ee/spec/requests/api/members_spec.rb (1,894 lines of code) (raw):

# frozen_string_literal: true require 'spec_helper' RSpec.describe API::Members, feature_category: :groups_and_projects do include EE::API::Helpers::MembersHelpers context 'group members endpoints for group with minimal access feature' do let_it_be(:group) { create(:group) } let_it_be(:subgroup) { create(:group, parent: group) } let_it_be(:minimal_access_member) { create(:group_member, :minimal_access, source: group) } let_it_be(:owner) { create(:user) } let_it_be(:admin) { create(:admin) } before do group.add_owner(owner) subgroup.add_owner(owner) end describe "GET /groups/:id/members" do subject do get api("/groups/#{group.id}/members", owner) json_response end it 'returns user with minimal access when feature is available' do stub_licensed_features(minimal_access_role: true) expect(subject.map { |u| u['id'] }).to match_array [owner.id, minimal_access_member.user_id] end it 'does not return user with minimal access when feature is unavailable' do stub_licensed_features(minimal_access_role: false) expect(subject.map { |u| u['id'] }).not_to include(minimal_access_member.user_id) end end describe 'POST /groups/:id/members' do let_it_be(:stranger) { create(:user) } let(:access_level) { Gitlab::Access::GUEST } subject(:post_members) do post api("/groups/#{group.id}/members", owner), params: { user_id: stranger.id, access_level: access_level } end context 'with free user cap considerations', :saas do let_it_be(:group) { create(:group_with_plan, :private, plan: :free_plan) } before do stub_ee_application_setting(dashboard_limit_enabled: true) end shared_examples 'does not add members' do it 'does not add the member' do expect do post_members end.not_to change { group.members.count } msg = "cannot be added since you've reached your #{::Namespaces::FreeUserCap.dashboard_limit} " \ "member limit for #{group.name}" expect(response).to have_gitlab_http_status(:bad_request) expect(json_response['message']).to eq({ 'base' => [msg] }) end end context 'when there are at the size limit' do before do stub_ee_application_setting(dashboard_limit: 1) end it_behaves_like 'does not add members' end context 'when there are over the limit' do it_behaves_like 'does not add members' end context 'when there is a seat left' do before do stub_ee_application_setting(dashboard_limit: 3) end it 'creates a member' do expect { post_members }.to change { group.members.count }.by(1) expect(response).to have_gitlab_http_status(:created) expect(json_response['id']).to eq(stranger.id) end end end context 'with minimal access concerns' do let(:access_level) { Member::MINIMAL_ACCESS } context 'when minimal access license is not available' do it 'does not create a member' do expect do post_members end.not_to change { group.all_group_members.count } expect(response).to have_gitlab_http_status(:bad_request) expect(json_response['message']).to eq({ 'access_level' => ['is not included in the list', 'not supported by license'] }) end end context 'when minimal access license is available' do before do stub_licensed_features(minimal_access_role: true) end it 'creates a member' do expect do post_members end.to change { group.all_group_members.count }.by(1) expect(response).to have_gitlab_http_status(:created) expect(json_response['id']).to eq(stranger.id) end it 'cannot be assigned to subgroup' do expect do post api("/groups/#{subgroup.id}/members", owner), params: { user_id: stranger.id, access_level: access_level } end.not_to change { subgroup.all_group_members.count } expect(response).to have_gitlab_http_status(:bad_request) expect(json_response['message']).to eq({ 'access_level' => ['is not included in the list', 'supported on top level groups only'] }) end end end end describe 'PUT /groups/:id/members/:user_id' do let(:expires_at) { 2.days.from_now.to_date } let(:params) { {} } let(:current_user) { owner } subject(:put_member) do put( api("/#{member.source.class.name.downcase}s/#{member.source_id}/members/#{user_id}", current_user), params: params ) end context 'when setting minimal access role' do let(:member) { minimal_access_member } let(:user_id) { minimal_access_member.user_id } let(:params) { { expires_at: expires_at, access_level: Member::MINIMAL_ACCESS } } context 'when minimal access role license is available' do before do stub_licensed_features(minimal_access_role: true) end it 'updates the member' do put_member expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(minimal_access_member.user_id) expect(json_response['expires_at']).to eq(expires_at.to_s) end end context 'when minimal access role license is not available' do before do stub_licensed_features(minimal_access_role: false) end it 'does not update the member' do put_member expect(response).to have_gitlab_http_status(:not_found) end end end context 'when member_role_id param is present' do let_it_be(:member_role) { create(:member_role, :guest, namespace: group) } let_it_be(:member) { create(:group_member, :guest, source: group) } let(:user_id) { member.user_id } let(:params) { { member_role_id: member_role.id, access_level: Member::GUEST } } shared_examples 'a successful member role update' do it 'updates the member_role' do put_member expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(member.user_id) expect(json_response['member_role']['id']).to eq(member_role.id) end end context "when custom roles license is enabled" do before do stub_licensed_features(custom_roles: true) end context 'when on SaaS' do before do stub_saas_features(gitlab_com_subscriptions: true) end context 'when member_role is associated with membership group' do it_behaves_like 'a successful member role update' end context 'when member_role is associated with root group of subgroup membership' do let(:subgroup) { create(:group, parent: group) } let(:member) { create(:group_member, :guest, source: subgroup) } it_behaves_like 'a successful member role update' end context 'when member_role is associated with root group of project membership' do let_it_be(:project) { create(:project, group: subgroup) } let(:member) { create(:project_member, :guest, source: project) } it_behaves_like 'a successful member role update' end context "when member_role has base_access_level that does not match user's access_level" do let(:member_role) { create(:member_role, :developer, namespace: group) } let(:params) { { member_role_id: member_role.id, access_level: Member::GUEST } } it 'raises an error' do put_member expect(response).to have_gitlab_http_status(:bad_request) expect(json_response['message']['member_role_id']).to contain_exactly( "the custom role's base access level does not match the current access level" ) end end context 'when member_role is not associated with root group of member source' do let_it_be(:member_role) { create(:member_role, :guest, namespace: create(:group)) } it 'raises an error' do put_member expect(response).to have_gitlab_http_status(:bad_request) expect(json_response['message']['member_role']).to contain_exactly('not found') end end context "when invalid member_role_id" do let(:params) { { member_role_id: non_existing_record_id, access_level: Member::GUEST } } it "returns 400" do put_member expect(response).to have_gitlab_http_status(:bad_request) expect(json_response['message']['member_role']).to contain_exactly('not found') end end context 'when member_role_id is nil' do let(:params) { { member_role_id: nil, access_level: Member::REPORTER } } it 'unsets the member_role_id attribute for the member' do member.update!(member_role: member_role) put_member expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(member.user_id) expect(json_response['member_role']).to eq(nil) expect(json_response['access_level']).to eq(Member::REPORTER) end end end context 'when on self-managed' do before do stub_saas_features(gitlab_com_subscriptions: false) end context 'when member_role is created on the instance-level' do let_it_be(:member_role) { create(:member_role, :guest, :instance) } it_behaves_like 'a successful member role update' end end end context "when custom roles license is disabled" do before do stub_licensed_features(custom_roles: false) end it "ignores the member_role_id param" do put_member expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(member.user_id) expect(json_response['access_level']).to eq(Member::GUEST) expect(json_response['member_role']).to eq(nil) end end end describe 'DELETE /groups/:id/members/:user_id' do context 'when minimal access role is available' do before do stub_licensed_features(minimal_access_role: true) end it 'deletes the member' do expect do delete api("/groups/#{group.id}/members/#{minimal_access_member.user_id}", owner) end.to change { group.all_group_members.count }.by(-1) expect(response).to have_gitlab_http_status(:no_content) end context 'with add-on seat assignments' do context 'when on self managed' do it 'does not enqueue CleanupUserAddOnAssignmentWorker' do expect(GitlabSubscriptions::AddOnPurchases::CleanupUserAddOnAssignmentWorker) .not_to receive(:perform_async) delete api("/groups/#{group.id}/members/#{minimal_access_member.user_id}", owner) end end context 'when on saas', :saas do it 'enqueues CleanupUserAddOnAssignmentWorker' do expect(GitlabSubscriptions::AddOnPurchases::CleanupUserAddOnAssignmentWorker) .to receive(:perform_async).with(group.id, minimal_access_member.user_id).and_call_original delete api("/groups/#{group.id}/members/#{minimal_access_member.user_id}", owner) end end end end context 'when minimal access role is not available' do it 'does not delete the member' do expect do delete api("/groups/#{group.id}/members/#{minimal_access_member.id}", owner) expect(response).to have_gitlab_http_status(:not_found) end.not_to change { group.all_group_members.count } end end end end describe 'GET /groups/:id/members/:user_id' do context 'when minimal access role is available' do it 'shows the member' do stub_licensed_features(minimal_access_role: true) get api("/groups/#{group.id}/members/#{minimal_access_member.user_id}", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(minimal_access_member.user_id) end end context 'when minimal access role is not available' do it 'does not show the member' do get api("/groups/#{group.id}/members/#{minimal_access_member.id}", owner) expect(response).to have_gitlab_http_status(:not_found) end end end end context 'group members endpoint for enterprise users', :saas do let(:group) { create(:group) } let(:owner) { create(:user) } before do stub_licensed_features(domain_verification: true) group.add_owner(owner) end include_context 'group with enterprise users in group members' include_context 'group with enterprise users from another group in group members' subject do get api(url, owner) json_response end describe 'GET /groups/:id/members' do let(:url) { "/groups/#{group.id}/members" } context 'for regular user' do it_behaves_like 'members response with hidden email' do let(:email) { user_member.email } end end context 'for enterprise user' do it_behaves_like 'members response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do it_behaves_like 'members response with hidden email' do let(:email) { enterprise_user_member_from_another_group.email } end end it 'avoids N+1 database queries' do # warm up get api(url, owner) control = ActiveRecord::QueryRecorder.new do get api(url, owner) end group.add_developer(create(:user)) group.add_developer(create(:enterprise_user, enterprise_group: group)) group.add_developer(create(:enterprise_user, enterprise_group: create(:group))) subgroup = create(:group, parent: group) subgroup.add_developer(create(:user)) subgroup.add_developer(create(:enterprise_user, enterprise_group: group)) subgroup.add_developer(create(:enterprise_user, enterprise_group: create(:group))) project = create(:project, group: group) project.add_developer(create(:user)) project.add_developer(create(:enterprise_user, enterprise_group: group)) project.add_developer(create(:enterprise_user, enterprise_group: create(:group))) expect do get api(url, owner) end.not_to exceed_query_limit(control) end end describe 'GET /groups/:id/members/:user_id' do let(:url) { "/groups/#{group.id}/members/#{user_id}" } context 'for regular user' do let(:user_id) { user_member.id } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user_id) { enterprise_user_member.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do let(:user_id) { enterprise_user_member_from_another_group.id } it_behaves_like 'member response with hidden email' end end describe 'GET /groups/:id/members/all' do include_context 'subgroup with enterprise users in group members' context 'top-level group' do let(:url) { "/groups/#{group.id}/members/all" } context 'for regular user' do it_behaves_like 'members response with hidden email' do let(:email) { user_member.email } end end context 'for enterprise user' do it_behaves_like 'members response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do it_behaves_like 'members response with hidden email' do let(:email) { enterprise_user_member_from_another_group.email } end end end context 'subgroup' do let(:url) { "/groups/#{subgroup.id}/members/all" } context 'for regular user' do it_behaves_like 'members response with hidden email' do let(:email) { user_member.email } end context 'when direct member' do it_behaves_like 'members response with hidden email' do let(:email) { user_member_in_subgroup.email } end end end context 'for enterprise user' do it_behaves_like 'members response with exposed email' do let(:email) { enterprise_user_member.email } end context 'when direct member' do it_behaves_like 'members response with exposed email' do let(:email) { enterprise_user_member_in_subgroup.email } end end end context 'for enterprise user from another group' do it_behaves_like 'members response with hidden email' do let(:email) { enterprise_user_member_from_another_group.email } end end it 'avoids N+1 database queries' do # warm up get api(url, owner) control = ActiveRecord::QueryRecorder.new do get api(url, owner) end group.add_developer(create(:user)) group.add_developer(create(:enterprise_user, enterprise_group: group)) group.add_developer(create(:enterprise_user, enterprise_group: create(:group))) subgroup.add_developer(create(:user)) subgroup.add_developer(create(:enterprise_user, enterprise_group: group)) subgroup.add_developer(create(:enterprise_user, enterprise_group: create(:group))) expect do get api(url, owner) end.not_to exceed_query_limit(control) end end end describe 'GET /groups/:id/members/all/:user_id' do include_context 'subgroup with enterprise users in group members' context 'top-level group' do let(:url) { "/groups/#{group.id}/members/all/#{user_id}" } context 'for regular user' do let(:user_id) { user_member.id } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user_id) { enterprise_user_member.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do let(:user_id) { enterprise_user_member_from_another_group.id } it_behaves_like 'member response with hidden email' end end context 'subgroup' do let(:url) { "/groups/#{subgroup.id}/members/all/#{user_id}" } context 'for regular user' do let(:user_id) { user_member.id } it_behaves_like 'member response with hidden email' context 'when direct member' do let(:user_id) { user_member_in_subgroup.id } it_behaves_like 'member response with hidden email' end end context 'for enterprise user' do let(:user_id) { enterprise_user_member.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member.email } end context 'when direct member' do let(:user_id) { enterprise_user_member_in_subgroup.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member_in_subgroup.email } end end end end end describe 'POST /groups/:id/members' do let(:url) { "/groups/#{group.id}/members" } subject do post api(url, owner), params: { user_id: user.id, access_level: Gitlab::Access::GUEST } expect(response).to have_gitlab_http_status(:created) json_response end context 'for regular user' do let(:user) { create(:user) } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user) { create(:enterprise_user, enterprise_group: group) } it_behaves_like 'member response with exposed email' do let(:email) { user.email } end end context 'for enterprise user from another group' do let(:user) { create(:enterprise_user, enterprise_group: another_group) } it_behaves_like 'member response with hidden email' end context 'when block seat overages is enabled and there are no seats left in the group' do before do group.namespace_settings.update!(seat_control: :block_overages) create(:gitlab_subscription, :premium, namespace: group, seats: 1) end it 'rejects the request' do user = create(:user) post api(url, owner), params: { user_id: user.id, access_level: Gitlab::Access::GUEST } expect(response).to have_gitlab_http_status(:bad_request) expect(json_response).to eq({ 'message' => 'There are not enough available seats to invite this many users.', 'status' => 'error', 'reason' => 'seat_limit_exceeded_error' }) end end end describe 'PUT /groups/:id/members/:user_id' do let(:url) { "/groups/#{group.id}/members/#{user_id}" } subject do put api(url, owner), params: { access_level: Gitlab::Access::GUEST } expect(response).to have_gitlab_http_status(:ok) json_response end context 'for regular user' do let(:user_id) { user_member.id } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user_id) { enterprise_user_member.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do let(:user_id) { enterprise_user_member_from_another_group.id } it_behaves_like 'member response with hidden email' end end context 'group with LDAP group link' do include LdapHelpers let(:group) { create(:group_with_ldap_group_link) } let(:ldap_user) { create(:user) } before do stub_ldap_setting(enabled: true) create(:group_member, :developer, group: group, user: ldap_user, ldap: true) end describe 'POST /groups/:id/members/:user_id/override' do let(:url) { "/groups/#{group.id}/members/#{ldap_user.id}/override" } subject do post api(url, owner) expect(response).to have_gitlab_http_status(:created) json_response end context 'for regular user' do it_behaves_like 'member response with hidden email' end context 'for enterprise user' do before do ldap_user.user_detail.update!(enterprise_group: group) end it_behaves_like 'member response with exposed email' do let(:email) { ldap_user.email } end end context 'for enterprise user from another group' do before do ldap_user.user_detail.update!(enterprise_group: another_group) end it_behaves_like 'member response with hidden email' end end describe 'DELETE /groups/:id/members/:user_id/override' do let(:url) { "/groups/#{group.id}/members/#{ldap_user.id}/override" } subject do delete api(url, owner) expect(response).to have_gitlab_http_status(:ok) json_response end context 'for regular user' do it_behaves_like 'member response with hidden email' end context 'for enterprise user' do before do ldap_user.user_detail.update!(enterprise_group: group) end it_behaves_like 'member response with exposed email' do let(:email) { ldap_user.email } end end context 'for enterprise user from another group' do before do ldap_user.user_detail.update!(enterprise_group: another_group) end it_behaves_like 'member response with hidden email' end end end describe 'GET /groups/:id/billable_members', feature_category: :seat_cost_management do let(:url) { "/groups/#{group.id}/billable_members" } context 'for regular user' do it_behaves_like 'members response with hidden email' do let(:email) { user_member.email } end end context 'for enterprise user' do it_behaves_like 'members response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do it_behaves_like 'members response with hidden email' do let(:email) { enterprise_user_member_from_another_group.email } end end it 'avoids N+1 database queries' do # warm up get api(url, owner) control = ActiveRecord::QueryRecorder.new do get api(url, owner) end group.add_developer(create(:user)) group.add_developer(create(:enterprise_user, enterprise_group: group)) group.add_developer(create(:enterprise_user, enterprise_group: create(:group))) subgroup = create(:group, parent: group) subgroup.add_developer(create(:user)) subgroup.add_developer(create(:enterprise_user, enterprise_group: group)) subgroup.add_developer(create(:enterprise_user, enterprise_group: create(:group))) project = create(:project, group: group) project.add_developer(create(:user)) project.add_developer(create(:enterprise_user, enterprise_group: group)) project.add_developer(create(:enterprise_user, enterprise_group: create(:group))) expect do get api(url, owner) end.not_to exceed_query_limit(control) end end end context 'project members endpoint for enterprise users', :saas do let(:group) { create(:group) } let(:owner) { create(:user) } let(:project) { create(:project, group: group) } before do stub_licensed_features(domain_verification: true) group.add_owner(owner) end include_context 'project with enterprise users in project members' include_context 'project with enterprise users from another group in project members' subject do get api(url, owner) json_response end describe 'GET /projects/:id/members' do let(:url) { "/projects/#{project.id}/members" } context 'for regular user' do it_behaves_like 'members response with hidden email' do let(:email) { user_member.email } end end context 'for enterprise user' do it_behaves_like 'members response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do it_behaves_like 'members response with hidden email' do let(:email) { enterprise_user_member_from_another_group.email } end end it 'avoids N+1 database queries' do # warm up get api(url, owner) control = ActiveRecord::QueryRecorder.new do get api(url, owner) end group.add_developer(create(:user)) group.add_developer(create(:enterprise_user, enterprise_group: group)) group.add_developer(create(:enterprise_user, enterprise_group: create(:group))) project.add_developer(create(:user)) project.add_developer(create(:enterprise_user, enterprise_group: group)) project.add_developer(create(:enterprise_user, enterprise_group: create(:group))) expect do get api(url, owner) end.not_to exceed_query_limit(control) end end describe 'GET /projects/:id/members/:user_id' do let(:url) { "/projects/#{project.id}/members/#{user_id}" } context 'for regular user' do let(:user_id) { user_member.id } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user_id) { enterprise_user_member.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do let(:user_id) { enterprise_user_member_from_another_group.id } it_behaves_like 'member response with hidden email' end end describe 'GET /projects/:id/members/all' do let(:url) { "/projects/#{project.id}/members/all" } context 'for regular user' do it_behaves_like 'members response with hidden email' do let(:email) { user_member.email } end end context 'for enterprise user' do it_behaves_like 'members response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do it_behaves_like 'members response with hidden email' do let(:email) { enterprise_user_member_from_another_group.email } end end it 'avoids N+1 database queries' do # warm up get api(url, owner) control = ActiveRecord::QueryRecorder.new do get api(url, owner) end group.add_developer(create(:user)) group.add_developer(create(:enterprise_user, enterprise_group: group)) group.add_developer(create(:enterprise_user, enterprise_group: create(:group))) project.add_developer(create(:user)) project.add_developer(create(:enterprise_user, enterprise_group: group)) project.add_developer(create(:enterprise_user, enterprise_group: create(:group))) expect do get api(url, owner) end.not_to exceed_query_limit(control) end end describe 'GET /projects/:id/members/all/:user_id' do let(:url) { "/projects/#{project.id}/members/all/#{user_id}" } context 'for regular user' do let(:user_id) { user_member.id } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user_id) { enterprise_user_member.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do let(:user_id) { enterprise_user_member_from_another_group.id } it_behaves_like 'member response with hidden email' end end describe 'POST /projects/:id/members' do let(:url) { "/projects/#{project.id}/members" } subject do post api(url, owner), params: { user_id: user.id, access_level: Gitlab::Access::GUEST } expect(response).to have_gitlab_http_status(:created) json_response end context 'for regular user' do let(:user) { create(:user) } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user) { create(:enterprise_user, enterprise_group: group) } it_behaves_like 'member response with exposed email' do let(:email) { user.email } end end context 'for enterprise user from another group' do let(:user) { create(:enterprise_user, enterprise_group: another_group) } it_behaves_like 'member response with hidden email' end end describe 'PUT /projects/:id/members/:user_id' do let(:url) { "/projects/#{project.id}/members/#{user_id}" } subject do put api(url, owner), params: { access_level: Gitlab::Access::GUEST } expect(response).to have_gitlab_http_status(:ok) json_response end context 'for regular user' do let(:user_id) { user_member.id } it_behaves_like 'member response with hidden email' end context 'for enterprise user' do let(:user_id) { enterprise_user_member.id } it_behaves_like 'member response with exposed email' do let(:email) { enterprise_user_member.email } end end context 'for enterprise user from another group' do let(:user_id) { enterprise_user_member_from_another_group.id } it_behaves_like 'member response with hidden email' end end end context 'billable member endpoints' do let_it_be(:owner) { create(:user) } let_it_be(:maintainer) { create(:user) } let_it_be(:group) do create(:group) do |group| group.add_owner(owner) group.add_maintainer(maintainer) end end let_it_be(:nested_user) { create(:user, name: 'Scott Anderson') } let_it_be(:nested_group) do create(:group, parent: group) do |nested_group| nested_group.add_developer(nested_user) end end describe 'GET /groups/:id/billable_members', feature_category: :seat_cost_management do let(:url) { "/groups/#{group.id}/billable_members" } let(:current_user) { owner } let(:params) { {} } subject(:get_billable_members) do get api(url, current_user), params: params json_response end context 'with sub group and projects' do let_it_be(:project_user) { create(:user) } let_it_be(:project) do create(:project, :public, group: nested_group) do |project| project.add_developer(project_user) end end let_it_be(:linked_group_user) { create(:user, name: 'Scott McNeil') } let_it_be(:linked_group) do create(:group) do |linked_group| linked_group.add_developer(linked_group_user) end end let_it_be(:project_group_link) { create(:project_group_link, project: project, group: linked_group) } it 'returns paginated billable users' do get_billable_members expect_paginated_array_response(*[owner, maintainer, nested_user, project_user, linked_group_user].map(&:id)) end context 'when the current user does not have the :read_billable_member ability' do it 'is a bad request' do not_an_owner = create(:user) get api(url, not_an_owner), params: params expect(response).to have_gitlab_http_status(:bad_request) end end context 'with search params provided' do let(:params) { { search: nested_user.name } } it 'returns the relevant billable users' do get_billable_members expect_paginated_array_response([nested_user.id]) end end context 'with search and sort params provided' do it 'accepts only sorting options defined in a list' do EE::API::Helpers::MembersHelpers.member_sort_options.each do |sorting| get api(url, owner), params: { search: 'name', sort: sorting } expect(response).to have_gitlab_http_status(:ok) end end it 'does not accept query string not defined in a list' do defined_query_strings = EE::API::Helpers::MembersHelpers.member_sort_options sorting = 'fake_sorting' get api(url, owner), params: { search: 'name', sort: sorting } expect(defined_query_strings).not_to include(sorting) expect(response).to have_gitlab_http_status(:bad_request) end context 'when a specific sorting is provided' do let(:params) { { search: 'Scott', sort: 'name_desc' } } it 'returns the relevant billable users' do get_billable_members expect_paginated_array_response(*[linked_group_user, nested_user].map(&:id)) end end end context 'when sorting users' do let_it_be(:sort_group) { create :group } let_it_be(:last_activity_on_date) { Date.today - 1.day } let_it_be(:user1) { create(:user, last_activity_on: Date.today, current_sign_in_at: DateTime.now - 4.days) } let_it_be(:user2) { create(:user, last_activity_on: last_activity_on_date, current_sign_in_at: DateTime.now - 3.days) } let_it_be(:user3) { create(:user, last_activity_on: last_activity_on_date, current_sign_in_at: DateTime.now - 2.days) } let_it_be(:user4) { create(:user, last_activity_on: last_activity_on_date, current_sign_in_at: DateTime.now - 1.day) } let_it_be(:url) { "/groups/#{sort_group.id}/billable_members" } let_it_be(:owner) { user1 } before do sort_group.add_owner(user1) [user2, user3, user4].each { |user| sort_group.add_developer(user) } end context 'with sort param last_activity_on_desc' do let(:params) { { sort: 'last_activity_on_desc', per_page: 1, page: 2 } } it 'returns paginated users in deterministic order to avoid duplicates and flaky behavior' do get_billable_members expect_paginated_array_response(user2.id) end end context 'with sort param recent_sign_in' do let(:params) { { sort: 'recent_sign_in', per_page: 5, page: 1 } } it 'returns paginated users sorted by last_login_at in desc order' do get_billable_members expect(Time.parse(json_response[0]["last_login_at"])).to be_like_time(user4.current_sign_in_at) expect_paginated_array_response(user4.id, user3.id, user2.id, user1.id) end end context 'with sort param oldest_sign_in' do let(:params) { { sort: 'oldest_sign_in', per_page: 5, page: 1 } } it 'returns paginated users sorted by last_login_at in asc order' do get_billable_members expect(Time.parse(json_response[0]["last_login_at"])).to be_like_time(user1.current_sign_in_at) expect_paginated_array_response(user1.id, user2.id, user3.id, user4.id) end end end end context 'with non owner' do it 'returns error' do get api(url, maintainer) expect(response).to have_gitlab_http_status(:bad_request) end end context 'when group can not be found' do let(:url) { "/groups/foo/billable_members" } it 'returns error' do get api(url, owner) expect(response).to have_gitlab_http_status(:not_found) expect(json_response['message']).to eq('404 Group Not Found') end end context 'with non-root group' do let(:child_group) { create :group, parent: group } let(:url) { "/groups/#{child_group.id}/billable_members" } it 'returns error' do get_billable_members expect(response).to have_gitlab_http_status(:bad_request) end end context 'email' do let_it_be(:member) { create(:group_member, :developer, group: group) } context 'when member has a public_email' do let_it_be(:member_public_email) { create(:email, :confirmed, user: member.user, email: 'member-public-email@example.com') } before do member.user.update!(public_email: member_public_email.email) end it { is_expected.to include(a_hash_including('email' => member.user.public_email)) } end context 'when member has no public_email' do before do member.user.update!(public_email: nil) end it { is_expected.to include(a_hash_including('email' => nil)) } end context 'when the current_user is an admin', :enable_admin_mode do let_it_be(:current_user) { create(:user, :admin) } it { is_expected.to include(a_hash_including('email' => member.user.email)) } end end end describe 'GET /groups/:id/billable_members/:user_id/memberships', feature_category: :seat_cost_management do let_it_be(:developer) { create(:user) } let_it_be(:guest) { create(:user) } before_all do group.add_developer(developer) group.add_guest(guest) end it 'returns memberships for the billable group member' do membership = developer.members.first get api("/groups/#{group.id}/billable_members/#{developer.id}/memberships", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to eq([{ 'id' => membership.id, 'source_id' => group.id, 'source_full_name' => group.full_name, 'source_members_url' => group_group_members_url(group), 'created_at' => membership.created_at.as_json, 'expires_at' => nil, 'access_level' => { 'string_value' => 'Developer', 'integer_value' => 30, 'custom_role' => nil } }]) end it 'returns not found when the user does not exist' do get api("/groups/#{group.id}/billable_members/#{non_existing_record_id}/memberships", owner) expect(response).to have_gitlab_http_status(:not_found) expect(json_response).to eq({ 'message' => '404 Not found' }) end it 'returns not found when the group does not exist' do get api("/groups/#{non_existing_record_id}/billable_members/#{developer.id}/memberships", owner) expect(response).to have_gitlab_http_status(:not_found) expect(json_response).to eq({ 'message' => '404 Group Not Found' }) end it 'returns not found when the user is not billable', :saas do create(:gitlab_subscription, :ultimate, namespace: group) get api("/groups/#{group.id}/billable_members/#{guest.id}/memberships", owner) expect(response).to have_gitlab_http_status(:not_found) expect(json_response).to eq({ 'message' => '404 User Not Found' }) end it 'returns bad request if the user cannot admin group members' do get api("/groups/#{group.id}/billable_members/#{developer.id}/memberships", developer) expect(response).to have_gitlab_http_status(:bad_request) expect(json_response).to eq({ 'message' => '400 Bad request' }) end it 'returns bad request if the group is a subgroup' do subgroup = create(:group, name: 'My SubGroup', parent: group) subgroup.add_developer(developer) get api("/groups/#{subgroup.id}/billable_members/#{developer.id}/memberships", owner) expect(response).to have_gitlab_http_status(:bad_request) expect(json_response).to eq({ 'message' => '400 Bad request' }) end it 'excludes memberships outside the requested group hierarchy' do other_group = create(:group, name: 'My Other Group') other_group.add_developer(developer) get api("/groups/#{group.id}/billable_members/#{developer.id}/memberships", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.map { |m| m['source_full_name'] }).to eq([group.full_name]) end it 'includes subgroup memberships' do subgroup = create(:group, name: 'My SubGroup', parent: group) subgroup.add_developer(developer) get api("/groups/#{group.id}/billable_members/#{developer.id}/memberships", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.map { |m| m['source_full_name'] }).to include(subgroup.full_name) end it 'includes project memberships' do project = create(:project, name: 'My Project', group: group) project.add_developer(developer) get api("/groups/#{group.id}/billable_members/#{developer.id}/memberships", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.map { |m| m['source_full_name'] }).to include(project.full_name) end it 'paginates results' do subgroup = create(:group, name: 'SubGroup A', parent: group) subgroup.add_developer(developer) get api("/groups/#{group.id}/billable_members/#{developer.id}/memberships", owner), params: { page: 2, per_page: 1 } expect(response).to have_gitlab_http_status(:ok) expect(json_response.map { |m| m['source_full_name'] }).to eq([subgroup.full_name]) end end describe 'GET /groups/:id/members/:user_id/indirect' do let_it_be(:invited_group) { create(:group) } let_it_be(:other_invited_group) { create(:group) } let_it_be(:developer) { invited_group.add_developer(create(:user)).user } context 'with indirect memberships' do let(:membership) { developer.members.first } context 'with group to group invites' do before do create(:group_group_link, { shared_with_group: invited_group, shared_group: group }) end it 'includes invited group membership' do get api("/groups/#{group.id}/billable_members/#{developer.id}/indirect", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to eq([{ 'id' => membership.id, 'source_id' => invited_group.id, 'source_full_name' => invited_group.full_name, 'source_members_url' => group_members_url(invited_group), 'created_at' => membership.created_at.as_json, 'expires_at' => nil, 'access_level' => { 'string_value' => 'Developer', 'integer_value' => 30, 'custom_role' => nil } }]) end it 'excludes memberships outside the requested group hierarchy' do external_group = create(:group) external_group.add_developer(developer) get api("/groups/#{group.id}/billable_members/#{developer.id}/indirect", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.map { |m| m['source_full_name'] }).to eq([invited_group.full_name]) end it 'excludes non-billable memberships', :saas do create(:gitlab_subscription, :ultimate, namespace: group) create(:group_group_link, { shared_with_group: other_invited_group, shared_group: group }) other_invited_group.add_guest(developer) get api("/groups/#{group.id}/billable_members/#{developer.id}/indirect", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.map { |m| m['source_full_name'] }).to eq([invited_group.full_name]) end it 'paginates results' do sub_group = create(:group, name: 'SubGroup A', parent: group) create(:group_group_link, { shared_with_group: other_invited_group, shared_group: sub_group }) other_invited_group.add_developer(developer) get api("/groups/#{group.id}/billable_members/#{developer.id}/indirect", owner), params: { page: 2, per_page: 1 } expect(response).to have_gitlab_http_status(:ok) expect(json_response.map { |m| m['source_full_name'] }).to eq([other_invited_group.full_name]) end end context 'with group to project invites' do before do project = create(:project, group: group) create(:project_group_link, project: project, group: invited_group) end it 'includes invited group membership' do get api("/groups/#{group.id}/billable_members/#{developer.id}/indirect", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to eq([{ 'id' => membership.id, 'source_id' => invited_group.id, 'source_full_name' => invited_group.full_name, 'source_members_url' => group_members_url(invited_group), 'created_at' => membership.created_at.as_json, 'expires_at' => nil, 'access_level' => { 'string_value' => 'Developer', 'integer_value' => 30, 'custom_role' => nil } }]) end end it 'returns not found when the user does not exist' do get api("/groups/#{group.id}/billable_members/#{non_existing_record_id}/indirect", owner) expect(response).to have_gitlab_http_status(:not_found) expect(json_response).to eq({ 'message' => '404 Not found' }) end it 'returns not found when the group does not exist' do get api("/groups/#{non_existing_record_id}/billable_members/#{developer.id}/indirect", owner) expect(response).to have_gitlab_http_status(:not_found) expect(json_response).to eq({ 'message' => '404 Group Not Found' }) end it 'returns not found when the user is not billable', :saas do guest = create(:user) invited_group.add_guest(guest) create(:gitlab_subscription, :ultimate, namespace: group) get api("/groups/#{group.id}/billable_members/#{guest.id}/indirect", owner) expect(response).to have_gitlab_http_status(:not_found) expect(json_response).to eq({ 'message' => '404 User Not Found' }) end it 'returns bad request if the user cannot admin group members' do get api("/groups/#{group.id}/billable_members/#{developer.id}/indirect", developer) expect(response).to have_gitlab_http_status(:bad_request) expect(json_response).to eq({ 'message' => '400 Bad request' }) end it 'returns bad request if the group is a subgroup' do subgroup = create(:group, name: 'My SubGroup', parent: group) subgroup.add_developer(developer) get api("/groups/#{subgroup.id}/billable_members/#{developer.id}/indirect", owner) expect(response).to have_gitlab_http_status(:bad_request) expect(json_response).to eq({ 'message' => '400 Bad request' }) end end context 'with direct memberships' do before_all do group.add_developer(developer) end it 'does not return direct memberships for the billable group member' do get api("/groups/#{group.id}/billable_members/#{developer.id}/indirect", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response).to eq([]) end end end describe 'PUT /groups/:id/members/:user_id/state', :saas do let(:url) { "/groups/#{group.id}/members/#{user.id}/state" } let(:state) { 'active' } let(:params) { { state: state } } let_it_be(:user) { create(:user) } subject(:change_state) { put api(url, current_user), params: params } context 'when the current user has insufficient rights' do let(:current_user) { create(:user) } it 'returns 400' do change_state expect(response).to have_gitlab_http_status(:bad_request) end end context 'when authenticated as an owner' do let(:current_user) { owner } context 'when setting the user to be active' do let(:state) { 'active' } it 'is successful' do member = create(:group_member, :awaiting, group: group, user: user) change_state expect(response).to have_gitlab_http_status(:success) expect(member.reload).to be_active end end context 'when setting the user to be awaiting' do let(:state) { 'awaiting' } it 'is successful' do member = create(:group_member, :active, group: group, user: user) change_state expect(response).to have_gitlab_http_status(:success) expect(member.reload).to be_awaiting end end it 'forwards the error from the service' do change_state expect(response).to have_gitlab_http_status(:unprocessable_entity) expect(json_response['message']).to eq "No memberships found" end context 'with invalid parameters' do let(:state) { 'non-existing-state' } it 'returns a relevant error message' do change_state expect(response).to have_gitlab_http_status(:bad_request) expect(json_response['error']).to eq 'state does not have a valid value' end end context 'with a group that does not exist' do let(:url) { "/groups/foo/members/#{user.id}/state" } it 'returns a relevant error message' do change_state expect(response).to have_gitlab_http_status(:not_found) expect(json_response['message']).to eq '404 Group Not Found' end end context 'with a group that is a sub-group' do let(:url) { "/groups/#{nested_group.id}/members/#{user.id}/state" } it 'returns a relevant error message' do change_state expect(response).to have_gitlab_http_status(:bad_request) end end context 'with a user that does not exist' do let(:url) { "/groups/#{group.id}/members/0/state" } it 'returns a relevant error message' do change_state expect(response).to have_gitlab_http_status(:not_found) expect(json_response['message']).to eq '404 User Not Found' end end context 'with a user that is not a member of the group' do it 'returns a relevant error message' do create(:group_member, :awaiting, group: create(:group), user: user) change_state expect(response).to have_gitlab_http_status(:unprocessable_entity) expect(json_response['message']).to eq "No memberships found" end end end end describe 'DELETE /groups/:id/billable_members/:user_id', feature_category: :seat_cost_management do context 'when the current user has insufficient rights' do it 'returns 400' do not_an_owner = create(:user) delete api("/groups/#{group.id}/billable_members/#{maintainer.id}", not_an_owner) expect(response).to have_gitlab_http_status(:bad_request) end end context 'when authenticated as an owner' do it 'schedules async deletion' do expect do delete api("/groups/#{group.id}/billable_members/#{maintainer.id}", owner) end.to change { Members::DeletionSchedule.count }.from(0).to(1) end end end end context 'without LDAP' do let(:group) { create(:group) } let(:owner) { create(:user) } let(:project) { create(:project, group: group) } before do group.add_owner(owner) end describe 'POST /projects/:id/members' do context 'group membership locked' do let(:user) { create(:user) } let(:group) { create(:group, membership_lock: true) } let(:project) { create(:project, group: group) } context 'project in a group' do it 'returns a 405 method not allowed error when group membership lock is enabled' do post api("/projects/#{project.id}/members", owner), params: { user_id: user.id, access_level: Member::MAINTAINER } expect(response).to have_gitlab_http_status(:method_not_allowed) end end end end describe 'GET /groups/:id/members' do it 'matches json schema' do get api("/groups/#{group.to_param}/members", owner) expect(response).to have_gitlab_http_status(:ok) expect(response).to match_response_schema('public_api/v4/members', dir: 'ee') end context 'when a group has SAML provider configured' do let(:maintainer) { create(:user) } before do saml_provider = create :saml_provider, group: group create :group_saml_identity, user: owner, saml_provider: saml_provider group.add_maintainer(maintainer) end context 'and current_user is group owner' do it 'returns a list of users with group SAML identities info' do get api("/groups/#{group.to_param}/members", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.size).to eq(2) expect(json_response.first['group_saml_identity']).to match(kind_of(Hash)) end it 'allows to filter by linked identity presence' do get api("/groups/#{group.to_param}/members?with_saml_identity=true", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.size).to eq(1) expect(json_response.any? { |member| member['id'] == maintainer.id }).to be_falsey end context 'subgroup' do let(:subgroup) { create :group, parent: group } before do subgroup.add_owner(owner) subgroup.add_maintainer(maintainer) end it 'returns a list of users without group SAML identities info' do get api("/groups/#{subgroup.id}/members", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.size).to eq(2) expect(json_response.map(&:keys).flatten).not_to include('group_saml_identity') end it 'ignores filter by linked identity presence' do get api("/groups/#{subgroup.id}/members?with_saml_identity=true", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.size).to eq(2) expect(json_response.any? { |member| member['id'] == maintainer.id }).to be_truthy end end end context 'and current_user is not an owner' do it 'returns a list of users without group SAML identities info' do get api("/groups/#{group.to_param}/members", maintainer) expect(response).to have_gitlab_http_status(:ok) expect(json_response.map(&:keys).flatten).not_to include('group_saml_identity') end it 'ignores filter by linked identity presence' do get api("/groups/#{group.to_param}/members?with_saml_identity=true", maintainer) expect(response).to have_gitlab_http_status(:ok) expect(json_response.size).to eq(2) expect(json_response.any? { |member| member['id'] == maintainer.id }).to be_truthy end end end context 'with is_using_seat' do shared_examples 'seat information not included' do it 'returns a list of users that does not contain the is_using_seat attribute' do get api(api_url, owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.size).to eq(1) expect(json_response.first.keys).not_to include('is_using_seat') end end context 'with show_seat_info set to true' do it 'returns a list of users that contains the is_using_seat attribute' do get api("/groups/#{group.to_param}/members?show_seat_info=true", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response.size).to eq(1) expect(json_response.first['is_using_seat']).to be_truthy end end context 'with show_seat_info set to false' do let(:api_url) { "/groups/#{group.to_param}/members?show_seat_info=false" } it_behaves_like 'seat information not included' end context 'with no show_seat_info set' do let(:api_url) { "/groups/#{group.to_param}/members" } it_behaves_like 'seat information not included' end end end shared_examples 'POST /:source_type/:id/members' do |source_type| let(:stranger) { create(:user) } let(:url) { "/#{source_type.pluralize}/#{source.id}/members" } context "with :source_type == #{source_type.pluralize}" do it 'creates an audit event while creating a new member' do params = { user_id: stranger.id, access_level: Member::DEVELOPER } expect do post api(url, owner), params: params expect(response).to have_gitlab_http_status(:created) end.to change { AuditEvent.count }.by(1) end it 'does not create audit event if creating a new member fails' do params = { user_id: 0, access_level: Member::DEVELOPER } expect do post api(url, owner), params: params expect(response).to have_gitlab_http_status(:not_found) end.not_to change { AuditEvent.count } end end end it_behaves_like 'POST /:source_type/:id/members', 'project' do let(:source) { project } end it_behaves_like 'POST /:source_type/:id/members', 'group' do let(:source) { group } end end context 'group with LDAP group link' do include LdapHelpers let(:owner) { create(:user, username: 'owner_user') } let(:developer) { create(:user) } let(:ldap_developer) { create(:user) } let(:ldap_developer2) { create(:user) } let(:group) { create(:group_with_ldap_group_link, :public) } let!(:ldap_member) { create(:group_member, :developer, group: group, user: ldap_developer, ldap: true) } let!(:overridden_member) { create(:group_member, :developer, group: group, user: ldap_developer2, ldap: true, override: true) } let!(:regular_member) { create(:group_member, :developer, group: group, user: developer, ldap: false) } before do create(:group_member, :owner, group: group, user: owner) stub_ldap_setting(enabled: true) end describe 'GET /groups/:id/members/:user_id' do it 'does not contain an override attribute for non-LDAP users in the response' do get api("/groups/#{group.id}/members/#{developer.id}", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(developer.id) expect(json_response['access_level']).to eq(Member::DEVELOPER) expect(json_response['override']).to eq(nil) end it 'contains an override attribute for ldap users in the response' do get api("/groups/#{group.id}/members/#{ldap_developer.id}", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(ldap_developer.id) expect(json_response['access_level']).to eq(Member::DEVELOPER) expect(json_response['override']).to eq(false) end end describe 'PUT /groups/:id/members/:user_id' do it 'succeeds when access_level is modified after override has been set' do post api("/groups/#{group.id}/members/#{ldap_developer.id}/override", owner) expect(response).to have_gitlab_http_status(:created) put api("/groups/#{group.id}/members/#{ldap_developer.id}", owner), params: { access_level: Member::MAINTAINER } expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(ldap_developer.id) expect(json_response['override']).to eq(true) expect(json_response['access_level']).to eq(Member::MAINTAINER) end it 'fails when access level is modified without an override' do put api("/groups/#{group.id}/members/#{ldap_developer.id}", owner), params: { access_level: Member::MAINTAINER } expect(response).to have_gitlab_http_status(:forbidden) end end describe 'POST /groups/:id/members' do let(:stranger) { create(:user) } it 'returns a forbidden response' do post api("/groups/#{group.id}/members", owner), params: { user_id: stranger.id, access_level: Member::DEVELOPER } expect(response).to have_gitlab_http_status(:forbidden) end context 'when user to be added is a service account' do let_it_be(:service_account) { create(:service_account) } it 'does not allow adding the account to the group' do post api("/groups/#{group.id}/members", owner), params: { user_id: service_account.id, access_level: Member::DEVELOPER } expect(response).to have_gitlab_http_status(:forbidden) end context 'and the service_account feature is enabled' do before do stub_licensed_features(service_accounts: true) end it 'adds the service account to the group' do expect do post api("/groups/#{group.id}/members", owner), params: { user_id: service_account.id, access_level: Member::DEVELOPER } end.to change { Member.count }.by(1) end end end end describe 'DELETE /groups/:id/members/:user_id' do let(:service_account) { create(:user, :service_account) } let!(:service_account_member) do create(:group_member, :developer, group: group, user: service_account, ldap: false) end it 'fails for LDAP-managed group member' do expect do delete api("/groups/#{group.id}/members/#{ldap_developer.id}", owner) end.not_to change { Member.count } expect(response).to have_gitlab_http_status(:forbidden) end it 'fails when group member is a service account' do expect do delete api("/groups/#{group.id}/members/#{service_account.id}", owner) end.not_to change { Member.count } expect(response).to have_gitlab_http_status(:forbidden) end context 'when service_accounts feature is enabled' do before do stub_licensed_features(service_accounts: true) end it 'succeeds when group member is a service account' do expect do delete api("/groups/#{group.id}/members/#{service_account.id}", owner) end.to change { Member.count }.by(-1) expect(response).to have_gitlab_http_status(:no_content) expect(response.body).to be_empty end end end describe 'POST /groups/:id/members/:user_id/override' do it 'succeeds when override is set on an LDAP user' do post api("/groups/#{group.id}/members/#{ldap_developer.id}/override", owner) expect(response).to have_gitlab_http_status(:created) expect(json_response['id']).to eq(ldap_developer.id) expect(json_response['override']).to eq(true) expect(json_response['access_level']).to eq(Member::DEVELOPER) end it 'fails when override is set for a non-ldap user' do post api("/groups/#{group.id}/members/#{developer.id}/override", owner) expect(response).to have_gitlab_http_status(:forbidden) end end describe 'DELETE /groups/:id/members/:user_id/override with LDAP links' do it 'succeeds when override is already set on an LDAP user' do delete api("/groups/#{group.id}/members/#{ldap_developer2.id}/override", owner) expect(response).to have_gitlab_http_status(:ok) expect(json_response['id']).to eq(ldap_developer2.id) expect(json_response['override']).to eq(false) end it 'returns 403 when override is set for a non-ldap user' do delete api("/groups/#{group.id}/members/#{developer.id}/override", owner) expect(response).to have_gitlab_http_status(:forbidden) end end end context 'group with pending members' do let_it_be(:owner) { create(:user, username: 'owner_user') } let_it_be(:developer) { create(:user) } let_it_be(:group) { create(:group, :public) } let_it_be(:subgroup) { create(:group, parent: group) } let_it_be(:project) { create(:project, group: group) } let_it_be(:not_an_owner) { create(:user) } before do group.add_owner(owner) end describe 'PUT /groups/:id/members/:member_id/approve' do let_it_be(:member) { create(:group_member, :awaiting, group: group, user: developer) } let(:url) { "/groups/#{group.id}/members/#{member.id}/approve" } context 'with invalid params' do context 'when a subgroup is used' do let(:url) { "/groups/#{subgroup.id}/members/#{member.id}/approve" } it 'returns a bad request response' do put api(url, owner) expect(response).to have_gitlab_http_status(:bad_request) end end context 'when no group is found' do let(:url) { "/groups/#{non_existing_record_id}/members/#{member.id}/approve" } it 'returns a not found response' do put api(url, owner) expect(response).to have_gitlab_http_status(:not_found) end end end context 'when the current user does not have the `activate_group_member` ability' do before do stub_licensed_features(custom_roles: true) member_role = create(:member_role, :guest, :admin_group_member, namespace: group) create(:group_member, :guest, group: group, user: not_an_owner, member_role: member_role) end it 'returns a bad request response' do put api(url, not_an_owner) expect(response).to have_gitlab_http_status(:bad_request) end end context 'when the current user has permission to approve' do context 'when the member is not found' do let(:url) { "/groups/#{group.id}/members/#{non_existing_record_id}/approve" } it 'returns not found response' do put api(url, owner) expect(response).to have_gitlab_http_status(:not_found) end end context 'when the activation fails due to no pending members to activate' do let(:member) { create(:group_member, group: group) } it 'returns a bad request response' do put api(url, owner) expect(response).to have_gitlab_http_status(:bad_request) end end shared_examples 'successful activation' do it 'activates the member' do put api(url, owner) expect(response).to have_gitlab_http_status(:success) expect(member.reload.active?).to be true end end context 'when the member is a root group member' do it_behaves_like 'successful activation' end context 'when the member is a subgroup member' do let(:member) { create(:group_member, :awaiting, group: subgroup) } it_behaves_like 'successful activation' end context 'when the member is a project member' do let(:member) { create(:project_member, :awaiting, project: project) } it_behaves_like 'successful activation' end context 'when the member is an invited user' do let(:member) { create(:group_member, :awaiting, :invited, group: group) } it_behaves_like 'successful activation' end end end describe 'POST /groups/:id/members/approve_all' do let(:url) { "/groups/#{group.id}/members/approve_all" } context 'when the current user is not authorized' do before do stub_licensed_features(custom_roles: true) member_role = create(:member_role, :guest, :admin_group_member, namespace: group) create(:group_member, :guest, group: group, user: not_an_owner, member_role: member_role) end it 'returns a bad request response' do post api(url, not_an_owner) expect(response).to have_gitlab_http_status(:bad_request) end end context 'when the current user is authorized' do before do group.add_owner(owner) end context 'when the group ID is a subgroup' do let(:url) { "/groups/#{subgroup.id}/members/approve_all" } it 'returns a bad request response' do post api(url, owner) expect(response).to have_gitlab_http_status(:bad_request) end end context 'when params are valid' do it 'approves all pending members' do pending_group_member = create(:group_member, :awaiting, group: group) pending_subgroup_member = create(:group_member, :awaiting, group: subgroup) pending_project_member = create(:project_member, :awaiting, project: project) post api(url, owner) expect(response).to have_gitlab_http_status(:success) [pending_group_member, pending_subgroup_member, pending_subgroup_member, pending_project_member].each do |member| expect(member.reload.active?).to be true end end end context 'when activation fails' do it 'returns a bad request response' do allow_next_instance_of(::Members::ActivateService) do |service| allow(service).to receive(:execute).and_return({ status: :error }) end post api(url, owner) expect(response).to have_gitlab_http_status(:bad_request) end end end end describe 'GET /groups/:id/pending_members' do let(:url) { "/groups/#{group.id}/pending_members" } context 'when the current user is not authorized' do it 'returns a bad request response' do get api(url, not_an_owner) expect(response).to have_gitlab_http_status(:bad_request) end end context 'when the current user is authorized' do let_it_be(:pending_group_member) { create(:group_member, :awaiting, group: group) } let_it_be(:pending_subgroup_member) { create(:group_member, :awaiting, group: subgroup) } let_it_be(:pending_project_member) { create(:project_member, :awaiting, project: project) } let_it_be(:pending_invited_member) { create(:group_member, :awaiting, :invited, group: group) } it 'returns only pending members' do create(:group_member, group: group) get api(url, owner) expect(json_response.map { |m| m['id'] }).to match_array [ pending_group_member.id, pending_subgroup_member.id, pending_project_member.id, pending_invited_member.id ] end it 'includes activated invited members' do pending_invited_member.activate! get api(url, owner) expect(json_response.map { |m| m['id'] }).to match_array [ pending_group_member.id, pending_subgroup_member.id, pending_project_member.id, pending_invited_member.id ] end it 'returns only one membership per user' do create(:group_member, :awaiting, group: subgroup, user: pending_group_member.user) create(:group_member, :awaiting, :invited, group: subgroup, invite_email: pending_invited_member.invite_email) get api(url, owner) expect(json_response.map { |m| m['id'] }).to match_array [ pending_group_member.id, pending_subgroup_member.id, pending_project_member.id, pending_invited_member.id ] end it 'paginates the response' do get api(url, owner) expect_paginated_array_response(*[ pending_group_member.id, pending_subgroup_member.id, pending_project_member.id, pending_invited_member.id ]) end context 'when the group ID is a subgroup' do let(:url) { "/groups/#{subgroup.id}/pending_members" } it 'returns a bad request response' do get api(url, owner) expect(response).to have_gitlab_http_status(:bad_request) end end end end end context 'filtering project and group members' do let_it_be(:group) { create(:group) } let_it_be(:project) { create(:project, group: group) } let_it_be(:owner) { create(:user) } let(:params) { { state: state } } before do group.add_owner(owner) end subject do get api("/#{source_type}/#{source.id}/members/all", owner), params: params json_response end shared_examples 'filtered results' do context 'for active members' do let(:state) { 'active' } it 'returns only active members' do expect(subject.map { |u| u['id'] }).to match_array [active_member.user_id, owner.id] end end context 'for awaiting members' do let(:state) { 'awaiting' } it 'returns only awaiting members' do expect(subject.map { |u| u['id'] }).to match_array [awaiting_member.user_id] end end end context 'for group sources' do let(:source_type) { 'groups' } let(:source) { group } it_behaves_like 'filtered results' do let_it_be(:awaiting_member) { create(:group_member, :awaiting, group: group) } let_it_be(:active_member) { create(:group_member, group: group) } end end context 'for project sources' do let(:source_type) { 'projects' } let(:source) { project } it_behaves_like 'filtered results' do let_it_be(:awaiting_member) { create(:project_member, :awaiting, project: project) } let_it_be(:active_member) { create(:project_member, project: project) } end end end context 'with billable member management' do let_it_be(:group) { create(:group) } let_it_be(:project) { create(:project) } let_it_be(:owner) { create(:user) } let_it_be(:users) { create_list(:user, 1) } let_it_be(:user) { create(:user) } let_it_be(:license) { create(:license, plan: License::ULTIMATE_PLAN) } let(:source) { group } let(:access_level) { Gitlab::Access::DEVELOPER } before do stub_application_setting(enable_member_promotion_management: true) allow(License).to receive(:current).and_return(license) source.add_owner(owner) end RSpec.shared_context "with feature disabled" do before do stub_application_setting(enable_member_promotion_management: false) end end RSpec.shared_examples 'creates multiple memberships' do before do allow(Gitlab::QueryLimiting::Transaction).to receive(:threshold).and_return(110) end it do expect { post_request }.to change { ::Member.count }.by(2) expect(response).to have_gitlab_http_status(:created) expect(json_response).to eq({ 'status' => 'success' }) end end RSpec.shared_examples 'creates single membership' do it do expect { post_request }.to change { ::Member.count }.by(1) expect(response).to have_gitlab_http_status(:created) expect(json_response['username']).to eq(users[0].username) end end RSpec.shared_examples "multiple members passed in api" do let(:users) { create_list(:user, 2) } context 'when feature is disabled' do include_context "with feature disabled" it_behaves_like "creates multiple memberships" end context 'when both users are already billable' do let(:another_group) { create(:group) } before do users.each do |user| another_group.add_developer(user) end end it_behaves_like "creates multiple memberships" end context 'when both users will increase billable count' do it 'queues users memberships for admin approval' do expect { post_request }.not_to change { ::Member.count } expect(::GitlabSubscriptions::MemberManagement::MemberApproval.count).to eq(2) expect(response).to have_gitlab_http_status(:created) expect(json_response).to eq({ 'status' => 'success', 'queued_users' => { users[0].username => 'Request queued for administrator approval.', users[1].username => 'Request queued for administrator approval.' } }) end end end RSpec.shared_examples "single member api response" do let(:users) { create_list(:user, 1) } context 'when feature is disabled' do include_context "with feature disabled" it_behaves_like "creates single membership" end context 'when user is already billable' do let(:another_group) { create(:group) } before do users.each do |user| another_group.add_developer(user) end end it_behaves_like "creates single membership" end context 'when user will increase billable count' do it 'queues user membership for admin approval' do expect { post_request }.not_to change { ::Member.count } expect(::GitlabSubscriptions::MemberManagement::MemberApproval.count).to eq(1) expect(response).to have_gitlab_http_status(:accepted) expect(json_response).to eq({ 'message' => { users[0].username => 'Request queued for administrator approval.' } }) end end end RSpec.shared_examples 'updates membership' do it do expect { put_request }.to change { membership.reload.access_level }.to(access_level) expect(response).to have_gitlab_http_status(:ok) end end RSpec.shared_examples 'update membership api response' do context 'when feature is disabled' do include_context "with feature disabled" it_behaves_like "updates membership" end context 'when user is already billable' do before do membership.update!(access_level: Gitlab::Access::DEVELOPER) end let(:access_level) { Gitlab::Access::MAINTAINER } it_behaves_like "updates membership" end context 'when user is non billable' do it 'queues the membership request' do expect { put_request }.not_to change { membership.reload.access_level } expect(json_response).to eq({ 'message' => { user.username => 'Request queued for administrator approval.' } }) expect(response).to have_gitlab_http_status(:accepted) end end end describe 'POST /groups/:id/members' do subject(:post_request) do post api("/groups/#{group.id}/members", owner), params: { user_id: users.map(&:id).join(","), access_level: access_level } end let(:source) { group } it_behaves_like "multiple members passed in api" it_behaves_like "single member api response" end describe 'POST /projects/:id/members' do subject(:post_request) do post api("/projects/#{project.id}/members", owner), params: { user_id: users.map(&:id).join(","), access_level: access_level } end let(:source) { project } it_behaves_like "multiple members passed in api" it_behaves_like "single member api response" end describe 'PUT /groups/:id/members/:user_id' do let(:source) { group } let(:membership) { create(:group_member, :guest, group: source, user: user) } subject(:put_request) do put api("/groups/#{source.id}/members/#{user.id}", owner), params: { access_level: access_level } end it_behaves_like 'update membership api response' end describe 'PUT /projects/:id/members/:user_id' do let(:source) { project } let(:membership) { create(:project_member, :guest, project: source, user: user) } subject(:put_request) do put api("/projects/#{source.id}/members/#{user.id}", owner), params: { access_level: access_level } end it_behaves_like 'update membership api response' end end end