debian-mirror-gitlab/spec/models/ci/build_metadata_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

144 lines
4.4 KiB
Ruby
Raw Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2018-05-09 12:01:36 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Ci::BuildMetadata do
2020-03-13 15:44:24 +05:30
let_it_be(:user) { create(:user) }
let_it_be(:group) { create(:group) }
let_it_be(:project) { create(:project, :repository, group: group, build_timeout: 2000) }
2018-05-09 12:01:36 +05:30
2020-03-13 15:44:24 +05:30
let_it_be(:pipeline) do
2018-05-09 12:01:36 +05:30
create(:ci_pipeline, project: project,
sha: project.commit.id,
ref: project.default_branch,
status: 'success')
end
let(:build) { create(:ci_build, pipeline: pipeline) }
2019-02-15 15:39:39 +05:30
let(:metadata) { build.metadata }
it_behaves_like 'having unique enum values'
2018-05-09 12:01:36 +05:30
describe '#update_timeout_state' do
2019-02-15 15:39:39 +05:30
subject { metadata }
2018-05-09 12:01:36 +05:30
2019-12-04 20:38:33 +05:30
shared_examples 'sets timeout' do |source, timeout|
it 'sets project_timeout_source' do
expect { subject.update_timeout_state }.to change { subject.reload.timeout_source }.to(source)
2018-05-09 12:01:36 +05:30
end
2019-12-04 20:38:33 +05:30
it 'sets project timeout' do
expect { subject.update_timeout_state }.to change { subject.reload.timeout }.to(timeout)
2018-05-09 12:01:36 +05:30
end
end
2019-12-04 20:38:33 +05:30
context 'when project timeout is set' do
context 'when runner is assigned to the job' do
before do
build.update!(runner: runner)
end
context 'when runner timeout is not set' do
let(:runner) { create(:ci_runner, maximum_timeout: nil) }
it_behaves_like 'sets timeout', 'project_timeout_source', 2000
end
context 'when runner timeout is lower than project timeout' do
let(:runner) { create(:ci_runner, maximum_timeout: 1900) }
it_behaves_like 'sets timeout', 'runner_timeout_source', 1900
end
context 'when runner timeout is higher than project timeout' do
let(:runner) { create(:ci_runner, maximum_timeout: 2100) }
it_behaves_like 'sets timeout', 'project_timeout_source', 2000
end
2018-05-09 12:01:36 +05:30
end
2019-12-04 20:38:33 +05:30
context 'when job timeout is set' do
context 'when job timeout is higher than project timeout' do
let(:build) { create(:ci_build, pipeline: pipeline, options: { job_timeout: 3000 }) }
2018-05-09 12:01:36 +05:30
2019-12-04 20:38:33 +05:30
it_behaves_like 'sets timeout', 'job_timeout_source', 3000
2018-05-09 12:01:36 +05:30
end
2019-12-04 20:38:33 +05:30
context 'when job timeout is lower than project timeout' do
let(:build) { create(:ci_build, pipeline: pipeline, options: { job_timeout: 1000 }) }
it_behaves_like 'sets timeout', 'job_timeout_source', 1000
2018-05-09 12:01:36 +05:30
end
end
2019-12-04 20:38:33 +05:30
context 'when both runner and job timeouts are set' do
before do
2020-11-24 15:15:51 +05:30
build.update!(runner: runner)
2019-12-04 20:38:33 +05:30
end
context 'when job timeout is higher than runner timeout' do
let(:build) { create(:ci_build, pipeline: pipeline, options: { job_timeout: 3000 }) }
let(:runner) { create(:ci_runner, maximum_timeout: 2100) }
2018-05-09 12:01:36 +05:30
2019-12-04 20:38:33 +05:30
it_behaves_like 'sets timeout', 'runner_timeout_source', 2100
2018-05-09 12:01:36 +05:30
end
2019-12-04 20:38:33 +05:30
context 'when job timeout is lower than runner timeout' do
let(:build) { create(:ci_build, pipeline: pipeline, options: { job_timeout: 1900 }) }
let(:runner) { create(:ci_runner, maximum_timeout: 2100) }
it_behaves_like 'sets timeout', 'job_timeout_source', 1900
2018-05-09 12:01:36 +05:30
end
end
end
end
2020-07-28 23:09:34 +05:30
describe 'validations' do
context 'when attributes are valid' do
it 'returns no errors' do
metadata.secrets = {
DATABASE_PASSWORD: {
vault: {
engine: { name: 'kv-v2', path: 'kv-v2' },
path: 'production/db',
field: 'password'
}
}
}
expect(metadata).to be_valid
end
end
context 'when data is invalid' do
it 'returns errors' do
metadata.secrets = { DATABASE_PASSWORD: { vault: {} } }
aggregate_failures do
expect(metadata).to be_invalid
expect(metadata.errors.full_messages).to eq(["Secrets must be a valid json schema"])
end
end
end
end
2021-12-11 22:18:48 +05:30
describe 'set_cancel_gracefully' do
it 'sets cancel_gracefully' do
build.set_cancel_gracefully
expect(build.cancel_gracefully?).to be true
end
it 'returns false' do
expect(build.cancel_gracefully?).to be false
end
end
2022-04-04 11:22:00 +05:30
context 'loose foreign key on ci_builds_metadata.project_id' do
it_behaves_like 'cleanup by a loose foreign key' do
let!(:parent) { create(:project) }
let!(:model) { create(:ci_build_metadata, project: parent) }
end
end
2018-05-09 12:01:36 +05:30
end