debian-mirror-gitlab/spec/workers/post_receive_spec.rb

232 lines
7.9 KiB
Ruby
Raw Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
require 'spec_helper'
describe PostReceive do
2015-04-26 12:48:37 +05:30
let(:changes) { "123456 789012 refs/heads/tést\n654321 210987 refs/tags/tag" }
let(:wrongly_encoded_changes) { changes.encode("ISO-8859-1").force_encoding("UTF-8") }
let(:base64_changes) { Base64.encode64(wrongly_encoded_changes) }
2017-09-10 17:25:29 +05:30
let(:gl_repository) { "project-#{project.id}" }
2016-06-02 11:05:42 +05:30
let(:key) { create(:key, user: project.owner) }
2018-12-13 13:39:08 +05:30
let!(:key_id) { key.shell_id }
2015-09-25 12:07:36 +05:30
2017-09-10 17:25:29 +05:30
let(:project) do
create(:project, :repository, auto_cancel_pending_pipelines: 'disabled')
end
context "as a sidekiq worker" do
it "responds to #perform" do
2017-08-17 22:00:37 +05:30
expect(described_class.new).to respond_to(:perform)
end
end
context 'with a non-existing project' do
2017-09-10 17:25:29 +05:30
let(:gl_repository) { "project-123456789" }
2017-08-17 22:00:37 +05:30
let(:error_message) do
2017-09-10 17:25:29 +05:30
"Triggered hook for non-existing project with gl_repository \"#{gl_repository}\""
2017-08-17 22:00:37 +05:30
end
it "returns false and logs an error" do
expect(Gitlab::GitLogger).to receive(:error).with("POST-RECEIVE: #{error_message}")
2017-09-10 17:25:29 +05:30
expect(described_class.new.perform(gl_repository, key_id, base64_changes)).to be(false)
2014-09-02 18:07:02 +05:30
end
end
2016-06-02 11:05:42 +05:30
describe "#process_project_changes" do
2018-12-13 13:39:08 +05:30
context 'empty changes' do
it "does not call any PushService but runs after project hooks" do
2019-07-07 11:18:12 +05:30
expect(Git::BranchPushService).not_to receive(:new)
expect(Git::TagPushService).not_to receive(:new)
2018-12-13 13:39:08 +05:30
expect_next_instance_of(SystemHooksService) { |service| expect(service).to receive(:execute_hooks) }
described_class.new.perform(gl_repository, key_id, "")
end
2016-06-02 11:05:42 +05:30
end
2018-12-13 13:39:08 +05:30
context 'unidentified user' do
let!(:key_id) { "" }
2016-06-02 11:05:42 +05:30
2018-12-13 13:39:08 +05:30
it 'returns false' do
2019-07-07 11:18:12 +05:30
expect(Git::BranchPushService).not_to receive(:new)
expect(Git::TagPushService).not_to receive(:new)
2018-12-13 13:39:08 +05:30
expect(described_class.new.perform(gl_repository, key_id, base64_changes)).to be false
2016-06-02 11:05:42 +05:30
end
end
2018-12-13 13:39:08 +05:30
context 'with changes' do
before do
allow_any_instance_of(Gitlab::GitPostReceive).to receive(:identify).and_return(project.owner)
end
context "branches" do
let(:changes) { "123456 789012 refs/heads/tést" }
2016-06-02 11:05:42 +05:30
2019-07-07 11:18:12 +05:30
it "calls Git::BranchPushService" do
expect_any_instance_of(Git::BranchPushService).to receive(:execute).and_return(true)
expect_any_instance_of(Git::TagPushService).not_to receive(:execute)
2018-12-13 13:39:08 +05:30
described_class.new.perform(gl_repository, key_id, base64_changes)
end
2016-06-02 11:05:42 +05:30
end
2018-12-13 13:39:08 +05:30
context "tags" do
let(:changes) { "123456 789012 refs/tags/tag" }
2016-06-02 11:05:42 +05:30
2019-07-07 11:18:12 +05:30
it "calls Git::TagPushService" do
expect_any_instance_of(Git::BranchPushService).not_to receive(:execute)
expect_any_instance_of(Git::TagPushService).to receive(:execute).and_return(true)
2018-12-13 13:39:08 +05:30
described_class.new.perform(gl_repository, key_id, base64_changes)
end
2016-06-02 11:05:42 +05:30
end
2018-12-13 13:39:08 +05:30
context "merge-requests" do
let(:changes) { "123456 789012 refs/merge-requests/123" }
2018-03-17 18:26:18 +05:30
2018-12-13 13:39:08 +05:30
it "does not call any of the services" do
2019-07-07 11:18:12 +05:30
expect_any_instance_of(Git::BranchPushService).not_to receive(:execute)
expect_any_instance_of(Git::TagPushService).not_to receive(:execute)
2018-12-13 13:39:08 +05:30
described_class.new.perform(gl_repository, key_id, base64_changes)
end
end
2016-06-02 11:05:42 +05:30
2018-12-13 13:39:08 +05:30
context "gitlab-ci.yml" do
2019-07-07 11:18:12 +05:30
let(:changes) do
<<-EOF.strip_heredoc
123456 789012 refs/heads/feature
654321 210987 refs/tags/tag
123456 789012 refs/heads/feature2
123458 789013 refs/heads/feature3
123459 789015 refs/heads/feature4
654321 210987 refs/tags/tag2
EOF
end
let(:changes_count) { changes.lines.count }
2018-03-17 18:26:18 +05:30
2018-12-13 13:39:08 +05:30
subject { described_class.new.perform(gl_repository, key_id, base64_changes) }
2018-03-17 18:26:18 +05:30
2019-07-07 11:18:12 +05:30
context "with valid .gitlab-ci.yml" do
2018-12-13 13:39:08 +05:30
before do
stub_ci_pipeline_to_return_yaml_file
2016-06-02 11:05:42 +05:30
2018-12-13 13:39:08 +05:30
allow_any_instance_of(Project)
.to receive(:commit)
.and_return(project.commit)
2016-06-02 11:05:42 +05:30
2018-12-13 13:39:08 +05:30
allow_any_instance_of(Repository)
.to receive(:branch_exists?)
.and_return(true)
end
2019-07-07 11:18:12 +05:30
context 'when git_push_create_all_pipelines is disabled' do
before do
stub_feature_flags(git_push_create_all_pipelines: false)
end
it "creates pipeline for branches and tags" do
subject
expect(Ci::Pipeline.pluck(:ref)).to contain_exactly("feature", "tag", "feature2", "feature3")
end
it "creates exactly #{described_class::PIPELINE_PROCESS_LIMIT} pipelines" do
expect(changes_count).to be > described_class::PIPELINE_PROCESS_LIMIT
expect { subject }.to change { Ci::Pipeline.count }.by(described_class::PIPELINE_PROCESS_LIMIT)
end
end
context 'when git_push_create_all_pipelines is enabled' do
before do
stub_feature_flags(git_push_create_all_pipelines: true)
end
it "creates all pipelines" do
expect { subject }.to change { Ci::Pipeline.count }.by(changes_count)
end
end
2017-09-10 17:25:29 +05:30
end
2016-06-02 11:05:42 +05:30
2018-12-13 13:39:08 +05:30
context "does not create a Ci::Pipeline" do
before do
stub_ci_pipeline_yaml_file(nil)
end
it { expect { subject }.not_to change { Ci::Pipeline.count } }
end
2016-06-02 11:05:42 +05:30
end
2017-09-10 17:25:29 +05:30
2018-12-13 13:39:08 +05:30
context 'after project changes hooks' do
let(:changes) { '123456 789012 refs/heads/tést' }
let(:fake_hook_data) { Hash.new(event_name: 'repository_update') }
2017-09-10 17:25:29 +05:30
2018-12-13 13:39:08 +05:30
before do
allow_any_instance_of(Gitlab::DataBuilder::Repository).to receive(:update).and_return(fake_hook_data)
# silence hooks so we can isolate
allow_any_instance_of(Key).to receive(:post_create_hook).and_return(true)
2019-07-07 11:18:12 +05:30
allow_any_instance_of(Git::BranchPushService).to receive(:execute).and_return(true)
2018-12-13 13:39:08 +05:30
end
2017-09-10 17:25:29 +05:30
2018-12-13 13:39:08 +05:30
it 'calls SystemHooksService' do
expect_any_instance_of(SystemHooksService).to receive(:execute_hooks).with(fake_hook_data, :repository_update_hooks).and_return(true)
2017-09-10 17:25:29 +05:30
2018-12-13 13:39:08 +05:30
described_class.new.perform(gl_repository, key_id, base64_changes)
end
2017-09-10 17:25:29 +05:30
end
end
2016-06-02 11:05:42 +05:30
end
2014-09-02 18:07:02 +05:30
2018-03-27 19:54:05 +05:30
describe '#process_wiki_changes' do
let(:gl_repository) { "wiki-#{project.id}" }
it 'updates project activity' do
2019-03-02 22:35:43 +05:30
# Force Project#set_timestamps_for_create to initialize timestamps
project
2018-03-27 19:54:05 +05:30
2019-03-02 22:35:43 +05:30
# MySQL drops milliseconds in the timestamps, so advance at least
# a second to ensure we see changes.
Timecop.freeze(1.second.from_now) do
expect do
described_class.new.perform(gl_repository, key_id, base64_changes)
project.reload
end.to change(project, :last_activity_at)
.and change(project, :last_repository_updated_at)
end
2018-03-27 19:54:05 +05:30
end
end
2016-06-02 11:05:42 +05:30
context "webhook" do
2014-09-02 18:07:02 +05:30
it "fetches the correct project" do
2017-08-17 22:00:37 +05:30
expect(Project).to receive(:find_by).with(id: project.id.to_s)
2017-09-10 17:25:29 +05:30
described_class.new.perform(gl_repository, key_id, base64_changes)
2014-09-02 18:07:02 +05:30
end
it "does not run if the author is not in the project" do
2017-09-10 17:25:29 +05:30
allow_any_instance_of(Gitlab::GitPostReceive)
.to receive(:identify_using_ssh_key)
.and_return(nil)
2014-09-02 18:07:02 +05:30
2015-04-26 12:48:37 +05:30
expect(project).not_to receive(:execute_hooks)
2014-09-02 18:07:02 +05:30
2017-09-10 17:25:29 +05:30
expect(described_class.new.perform(gl_repository, key_id, base64_changes)).to be_falsey
2014-09-02 18:07:02 +05:30
end
it "asks the project to trigger all hooks" do
2017-08-17 22:00:37 +05:30
allow(Project).to receive(:find_by).and_return(project)
2018-03-17 18:26:18 +05:30
2015-04-26 12:48:37 +05:30
expect(project).to receive(:execute_hooks).twice
expect(project).to receive(:execute_services).twice
2016-11-03 12:29:30 +05:30
2017-09-10 17:25:29 +05:30
described_class.new.perform(gl_repository, key_id, base64_changes)
2016-11-03 12:29:30 +05:30
end
it "enqueues a UpdateMergeRequestsWorker job" do
2017-08-17 22:00:37 +05:30
allow(Project).to receive(:find_by).and_return(project)
2018-03-17 18:26:18 +05:30
2016-11-03 12:29:30 +05:30
expect(UpdateMergeRequestsWorker).to receive(:perform_async).with(project.id, project.owner.id, any_args)
2014-09-02 18:07:02 +05:30
2017-09-10 17:25:29 +05:30
described_class.new.perform(gl_repository, key_id, base64_changes)
2014-09-02 18:07:02 +05:30
end
end
end