analytics_access_level { ProjectFeature::ENABLED }
32 33 34
      pages_access_level do
        visibility_level == Gitlab::VisibilityLevel::PUBLIC ? ProjectFeature::ENABLED : ProjectFeature::PRIVATE
      end
35
      metrics_dashboard_access_level { ProjectFeature::PRIVATE }
36
      operations_access_level { ProjectFeature::ENABLED }
37 38 39

      # we can't assign the delegated `#ci_cd_settings` attributes directly, as the
      # `#ci_cd_settings` relation needs to be created first
40
      group_runners_enabled { nil }
41 42
      merge_pipelines_enabled { nil }
      merge_trains_enabled { nil }
43
      ci_keep_latest_artifact { nil }
44 45
      import_status { nil }
      import_jid { nil }
46 47
      import_correlation_id { nil }
      import_last_error { nil }
48
      forward_deployment_enabled { nil }
49
      restrict_user_defined_variables { nil }
50 51
    end

52
    before(:create) do |project, evaluator|
53 54 55 56
      # Builds and MRs can't have higher visibility level than repository access level.
      builds_access_level = [evaluator.builds_access_level, evaluator.repository_access_level].min
      merge_requests_access_level = [evaluator.merge_requests_access_level, evaluator.repository_access_level].min

57
      hash = {
58 59 60 61
        wiki_access_level: evaluator.wiki_access_level,
        builds_access_level: builds_access_level,
        snippets_access_level: evaluator.snippets_access_level,
        issues_access_level: evaluator.issues_access_level,
62
        forking_access_level: evaluator.forking_access_level,
63
        merge_requests_access_level: merge_requests_access_level,
64
        repository_access_level: evaluator.repository_access_level,
65
        pages_access_level: evaluator.pages_access_level,
66
        metrics_dashboard_access_level: evaluator.metrics_dashboard_access_level,
67 68
        operations_access_level: evaluator.operations_access_level,
        analytics_access_level: evaluator.analytics_access_level
69 70
      }

71 72
      project.build_project_feature(hash)
    end
73

74
    after(:create) do |project, evaluator|
75 76 77 78 79
      # Normally the class Projects::CreateService is used for creating
      # projects, and this class takes care of making sure the owner and current
      # user have access to the project. Our specs don't use said service class,
      # thus we must manually refresh things here.
      unless project.group || project.pending_delete
80
        project.add_maintainer(project.owner)
81 82 83
      end

      project.group&.refresh_members_authorized_projects
84 85

      # assign the delegated `#ci_cd_settings` attributes after create
86 87 88
      project.group_runners_enabled = evaluator.group_runners_enabled unless evaluator.group_runners_enabled.nil?
      project.merge_pipelines_enabled = evaluator.merge_pipelines_enabled unless evaluator.merge_pipelines_enabled.nil?
      project.merge_trains_enabled = evaluator.merge_trains_enabled unless evaluator.merge_trains_enabled.nil?
89 90
      project.ci_keep_latest_artifact = evaluator.ci_keep_latest_artifact unless evaluator.ci_keep_latest_artifact.nil?
      project.restrict_user_defined_variables = evaluator.restrict_user_defined_variables unless evaluator.restrict_user_defined_variables.nil?
91 92 93 94 95

      if evaluator.import_status
        import_state = project.import_state || project.build_import_state
        import_state.status = evaluator.import_status
        import_state.jid = evaluator.import_jid
96 97
        import_state.correlation_id_value = evaluator.import_correlation_id
        import_state.last_error = evaluator.import_last_error
98
        import_state.save!
99
      end
100 101
    end

Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
102
    trait :public do
103
      visibility_level { Gitlab::VisibilityLevel::PUBLIC }
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
104 105 106
    end

    trait :internal do
107
      visibility_level { Gitlab::VisibilityLevel::INTERNAL }
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
108 109 110
    end

    trait :private do
111
      visibility_level { Gitlab::VisibilityLevel::PRIVATE }
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
112
    end
113

114
    trait :import_scheduled do
115
      import_status { :scheduled }
116 117 118
    end

    trait :import_started do
119
      import_status { :started }
120 121 122
    end

    trait :import_finished do
123
      import_status { :finished }
124 125 126
    end

    trait :import_failed do
127
      import_status { :failed }
128 129
    end

130 131 132 133 134 135 136 137 138 139 140 141
    trait :jira_dvcs_cloud do
      before(:create) do |project|
        create(:project_feature_usage, :dvcs_cloud, project: project)
      end
    end

    trait :jira_dvcs_server do
      before(:create) do |project|
        create(:project_feature_usage, :dvcs_server, project: project)
      end
    end

142
    trait :archived do
143
      archived { true }
144 145
    end

146 147 148 149
    trait :last_repository_check_failed do
      last_repository_check_failed { true }
    end

150
    storage_version { Project::LATEST_STORAGE_VERSION }
151 152

    trait :legacy_storage do
153
      storage_version { nil }
154 155
    end

156 157
    trait :request_access_disabled do
      request_access_enabled { false }
158 159
    end

160
    trait :with_avatar do
161
      avatar { fixture_file_upload('spec/fixtures/dk.png') }
162 163
    end

164
    trait :with_export do
165 166 167 168 169
      after(:create) do |project, _evaluator|
        ProjectExportWorker.new.perform(project.creator.id, project.id)
      end
    end

170 171 172 173 174
    trait :broken_storage do
      after(:create) do |project|
        project.update_column(:repository_storage, 'broken')
      end
    end
175

176 177 178 179 180 181 182 183 184
    # Build a custom repository by specifying a hash of `filename => content` in
    # the transient `files` attribute. Each file will be created in its own
    # commit, operating against the master branch. So, the following call:
    #
    #     create(:project, :custom_repo, files: { 'foo/a.txt' => 'foo', 'b.txt' => bar' })
    #
    # will create a repository containing two files, and two commits, in master
    trait :custom_repo do
      transient do
185
        files { {} }
186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202
      end

      after :create do |project, evaluator|
        raise "Failed to create repository!" unless project.create_repository

        evaluator.files.each do |filename, content|
          project.repository.create_file(
            project.creator,
            filename,
            content,
            message: "Automatically created file #{filename}",
            branch_name: 'master'
          )
        end
      end
    end

203
    # Test repository - https://gitlab.com/gitlab-org/gitlab-test
204
    trait :repository do
205 206 207
      test_repo

      transient do
208
        create_templates { nil }
209
        create_branch { nil }
210 211 212
      end

      after :create do |project, evaluator|
213 214
        if evaluator.create_templates
          templates_path = "#{evaluator.create_templates}_templates"
215 216

          project.repository.create_file(
217 218
            project.creator,
            ".gitlab/#{templates_path}/bug.md",
219 220 221 222
            'something valid',
            message: 'test 3',
            branch_name: 'master')
          project.repository.create_file(
223 224
            project.creator,
            ".gitlab/#{templates_path}/template_test.md",
225 226 227 228
            'template_test',
            message: 'test 1',
            branch_name: 'master')
          project.repository.create_file(
229 230
            project.creator,
            ".gitlab/#{templates_path}/feature_proposal.md",
231 232 233 234
            'feature_proposal',
            message: 'test 2',
            branch_name: 'master')
        end
235 236 237 238 239 240 241 242 243 244

        if evaluator.create_branch
          project.repository.create_file(
            project.creator,
            'README.md',
            "README on branch #{evaluator.create_branch}",
            message: 'Add README.md',
            branch_name: evaluator.create_branch)

        end
245
      end
246 247
    end

248 249
    trait :empty_repo do
      after(:create) do |project|
250
        raise "Failed to create repository!" unless project.create_repository
251 252
      end
    end
253

254 255 256 257 258 259
    trait :design_repo do
      after(:create) do |project|
        raise 'Failed to create design repository!' unless project.design_repository.create_if_not_exists
      end
    end

260 261
    trait :remote_mirror do
      transient do
262 263 264
        remote_name { "remote_mirror_#{SecureRandom.hex}" }
        url { "http://foo.com" }
        enabled { true }
265 266 267 268 269 270
      end
      after(:create) do |project, evaluator|
        project.remote_mirrors.create!(url: evaluator.url, enabled: evaluator.enabled)
      end
    end

271 272 273 274
    trait :stubbed_repository do
      after(:build) do |project|
        allow(project).to receive(:empty_repo?).and_return(false)
        allow(project.repository).to receive(:empty?).and_return(false)
275 276
      end
    end
277

278 279 280 281 282 283
    trait :wiki_repo do
      after(:create) do |project|
        raise 'Failed to create wiki repository!' unless project.create_wiki
      end
    end

284
    trait :read_only do
285
      repository_read_only { true }
286 287
    end

288 289
    trait :broken_repo do
      after(:create) do |project|
290
        TestEnv.rm_storage_dir(project.repository_storage, "#{project.disk_path}.git/refs")
291 292 293
      end
    end

294 295
    trait :test_repo do
      after :create do |project|
296 297 298
        TestEnv.copy_repo(project,
          bare_repo: TestEnv.factory_repo_path_bare,
          refs: TestEnv::BRANCH_SHA)
299 300 301
      end
    end

302 303 304 305 306 307
    trait :with_import_url do
      import_finished

      import_url { generate(:url) }
    end

308 309 310 311 312 313 314 315 316 317 318 319
    trait(:wiki_enabled)            { wiki_access_level { ProjectFeature::ENABLED } }
    trait(:wiki_disabled)           { wiki_access_level { ProjectFeature::DISABLED } }
    trait(:wiki_private)            { wiki_access_level { ProjectFeature::PRIVATE } }
    trait(:builds_enabled)          { builds_access_level { ProjectFeature::ENABLED } }
    trait(:builds_disabled)         { builds_access_level { ProjectFeature::DISABLED } }
    trait(:builds_private)          { builds_access_level { ProjectFeature::PRIVATE } }
    trait(:snippets_enabled)        { snippets_access_level { ProjectFeature::ENABLED } }
    trait(:snippets_disabled)       { snippets_access_level { ProjectFeature::DISABLED } }
    trait(:snippets_private)        { snippets_access_level { ProjectFeature::PRIVATE } }
    trait(:issues_disabled)         { issues_access_level { ProjectFeature::DISABLED } }
    trait(:issues_enabled)          { issues_access_level { ProjectFeature::ENABLED } }
    trait(:issues_private)          { issues_access_level { ProjectFeature::PRIVATE } }
320 321 322
    trait(:forking_disabled)         { forking_access_level { ProjectFeature::DISABLED } }
    trait(:forking_enabled)          { forking_access_level { ProjectFeature::ENABLED } }
    trait(:forking_private)          { forking_access_level { ProjectFeature::PRIVATE } }
323 324 325 326 327 328 329 330 331 332 333
    trait(:merge_requests_enabled)  { merge_requests_access_level { ProjectFeature::ENABLED } }
    trait(:merge_requests_disabled) { merge_requests_access_level { ProjectFeature::DISABLED } }
    trait(:merge_requests_private)  { merge_requests_access_level { ProjectFeature::PRIVATE } }
    trait(:merge_requests_public)   { merge_requests_access_level { ProjectFeature::PUBLIC } }
    trait(:repository_enabled)      { repository_access_level { ProjectFeature::ENABLED } }
    trait(:repository_disabled)     { repository_access_level { ProjectFeature::DISABLED } }
    trait(:repository_private)      { repository_access_level { ProjectFeature::PRIVATE } }
    trait(:pages_public)            { pages_access_level { ProjectFeature::PUBLIC } }
    trait(:pages_enabled)           { pages_access_level { ProjectFeature::ENABLED } }
    trait(:pages_disabled)          { pages_access_level { ProjectFeature::DISABLED } }
    trait(:pages_private)           { pages_access_level { ProjectFeature::PRIVATE } }
334 335 336
    trait(:metrics_dashboard_enabled) { metrics_dashboard_access_level { ProjectFeature::ENABLED } }
    trait(:metrics_dashboard_disabled) { metrics_dashboard_access_level { ProjectFeature::DISABLED } }
    trait(:metrics_dashboard_private) { metrics_dashboard_access_level { ProjectFeature::PRIVATE } }
337 338 339
    trait(:operations_enabled)           { operations_access_level { ProjectFeature::ENABLED } }
    trait(:operations_disabled)          { operations_access_level { ProjectFeature::DISABLED } }
    trait(:operations_private)           { operations_access_level { ProjectFeature::PRIVATE } }
340 341 342
    trait(:analytics_enabled)           { analytics_access_level { ProjectFeature::ENABLED } }
    trait(:analytics_disabled)          { analytics_access_level { ProjectFeature::DISABLED } }
    trait(:analytics_private)           { analytics_access_level { ProjectFeature::PRIVATE } }
343 344 345 346

    trait :auto_devops do
      association :auto_devops, factory: :project_auto_devops
    end
347 348 349 350

    trait :auto_devops_disabled do
      association :auto_devops, factory: [:project_auto_devops, :disabled]
    end
351 352 353 354 355 356

    trait :without_container_expiration_policy do
      after :create do |project|
        project.container_expiration_policy.destroy!
      end
    end
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
357 358
  end

359 360 361 362 363 364 365 366
  trait :service_desk_disabled do
    service_desk_enabled { nil }
  end

  trait(:service_desk_enabled) do
    service_desk_enabled { true }
  end

367 368 369 370
  # Project with empty repository
  #
  # This is a case when you just created a project
  # but not pushed any code there yet
371
  factory :project_empty_repo, parent: :project do
372
    empty_repo
373 374
  end

375 376 377
  # Project with broken repository
  #
  # Project with an invalid repository state
378
  factory :project_broken_repo, parent: :project do
379 380 381
    broken_repo
  end

382
  factory :forked_project_with_submodules, parent: :project do
383 384 385
    path { 'forked-gitlabhq' }

    after :create do |project|
386 387 388
      TestEnv.copy_repo(project,
        bare_repo: TestEnv.forked_repo_path_bare,
        refs: TestEnv::FORKED_BRANCH_SHA)
389 390 391
    end
  end

Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
392
  factory :redmine_project, parent: :project do
393
    has_external_issue_tracker { true }
394

395
    redmine_service
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
396
  end
397

Yauhen Kotau's avatar
Yauhen Kotau committed
398
  factory :youtrack_project, parent: :project do
399
    has_external_issue_tracker { true }
Yauhen Kotau's avatar
Yauhen Kotau committed
400

401
    youtrack_service
Yauhen Kotau's avatar
Yauhen Kotau committed
402 403
  end

404
  factory :jira_project, parent: :project do
405
    has_external_issue_tracker { true }
406

407
    jira_service
408
  end
409

410
  factory :prometheus_project, parent: :project do
411 412 413 414
    after :create do |project|
      project.create_prometheus_service(
        active: true,
        properties: {
415
          api_url: 'https://prometheus.example.com/',
416
          manual_configuration: true
417 418 419 420
        }
      )
    end
  end
421

422 423 424 425 426 427
  factory :ewm_project, parent: :project do
    has_external_issue_tracker { true }

    ewm_service
  end

428 429 430 431 432 433
  factory :project_with_design, parent: :project do
    after(:create) do |project|
      issue = create(:issue, project: project)
      create(:design, project: project, issue: issue)
    end
  end
434 435 436 437

  trait :in_subgroup do
    namespace factory: [:group, :nested]
  end
Dmitriy Zaporozhets's avatar
Dmitriy Zaporozhets committed
438
end