debian-mirror-gitlab/spec/services/terraform/remote_state_handler_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

203 lines
5.6 KiB
Ruby
Raw Normal View History

2020-04-22 19:07:51 +05:30
# frozen_string_literal: true
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Terraform::RemoteStateHandler do
2020-04-22 19:07:51 +05:30
let_it_be(:project) { create(:project) }
2020-07-28 23:09:34 +05:30
let_it_be(:developer) { create(:user, developer_projects: [project]) }
let_it_be(:maintainer) { create(:user, maintainer_projects: [project]) }
let_it_be(:user) { maintainer }
2020-04-22 19:07:51 +05:30
describe '#find_with_lock' do
context 'without a state name' do
subject { described_class.new(project, user) }
it 'raises an exception' do
expect { subject.find_with_lock }.to raise_error(ArgumentError)
end
end
context 'with a state name' do
subject { described_class.new(project, user, name: 'state') }
context 'with no matching state' do
it 'raises an exception' do
expect { subject.find_with_lock }.to raise_error(ActiveRecord::RecordNotFound)
end
end
context 'with a matching state' do
let!(:state) { create(:terraform_state, project: project, name: 'state') }
it 'returns the state' do
expect(subject.find_with_lock).to eq(state)
end
2022-07-23 23:45:48 +05:30
context 'with a state scheduled for deletion' do
let!(:state) { create(:terraform_state, :deletion_in_progress, project: project, name: 'state') }
it 'raises an exception' do
expect { subject.find_with_lock }.to raise_error(described_class::StateDeletedError)
end
end
2020-04-22 19:07:51 +05:30
end
end
end
context 'when state locking is not being used' do
subject { described_class.new(project, user, name: 'my-state') }
describe '#handle_with_lock' do
it 'allows to modify a state using database locking' do
2020-11-05 12:06:23 +05:30
record = nil
subject.handle_with_lock do |state|
record = state
2020-04-22 19:07:51 +05:30
state.name = 'updated-name'
end
2020-11-05 12:06:23 +05:30
expect(record.reload.name).to eq 'updated-name'
2020-04-22 19:07:51 +05:30
end
2020-11-05 12:06:23 +05:30
it 'returns nil' do
expect(subject.handle_with_lock).to be_nil
2020-04-22 19:07:51 +05:30
end
end
describe '#lock!' do
it 'raises an error' do
expect { subject.lock! }.to raise_error(ArgumentError)
end
end
end
context 'when using locking' do
describe '#handle_with_lock' do
2020-07-28 23:09:34 +05:30
subject(:handler) { described_class.new(project, user, name: 'new-state', lock_id: 'abc-abc') }
2020-04-22 19:07:51 +05:30
2020-07-28 23:09:34 +05:30
it 'handles a locked state using exclusive read lock' do
2020-04-22 19:07:51 +05:30
handler.lock!
2020-11-05 12:06:23 +05:30
record = nil
handler.handle_with_lock do |state|
record = state
2020-04-22 19:07:51 +05:30
state.name = 'new-name'
end
2020-11-05 12:06:23 +05:30
expect(record.reload.name).to eq 'new-name'
2020-04-22 19:07:51 +05:30
end
2020-07-28 23:09:34 +05:30
it 'raises exception if lock has not been acquired before' do
expect { handler.handle_with_lock }
.to raise_error(described_class::StateLockedError)
end
2022-07-23 23:45:48 +05:30
it 'raises an exception if the state is scheduled for deletion' do
create(:terraform_state, :deletion_in_progress, project: project, name: 'new-state')
expect { handler.handle_with_lock }
.to raise_error(described_class::StateDeletedError)
end
2020-07-28 23:09:34 +05:30
context 'user does not have permission to modify state' do
let(:user) { developer }
2020-04-22 19:07:51 +05:30
2020-07-28 23:09:34 +05:30
it 'raises an exception' do
expect { handler.handle_with_lock }
.to raise_error(described_class::UnauthorizedError)
end
end
2020-04-22 19:07:51 +05:30
end
describe '#lock!' do
2020-07-28 23:09:34 +05:30
let(:lock_id) { 'abc-abc' }
subject(:handler) do
described_class.new(
project,
user,
name: 'new-state',
lock_id: lock_id
)
end
2020-04-22 19:07:51 +05:30
2020-07-28 23:09:34 +05:30
it 'allows to lock state if it does not exist yet' do
2020-04-22 19:07:51 +05:30
state = handler.lock!
expect(state).to be_persisted
expect(state.name).to eq 'new-state'
end
it 'allows to lock state if it exists and is not locked' do
2020-07-28 23:09:34 +05:30
state = create(:terraform_state, project: project, name: 'new-state')
2020-04-22 19:07:51 +05:30
handler.lock!
2020-07-28 23:09:34 +05:30
expect(state.reload.lock_xid).to eq lock_id
2020-04-22 19:07:51 +05:30
expect(state).to be_locked
end
it 'raises an exception when trying to unlocked state locked by someone else' do
2020-07-28 23:09:34 +05:30
described_class.new(project, user, name: 'new-state', lock_id: '12a-23f').lock!
2020-04-22 19:07:51 +05:30
expect { handler.lock! }.to raise_error(described_class::StateLockedError)
end
2022-07-23 23:45:48 +05:30
it 'raises an exception when the state exists and is scheduled for deletion' do
create(:terraform_state, :deletion_in_progress, project: project, name: 'new-state')
expect { handler.lock! }.to raise_error(described_class::StateDeletedError)
end
2020-04-22 19:07:51 +05:30
end
2020-07-28 23:09:34 +05:30
describe '#unlock!' do
2022-07-23 23:45:48 +05:30
let_it_be(:state) { create(:terraform_state, :locked, project: project, name: 'new-state', lock_xid: 'abc-abc') }
let(:lock_id) { state.lock_xid }
2020-07-28 23:09:34 +05:30
subject(:handler) do
described_class.new(
project,
user,
2022-07-23 23:45:48 +05:30
name: state.name,
2020-07-28 23:09:34 +05:30
lock_id: lock_id
)
end
it 'unlocks the state' do
state = handler.unlock!
expect(state.lock_xid).to be_nil
end
context 'with no lock ID (force-unlock)' do
let(:lock_id) { }
it 'unlocks the state' do
state = handler.unlock!
expect(state.lock_xid).to be_nil
end
end
context 'with different lock ID' do
let(:lock_id) { 'other' }
it 'raises an exception' do
expect { handler.unlock! }
.to raise_error(described_class::StateLockedError)
end
end
2022-07-23 23:45:48 +05:30
context 'with a state scheduled for deletion' do
it 'raises an exception' do
state.update!(deleted_at: Time.current)
expect { handler.unlock! }
.to raise_error(described_class::StateDeletedError)
end
end
2020-07-28 23:09:34 +05:30
end
2020-04-22 19:07:51 +05:30
end
end