Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
c6935b7b
Commit
c6935b7b
authored
Mar 30, 2020
by
John Jarvis
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Revert "Merge branch 'tle-view-audit-events-query-opt' into 'master'"
This reverts merge request !26245
parent
b6b8ee4e
Changes
24
Hide whitespace changes
Inline
Side-by-side
Showing
24 changed files
with
59 additions
and
352 deletions
+59
-352
app/models/audit_event.rb
app/models/audit_event.rb
+1
-15
app/services/audit_event_service.rb
app/services/audit_event_service.rb
+1
-9
ee/app/controllers/admin/audit_logs_controller.rb
ee/app/controllers/admin/audit_logs_controller.rb
+2
-5
ee/app/controllers/groups/audit_events_controller.rb
ee/app/controllers/groups/audit_events_controller.rb
+1
-3
ee/app/controllers/projects/audit_events_controller.rb
ee/app/controllers/projects/audit_events_controller.rb
+1
-3
ee/app/models/ee/audit_event.rb
ee/app/models/ee/audit_event.rb
+23
-9
ee/app/presenters/audit_event_presenter.rb
ee/app/presenters/audit_event_presenter.rb
+8
-6
ee/app/services/ee/audit_event_service.rb
ee/app/services/ee/audit_event_service.rb
+3
-3
ee/changelogs/unreleased/fix-audit-events-controllers-n-plus-1.yml
...logs/unreleased/fix-audit-events-controllers-n-plus-1.yml
+0
-5
ee/lib/gitlab/audit/deleted_author.rb
ee/lib/gitlab/audit/deleted_author.rb
+0
-8
ee/lib/gitlab/audit/events/preloader.rb
ee/lib/gitlab/audit/events/preloader.rb
+0
-18
ee/lib/gitlab/audit/null_author.rb
ee/lib/gitlab/audit/null_author.rb
+0
-32
ee/lib/gitlab/audit/null_entity.rb
ee/lib/gitlab/audit/null_entity.rb
+0
-8
ee/lib/gitlab/audit/unauthenticated_author.rb
ee/lib/gitlab/audit/unauthenticated_author.rb
+0
-13
ee/spec/factories/audit_events.rb
ee/spec/factories/audit_events.rb
+14
-21
ee/spec/lib/gitlab/audit/events/preloader_spec.rb
ee/spec/lib/gitlab/audit/events/preloader_spec.rb
+0
-36
ee/spec/lib/gitlab/audit/null_author_spec.rb
ee/spec/lib/gitlab/audit/null_author_spec.rb
+0
-16
ee/spec/lib/gitlab/audit/unauthenticated_author_spec.rb
ee/spec/lib/gitlab/audit/unauthenticated_author_spec.rb
+0
-17
ee/spec/models/audit_event_spec.rb
ee/spec/models/audit_event_spec.rb
+2
-2
ee/spec/requests/admin/audit_events_spec.rb
ee/spec/requests/admin/audit_events_spec.rb
+0
-39
ee/spec/requests/api/audit_events_spec.rb
ee/spec/requests/api/audit_events_spec.rb
+2
-2
ee/spec/requests/groups/audit_events_spec.rb
ee/spec/requests/groups/audit_events_spec.rb
+0
-41
ee/spec/requests/projects/audit_events_spec.rb
ee/spec/requests/projects/audit_events_spec.rb
+0
-40
ee/spec/services/audit_event_service_spec.rb
ee/spec/services/audit_event_service_spec.rb
+1
-1
No files found.
app/models/audit_event.rb
View file @
c6935b7b
...
@@ -30,26 +30,12 @@ class AuditEvent < ApplicationRecord
...
@@ -30,26 +30,12 @@ class AuditEvent < ApplicationRecord
end
end
def
author_name
def
author_name
lazy_autho
r
.
name
self
.
use
r
.
name
end
end
def
formatted_details
def
formatted_details
details
.
merge
(
details
.
slice
(
:from
,
:to
).
transform_values
(
&
:to_s
))
details
.
merge
(
details
.
slice
(
:from
,
:to
).
transform_values
(
&
:to_s
))
end
end
def
lazy_author
BatchLoader
.
for
(
author_id
).
batch
(
default_value:
default_author_value
)
do
|
author_ids
,
loader
|
User
.
where
(
id:
author_ids
).
find_each
do
|
user
|
loader
.
call
(
user
.
id
,
user
)
end
end
end
private
def
default_author_value
::
Gitlab
::
Audit
::
NullAuthor
.
for
(
author_id
,
details
[
:author_name
])
end
end
end
AuditEvent
.
prepend_if_ee
(
'EE::AuditEvent'
)
AuditEvent
.
prepend_if_ee
(
'EE::AuditEvent'
)
app/services/audit_event_service.rb
View file @
c6935b7b
...
@@ -13,7 +13,7 @@ class AuditEventService
...
@@ -13,7 +13,7 @@ class AuditEventService
#
#
# @return [AuditEventService]
# @return [AuditEventService]
def
initialize
(
author
,
entity
,
details
=
{})
def
initialize
(
author
,
entity
,
details
=
{})
@author
=
build_author
(
author
)
@author
=
author
@entity
=
entity
@entity
=
entity
@details
=
details
@details
=
details
end
end
...
@@ -49,14 +49,6 @@ class AuditEventService
...
@@ -49,14 +49,6 @@ class AuditEventService
private
private
def
build_author
(
author
)
if
author
.
is_a?
(
User
)
author
else
Gitlab
::
Audit
::
UnauthenticatedAuthor
.
new
(
name:
author
)
end
end
def
base_payload
def
base_payload
{
{
author_id:
@author
.
id
,
author_id:
@author
.
id
,
...
...
ee/app/controllers/admin/audit_logs_controller.rb
View file @
c6935b7b
...
@@ -10,7 +10,7 @@ class Admin::AuditLogsController < Admin::ApplicationController
...
@@ -10,7 +10,7 @@ class Admin::AuditLogsController < Admin::ApplicationController
PER_PAGE
=
25
PER_PAGE
=
25
def
index
def
index
@events
=
audit_log_events
@events
=
audit_log_events
.
page
(
params
[
:page
]).
per
(
PER_PAGE
).
without_count
@entity
=
case
audit_logs_params
[
:entity_type
]
@entity
=
case
audit_logs_params
[
:entity_type
]
when
'User'
when
'User'
...
@@ -27,10 +27,7 @@ class Admin::AuditLogsController < Admin::ApplicationController
...
@@ -27,10 +27,7 @@ class Admin::AuditLogsController < Admin::ApplicationController
private
private
def
audit_log_events
def
audit_log_events
events
=
AuditLogFinder
.
new
(
audit_logs_params
).
execute
AuditLogFinder
.
new
(
audit_logs_params
).
execute
events
=
events
.
page
(
params
[
:page
]).
per
(
PER_PAGE
).
without_count
Gitlab
::
Audit
::
Events
::
Preloader
.
preload!
(
events
)
end
end
def
check_license_admin_audit_log_available!
def
check_license_admin_audit_log_available!
...
...
ee/app/controllers/groups/audit_events_controller.rb
View file @
c6935b7b
...
@@ -11,9 +11,7 @@ class Groups::AuditEventsController < Groups::ApplicationController
...
@@ -11,9 +11,7 @@ class Groups::AuditEventsController < Groups::ApplicationController
layout
'group_settings'
layout
'group_settings'
def
index
def
index
events
=
AuditLogFinder
.
new
(
audit_logs_params
).
execute
.
page
(
params
[
:page
])
@events
=
AuditLogFinder
.
new
(
audit_logs_params
).
execute
.
page
(
params
[
:page
])
@events
=
Gitlab
::
Audit
::
Events
::
Preloader
.
preload!
(
events
)
end
end
private
private
...
...
ee/app/controllers/projects/audit_events_controller.rb
View file @
c6935b7b
...
@@ -12,9 +12,7 @@ class Projects::AuditEventsController < Projects::ApplicationController
...
@@ -12,9 +12,7 @@ class Projects::AuditEventsController < Projects::ApplicationController
layout
'project_settings'
layout
'project_settings'
def
index
def
index
events
=
AuditLogFinder
.
new
(
audit_logs_params
).
execute
.
page
(
params
[
:page
])
@events
=
AuditLogFinder
.
new
(
audit_logs_params
).
execute
.
page
(
params
[
:page
])
@events
=
Gitlab
::
Audit
::
Events
::
Preloader
.
preload!
(
events
)
end
end
private
private
...
...
ee/app/models/ee/audit_event.rb
View file @
c6935b7b
...
@@ -5,22 +5,36 @@ module EE
...
@@ -5,22 +5,36 @@ module EE
extend
ActiveSupport
::
Concern
extend
ActiveSupport
::
Concern
extend
::
Gitlab
::
Utils
::
Override
extend
::
Gitlab
::
Utils
::
Override
# While tracking events that could take place even when
# a user is not logged in, (eg: downloading repo of a public project),
# we set the author_id of such events as -1
UNAUTH_USER_AUTHOR_ID
=
-
1
# Events that are authored by unathenticated users, should be
# shown as authored by `An unauthenticated user` in the UI.
UNAUTH_USER_AUTHOR_NAME
=
'An unauthenticated user'
.
freeze
override
:author_name
def
author_name
if
(
author_name
=
details
[
:author_name
].
presence
||
user
&
.
name
)
author_name
elsif
authored_by_unauth_user?
UNAUTH_USER_AUTHOR_NAME
end
end
def
entity
def
entity
lazy_entity
return
unless
entity_type
&&
entity_id
# Avoiding exception if the record doesn't exist
@entity
||=
entity_type
.
constantize
.
find_by_id
(
entity_id
)
# rubocop:disable Gitlab/ModuleWithInstanceVariables
end
end
def
present
def
present
AuditEventPresenter
.
new
(
self
)
AuditEventPresenter
.
new
(
self
)
end
end
def
lazy_entity
def
authored_by_unauth_user?
BatchLoader
.
for
(
entity_id
)
author_id
==
UNAUTH_USER_AUTHOR_ID
.
batch
(
key:
entity_type
,
default_value:
::
Gitlab
::
Audit
::
NullEntity
.
new
)
do
|
ids
,
loader
,
args
|
model
=
Object
.
const_get
(
args
[
:key
],
false
)
model
.
where
(
id:
ids
).
find_each
{
|
record
|
loader
.
call
(
record
.
id
,
record
)
}
end
end
end
end
end
end
end
ee/app/presenters/audit_event_presenter.rb
View file @
c6935b7b
...
@@ -4,11 +4,13 @@ class AuditEventPresenter < Gitlab::View::Presenter::Simple
...
@@ -4,11 +4,13 @@ class AuditEventPresenter < Gitlab::View::Presenter::Simple
presents
:audit_event
presents
:audit_event
def
author_name
def
author_name
author
=
audit_event
.
lazy_autho
r
user
=
audit_event
.
use
r
return
author
.
name
if
author
.
is_a?
(
Gitlab
::
Audit
::
NullAuthor
)
if
user
link_to
(
user
.
name
,
user_path
(
user
))
link_to
(
author
.
name
,
user_path
(
author
))
else
audit_event
.
author_name
end
end
end
def
target
def
target
...
@@ -24,9 +26,9 @@ class AuditEventPresenter < Gitlab::View::Presenter::Simple
...
@@ -24,9 +26,9 @@ class AuditEventPresenter < Gitlab::View::Presenter::Simple
end
end
def
object
def
object
entity
=
audit_event
.
lazy_
entity
entity
=
audit_event
.
entity
return
if
entity
.
is_a?
(
Gitlab
::
Audit
::
NullEntity
)
return
unless
entity
link_to
(
details
[
:entity_path
]
||
entity
.
name
,
entity
).
html_safe
link_to
(
details
[
:entity_path
]
||
entity
.
name
,
entity
).
html_safe
end
end
...
...
ee/app/services/ee/audit_event_service.rb
View file @
c6935b7b
...
@@ -89,7 +89,7 @@ module EE
...
@@ -89,7 +89,7 @@ module EE
@details
=
{
@details
=
{
failed_login:
auth
.
upcase
,
failed_login:
auth
.
upcase
,
author_name:
@author
.
name
,
author_name:
@author
,
target_details:
@author
,
target_details:
@author
,
ip_address:
ip
ip_address:
ip
}
}
...
@@ -141,7 +141,7 @@ module EE
...
@@ -141,7 +141,7 @@ module EE
@details
[
:entity_path
]
=
@entity
&
.
full_path
if
admin_audit_log_enabled?
@details
[
:entity_path
]
=
@entity
&
.
full_path
if
admin_audit_log_enabled?
SecurityEvent
.
create
(
SecurityEvent
.
create
(
author_id:
@author
.
id
,
author_id:
@author
.
respond_to?
(
:id
)
?
@author
.
id
:
AuditEvent
::
UNAUTH_USER_AUTHOR_ID
,
entity_id:
@entity
.
respond_to?
(
:id
)
?
@entity
.
id
:
-
1
,
entity_id:
@entity
.
respond_to?
(
:id
)
?
@entity
.
id
:
-
1
,
entity_type:
'User'
,
entity_type:
'User'
,
details:
@details
details:
@details
...
@@ -213,7 +213,7 @@ module EE
...
@@ -213,7 +213,7 @@ module EE
override
:base_payload
override
:base_payload
def
base_payload
def
base_payload
{
{
author_id:
@author
.
id
,
author_id:
@author
.
respond_to?
(
:id
)
?
@author
.
id
:
AuditEvent
::
UNAUTH_USER_AUTHOR_ID
,
# `@author.respond_to?(:id)` is to support cases where we need to log events
# `@author.respond_to?(:id)` is to support cases where we need to log events
# that could take place even when a user is unathenticated, Eg: downloading a public repo.
# that could take place even when a user is unathenticated, Eg: downloading a public repo.
# For such events, it is not mandatory that an author is always present.
# For such events, it is not mandatory that an author is always present.
...
...
ee/changelogs/unreleased/fix-audit-events-controllers-n-plus-1.yml
deleted
100644 → 0
View file @
b6b8ee4e
---
title
:
Fix N+1 queries in Audit Events controllers
merge_request
:
26245
author
:
type
:
performance
ee/lib/gitlab/audit/deleted_author.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
module
Gitlab
module
Audit
class
DeletedAuthor
<
Gitlab
::
Audit
::
NullAuthor
end
end
end
ee/lib/gitlab/audit/events/preloader.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
module
Gitlab
module
Audit
module
Events
class
Preloader
def
self
.
preload!
(
audit_events
)
audit_events
.
tap
do
|
audit_events
|
audit_events
.
each
do
|
audit_event
|
audit_event
.
lazy_author
audit_event
.
lazy_entity
end
end
end
end
end
end
end
ee/lib/gitlab/audit/null_author.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
module
Gitlab
module
Audit
class
NullAuthor
attr_reader
:id
,
:name
# Creates an Author
#
# While tracking events that could take place even when
# a user is not logged in, (eg: downloading repo of a public project),
# we set the author_id of such events as -1
#
# @param [Integer] id
# @param [String] name
#
# @return [Gitlab::Audit::UnauthenticatedAuthor, Gitlab::Audit::DeletedAuthor]
def
self
.
for
(
id
,
name
)
if
id
==
-
1
Gitlab
::
Audit
::
UnauthenticatedAuthor
.
new
(
name:
name
)
else
Gitlab
::
Audit
::
DeletedAuthor
.
new
(
id:
id
,
name:
name
)
end
end
def
initialize
(
id
:,
name
:)
@id
=
id
@name
=
name
end
end
end
end
ee/lib/gitlab/audit/null_entity.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
module
Gitlab
module
Audit
class
NullEntity
end
end
end
ee/lib/gitlab/audit/unauthenticated_author.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
module
Gitlab
module
Audit
class
UnauthenticatedAuthor
<
Gitlab
::
Audit
::
NullAuthor
# Events that are authored by unathenticated users, should be
# shown as authored by `An unauthenticated user` in the UI.
def
initialize
(
name:
nil
)
super
(
id:
-
1
,
name:
(
name
||
'An unauthenticated user'
))
end
end
end
end
ee/spec/factories/audit_events.rb
View file @
c6935b7b
...
@@ -4,38 +4,33 @@ FactoryBot.define do
...
@@ -4,38 +4,33 @@ FactoryBot.define do
factory
:audit_event
,
class:
'SecurityEvent'
,
aliases:
[
:user_audit_event
]
do
factory
:audit_event
,
class:
'SecurityEvent'
,
aliases:
[
:user_audit_event
]
do
user
user
transient
{
target_user
{
create
(
:user
)
}
}
entity_type
{
'User'
}
entity_type
{
'User'
}
entity_id
{
target_
user
.
id
}
entity_id
{
user
.
id
}
details
do
details
do
{
{
change:
'email address'
,
change:
'email address'
,
from:
'admin@gitlab.com'
,
from:
'admin@gitlab.com'
,
to:
'maintainer@gitlab.com'
,
to:
'maintainer@gitlab.com'
,
author_name:
user
.
name
,
author_name:
user
.
name
,
target_id:
target_
user
.
id
,
target_id:
user
.
id
,
target_type:
'User'
,
target_type:
'User'
,
target_details:
target_
user
.
name
,
target_details:
user
.
name
,
ip_address:
'127.0.0.1'
,
ip_address:
'127.0.0.1'
,
entity_path:
target_
user
.
username
entity_path:
user
.
username
}
}
end
end
trait
:project_event
do
trait
:project_event
do
transient
{
target_project
{
create
(
:project
)
}
}
entity_type
{
'Project'
}
entity_type
{
'Project'
}
entity_id
{
target_project
.
id
}
entity_id
{
create
(
:project
)
.
id
}
details
do
details
do
{
{
change:
'packges_enabled'
,
add:
'user_access'
,
from:
true
,
as:
'Developer'
,
to:
false
,
author_name:
user
.
name
,
author_name:
user
.
name
,
target_id:
target_project
.
id
,
target_id:
user
.
id
,
target_type:
'
Project
'
,
target_type:
'
User
'
,
target_details:
target_project
.
name
,
target_details:
user
.
name
,
ip_address:
'127.0.0.1'
,
ip_address:
'127.0.0.1'
,
entity_path:
'gitlab.org/gitlab-ce'
entity_path:
'gitlab.org/gitlab-ce'
}
}
...
@@ -43,19 +38,17 @@ FactoryBot.define do
...
@@ -43,19 +38,17 @@ FactoryBot.define do
end
end
trait
:group_event
do
trait
:group_event
do
transient
{
target_group
{
create
(
:group
)
}
}
entity_type
{
'Group'
}
entity_type
{
'Group'
}
entity_id
{
target_group
.
id
}
entity_id
{
create
(
:group
)
.
id
}
details
do
details
do
{
{
change:
'project_creation_level'
,
change:
'project_creation_level'
,
from:
nil
,
from:
nil
,
to:
'Developers + Maintainers'
,
to:
'Developers + Maintainers'
,
author_name:
user
.
name
,
author_name:
'Administrator'
,
target_id:
target_group
.
id
,
target_id:
1
,
target_type:
'Group'
,
target_type:
'Group'
,
target_details:
target_group
.
name
,
target_details:
"gitlab-org"
,
ip_address:
'127.0.0.1'
,
ip_address:
'127.0.0.1'
,
entity_path:
"gitlab-org"
entity_path:
"gitlab-org"
}
}
...
...
ee/spec/lib/gitlab/audit/events/preloader_spec.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
require
'spec_helper'
describe
Gitlab
::
Audit
::
Events
::
Preloader
do
describe
'.preload!'
do
let_it_be
(
:audit_events
)
{
create_list
(
:audit_event
,
2
)
}
let
(
:audit_events_relation
)
{
AuditEvent
.
where
(
id:
audit_events
.
map
(
&
:id
))
}
subject
{
described_class
.
preload!
(
audit_events_relation
)
}
it
'returns an ActiveRecord::Relation'
do
expect
(
subject
).
to
be_an
(
ActiveRecord
::
Relation
)
end
it
'preloads associated records'
do
log
=
ActiveRecord
::
QueryRecorder
.
new
do
subject
.
map
do
|
event
|
[
event
.
author_name
,
event
.
lazy_entity
.
name
]
end
end
# Expected queries when requesting for AuditEvent with associated records
#
# 1. On the audit_events table
# SELECT "audit_events".* FROM "audit_events"
# 2. On the users table for author_name
# SELECT "users".* FROM "users" WHERE "users"."id" IN (1, 3)
# 3. On the users table for entity name
# SELECT "users".* FROM "users" WHERE "users"."id" IN (2, 4)
#
expect
(
log
.
count
).
to
eq
(
3
)
end
end
end
ee/spec/lib/gitlab/audit/null_author_spec.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
require
'spec_helper'
describe
Gitlab
::
Audit
::
NullAuthor
do
describe
'.for'
do
it
'returns an DeletedAuthor'
do
expect
(
described_class
.
for
(
666
,
'Old Hat'
)).
to
be_a
(
Gitlab
::
Audit
::
DeletedAuthor
)
end
it
'returns an UnauthenticatedAuthor when id equals -1'
,
:aggregate_failures
do
expect
(
described_class
.
for
(
-
1
,
'Frank'
)).
to
be_a
(
Gitlab
::
Audit
::
UnauthenticatedAuthor
)
expect
(
described_class
.
for
(
-
1
,
'Frank'
)).
to
have_attributes
(
id:
-
1
,
name:
'Frank'
)
end
end
end
ee/spec/lib/gitlab/audit/unauthenticated_author_spec.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
require
'spec_helper'
describe
Gitlab
::
Audit
::
UnauthenticatedAuthor
do
describe
'#initialize'
do
it
'sets correct attributes'
do
expect
(
described_class
.
new
(
name:
'Peppa Pig'
))
.
to
have_attributes
(
id:
-
1
,
name:
'Peppa Pig'
)
end
it
'sets default name when it is not provided'
do
expect
(
described_class
.
new
)
.
to
have_attributes
(
id:
-
1
,
name:
'An unauthenticated user'
)
end
end
end
ee/spec/models/audit_event_spec.rb
View file @
c6935b7b
...
@@ -91,8 +91,8 @@ RSpec.describe AuditEvent, type: :model do
...
@@ -91,8 +91,8 @@ RSpec.describe AuditEvent, type: :model do
context
'when entity does not exist'
do
context
'when entity does not exist'
do
subject
(
:event
)
{
described_class
.
new
(
entity_id:
99999
,
entity_type:
'User'
)
}
subject
(
:event
)
{
described_class
.
new
(
entity_id:
99999
,
entity_type:
'User'
)
}
it
'returns
a NullEntity
'
do
it
'returns
nil
'
do
expect
(
event
.
entity
).
to
be_
a
(
Gitlab
::
Audit
::
NullEntity
)
expect
(
event
.
entity
).
to
be_
blank
end
end
end
end
end
end
...
...
ee/spec/requests/admin/audit_events_spec.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
require
'spec_helper'
describe
'view audit events'
do
describe
'GET /audit_events'
do
let_it_be
(
:admin
)
{
create
(
:admin
)
}
let_it_be
(
:audit_event
)
{
create
(
:user_audit_event
)
}
before
do
stub_licensed_features
(
admin_audit_log:
true
)
login_as
(
admin
)
end
it
'returns 200'
do
send_request
expect
(
response
.
status
).
to
eq
(
200
)
end
it
'avoids N+1 DB queries'
,
:request_store
do
# warm up cache so these initial queries would not leak in our QueryRecorder
send_request
control
=
ActiveRecord
::
QueryRecorder
.
new
(
skip_cached:
false
)
{
send_request
}
create_list
(
:user_audit_event
,
2
)
expect
do
send_request
end
.
not_to
exceed_all_query_limit
(
control
)
end
def
send_request
get
admin_audit_logs_path
end
end
end
ee/spec/requests/api/audit_events_spec.rb
View file @
c6935b7b
...
@@ -107,7 +107,7 @@ describe API::AuditEvents do
...
@@ -107,7 +107,7 @@ describe API::AuditEvents do
expect
(
response
[
"id"
]).
to
eq
(
user_audit_event
.
id
)
expect
(
response
[
"id"
]).
to
eq
(
user_audit_event
.
id
)
expect
(
response
[
"author_id"
]).
to
eq
(
user_audit_event
.
user
.
id
)
expect
(
response
[
"author_id"
]).
to
eq
(
user_audit_event
.
user
.
id
)
expect
(
response
[
"entity_id"
]).
to
eq
(
user_audit_event
.
entity_
id
)
expect
(
response
[
"entity_id"
]).
to
eq
(
user_audit_event
.
user
.
id
)
expect
(
response
[
"entity_type"
]).
to
eq
(
'User'
)
expect
(
response
[
"entity_type"
]).
to
eq
(
'User'
)
expect
(
Time
.
parse
(
response
[
"created_at"
])).
to
be_like_time
(
user_audit_event
.
created_at
)
expect
(
Time
.
parse
(
response
[
"created_at"
])).
to
be_like_time
(
user_audit_event
.
created_at
)
expect
(
details
).
to
eq
user_audit_event
.
formatted_details
.
with_indifferent_access
expect
(
details
).
to
eq
user_audit_event
.
formatted_details
.
with_indifferent_access
...
@@ -157,7 +157,7 @@ describe API::AuditEvents do
...
@@ -157,7 +157,7 @@ describe API::AuditEvents do
expect
(
json_response
[
"id"
]).
to
eq
(
user_audit_event
.
id
)
expect
(
json_response
[
"id"
]).
to
eq
(
user_audit_event
.
id
)
expect
(
json_response
[
"author_id"
]).
to
eq
(
user_audit_event
.
user
.
id
)
expect
(
json_response
[
"author_id"
]).
to
eq
(
user_audit_event
.
user
.
id
)
expect
(
json_response
[
"entity_id"
]).
to
eq
(
user_audit_event
.
entity_
id
)
expect
(
json_response
[
"entity_id"
]).
to
eq
(
user_audit_event
.
user
.
id
)
expect
(
json_response
[
"entity_type"
]).
to
eq
(
'User'
)
expect
(
json_response
[
"entity_type"
]).
to
eq
(
'User'
)
expect
(
Time
.
parse
(
json_response
[
"created_at"
])).
to
be_like_time
(
user_audit_event
.
created_at
)
expect
(
Time
.
parse
(
json_response
[
"created_at"
])).
to
be_like_time
(
user_audit_event
.
created_at
)
expect
(
details
).
to
eq
user_audit_event
.
formatted_details
.
with_indifferent_access
expect
(
details
).
to
eq
user_audit_event
.
formatted_details
.
with_indifferent_access
...
...
ee/spec/requests/groups/audit_events_spec.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
require
'spec_helper'
describe
'view audit events'
do
describe
'GET /groups/:group/-/audit_events'
do
let_it_be
(
:group
)
{
create
(
:group
)
}
let_it_be
(
:user
)
{
create
(
:user
)
}
let_it_be
(
:audit_event
)
{
create
(
:group_audit_event
,
entity_id:
group
.
id
)
}
before
do
stub_licensed_features
(
audit_events:
true
)
group
.
add_owner
(
user
)
login_as
(
user
)
end
it
'returns 200'
do
send_request
expect
(
response
.
status
).
to
eq
(
200
)
end
it
'avoids N+1 DB queries'
,
:request_store
do
# warm up cache so these initial queries would not leak in our QueryRecorder
send_request
control
=
ActiveRecord
::
QueryRecorder
.
new
(
skip_cached:
false
)
{
send_request
}
create_list
(
:group_audit_event
,
2
,
entity_id:
group
.
id
)
expect
do
send_request
end
.
not_to
exceed_all_query_limit
(
control
)
end
def
send_request
get
group_audit_events_path
(
group
)
end
end
end
ee/spec/requests/projects/audit_events_spec.rb
deleted
100644 → 0
View file @
b6b8ee4e
# frozen_string_literal: true
require
'spec_helper'
describe
'view audit events'
do
describe
'GET /:namespace/:project/-/audit_events'
do
let_it_be
(
:project
)
{
create
(
:project
,
:repository
)
}
let_it_be
(
:user
)
{
project
.
owner
}
let_it_be
(
:audit_event
)
{
create
(
:project_audit_event
,
entity_id:
project
.
id
)
}
before
do
stub_licensed_features
(
audit_events:
true
)
login_as
(
user
)
end
it
'returns 200'
do
send_request
expect
(
response
.
status
).
to
eq
(
200
)
end
it
'avoids N+1 DB queries'
,
:request_store
do
control
=
ActiveRecord
::
QueryRecorder
.
new
(
skip_cached:
false
)
{
send_request
}
create_list
(
:project_audit_event
,
2
,
entity_id:
project
.
id
)
expect
do
send_request
end
.
not_to
exceed_all_query_limit
(
control
)
end
def
send_request
get
namespace_project_audit_events_path
(
namespace_id:
project
.
namespace
,
project_id:
project
)
end
end
end
ee/spec/services/audit_event_service_spec.rb
View file @
c6935b7b
...
@@ -216,7 +216,7 @@ describe AuditEventService do
...
@@ -216,7 +216,7 @@ describe AuditEventService do
describe
'#for_user'
do
describe
'#for_user'
do
let
(
:author_name
)
{
'Administrator'
}
let
(
:author_name
)
{
'Administrator'
}
let
(
:current_user
)
{
User
.
new
(
name:
author_name
)
}
let
(
:current_user
)
{
instance_spy
(
User
,
name:
author_name
)
}
let
(
:target_user_full_path
)
{
'ejohn'
}
let
(
:target_user_full_path
)
{
'ejohn'
}
let
(
:user
)
{
instance_spy
(
User
,
full_path:
target_user_full_path
)
}
let
(
:user
)
{
instance_spy
(
User
,
full_path:
target_user_full_path
)
}
let
(
:custom_message
)
{
'Some strange event has occurred'
}
let
(
:custom_message
)
{
'Some strange event has occurred'
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment