debian-mirror-gitlab/spec/services/merge_requests/create_pipeline_service_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

249 lines
7.5 KiB
Ruby
Raw Normal View History

2019-09-04 21:01:54 +05:30
# frozen_string_literal: true
require 'spec_helper'
2023-05-27 22:25:52 +05:30
RSpec.describe MergeRequests::CreatePipelineService, :clean_gitlab_redis_cache, feature_category: :code_review_workflow do
2020-07-28 23:09:34 +05:30
include ProjectForksHelper
2023-04-23 21:23:45 +05:30
let_it_be(:project, refind: true) { create(:project, :repository) }
2020-03-13 15:44:24 +05:30
let_it_be(:user) { create(:user) }
2021-04-29 21:17:54 +05:30
2021-06-08 01:23:25 +05:30
let(:service) { described_class.new(project: project, current_user: actor, params: params) }
2020-07-28 23:09:34 +05:30
let(:actor) { user }
2019-09-04 21:01:54 +05:30
let(:params) { {} }
before do
project.add_developer(user)
end
describe '#execute' do
2021-10-27 15:23:28 +05:30
subject(:response) { service.execute(merge_request) }
2019-09-04 21:01:54 +05:30
before do
stub_ci_pipeline_yaml_file(YAML.dump(config))
end
let(:config) do
{ rspec: { script: 'echo', only: ['merge_requests'] } }
end
let(:merge_request) do
create(:merge_request,
source_branch: 'feature',
2020-07-28 23:09:34 +05:30
source_project: source_project,
2019-09-04 21:01:54 +05:30
target_branch: 'master',
target_project: project)
end
2020-07-28 23:09:34 +05:30
let(:source_project) { project }
2019-09-04 21:01:54 +05:30
it 'creates a detached merge request pipeline' do
2021-10-27 15:23:28 +05:30
expect { response }.to change { Ci::Pipeline.count }.by(1)
2019-09-04 21:01:54 +05:30
2021-10-27 15:23:28 +05:30
expect(response).to be_success
expect(response.payload).to be_persisted
expect(response.payload).to be_detached_merge_request_pipeline
2019-09-04 21:01:54 +05:30
end
2019-12-04 20:38:33 +05:30
it 'defaults to merge_request_event' do
2021-10-27 15:23:28 +05:30
expect(response.payload.source).to eq('merge_request_event')
2019-12-04 20:38:33 +05:30
end
2022-07-23 23:45:48 +05:30
context 'when push options contain ci.skip' do
let(:params) { { push_options: { ci: { skip: true } } } }
it 'creates a skipped pipeline' do
expect { response }.to change { Ci::Pipeline.count }.by(1)
expect(response).to be_success
expect(response.payload).to be_persisted
expect(response.payload.builds).to be_empty
expect(response.payload).to be_skipped
end
end
2020-07-28 23:09:34 +05:30
context 'with fork merge request' do
let_it_be(:forked_project) { fork_project(project, nil, repository: true, target_project: create(:project, :private, :repository)) }
2021-04-29 21:17:54 +05:30
2020-07-28 23:09:34 +05:30
let(:source_project) { forked_project }
context 'when actor has permission to create pipelines in target project' do
let(:actor) { user }
it 'creates a pipeline in the target project' do
2021-10-27 15:23:28 +05:30
expect(response.payload.project).to eq(project)
2020-07-28 23:09:34 +05:30
end
2022-08-27 11:52:29 +05:30
context 'when the feature is disabled in CI/CD settings' do
before do
project.update!(ci_allow_fork_pipelines_to_run_in_parent_project: false)
end
it 'creates a pipeline in the source project' do
expect(response.payload.project).to eq(source_project)
end
end
2020-11-24 15:15:51 +05:30
context 'when source branch is protected' do
context 'when actor does not have permission to update the protected branch in target project' do
let!(:protected_branch) { create(:protected_branch, name: '*', project: project) }
it 'creates a pipeline in the source project' do
2021-10-27 15:23:28 +05:30
expect(response.payload.project).to eq(source_project)
2020-11-24 15:15:51 +05:30
end
end
context 'when actor has permission to update the protected branch in target project' do
let!(:protected_branch) { create(:protected_branch, :developers_can_merge, name: '*', project: project) }
it 'creates a pipeline in the target project' do
2021-10-27 15:23:28 +05:30
expect(response.payload.project).to eq(project)
2020-11-24 15:15:51 +05:30
end
end
end
2020-07-28 23:09:34 +05:30
end
context 'when actor has permission to create pipelines in forked project' do
let(:actor) { fork_user }
let(:fork_user) { create(:user) }
before do
source_project.add_developer(fork_user)
end
it 'creates a pipeline in the source project' do
2021-10-27 15:23:28 +05:30
expect(response.payload.project).to eq(source_project)
2020-07-28 23:09:34 +05:30
end
end
context 'when actor does not have permission to create pipelines' do
let(:actor) { create(:user) }
2021-10-27 15:23:28 +05:30
it 'responds with error' do
expect(response).to be_error
expect(response.message).to include('Insufficient permissions to create a new pipeline')
2020-07-28 23:09:34 +05:30
end
end
end
2019-09-04 21:01:54 +05:30
context 'when service is called multiple times' do
it 'creates a pipeline once' do
expect do
service.execute(merge_request)
service.execute(merge_request)
end.to change { Ci::Pipeline.count }.by(1)
end
context 'when allow_duplicate option is true' do
let(:params) { { allow_duplicate: true } }
it 'creates pipelines multiple times' do
expect do
service.execute(merge_request)
service.execute(merge_request)
end.to change { Ci::Pipeline.count }.by(2)
end
end
end
2020-01-01 13:55:28 +05:30
context 'when .gitlab-ci.yml does not use workflow:rules' do
context 'without only: [merge_requests] keyword' do
let(:config) do
{ rspec: { script: 'echo' } }
end
it 'does not create a pipeline' do
2021-10-27 15:23:28 +05:30
expect { response }.not_to change { Ci::Pipeline.count }
2020-01-01 13:55:28 +05:30
end
end
context 'with rules that specify creation on a tag' do
let(:config) do
{
rspec: {
script: 'echo',
rules: [{ if: '$CI_COMMIT_TAG' }]
}
}
end
it 'does not create a pipeline' do
2021-10-27 15:23:28 +05:30
expect { response }.not_to change { Ci::Pipeline.count }
2020-01-01 13:55:28 +05:30
end
end
end
context 'when workflow:rules are specified' do
context 'when rules request creation on merge request' do
let(:config) do
{
workflow: {
rules: [{ if: '$CI_MERGE_REQUEST_ID' }]
},
rspec: { script: 'echo' }
}
end
2021-10-27 15:23:28 +05:30
it 'creates a detached merge request pipeline', :aggregate_failures do
expect { response }.to change { Ci::Pipeline.count }.by(1)
2020-01-01 13:55:28 +05:30
2021-10-27 15:23:28 +05:30
expect(response).to be_success
expect(response.payload).to be_persisted
expect(response.payload).to be_detached_merge_request_pipeline
2020-01-01 13:55:28 +05:30
end
2019-09-04 21:01:54 +05:30
end
2020-01-01 13:55:28 +05:30
context 'with rules do specify creation on a tag' do
let(:config) do
{
workflow: {
rules: [{ if: '$CI_COMMIT_TAG' }]
},
rspec: { script: 'echo' }
}
end
2021-10-27 15:23:28 +05:30
it 'does not create a pipeline', :aggregate_failures do
expect { response }.not_to change { Ci::Pipeline.count }
expect(response).to be_error
2020-01-01 13:55:28 +05:30
end
2019-09-04 21:01:54 +05:30
end
end
2021-10-27 15:23:28 +05:30
context 'when merge request has no commits' do
before do
allow(merge_request).to receive(:has_no_commits?).and_return(true)
end
it 'does not create a pipeline', :aggregate_failures do
expect { response }.not_to change { Ci::Pipeline.count }
expect(response).to be_error
expect(response.message).to eq('Cannot create a pipeline for this merge request.')
expect(response.payload).to be_nil
end
end
2023-03-04 22:38:38 +05:30
context 'when merge request pipeline creates a dynamic environment' do
let(:config) do
{
review_app: {
script: 'echo',
only: ['merge_requests'],
environment: { name: "review/$CI_COMMIT_REF_NAME" }
}
}
end
it 'associates merge request with the environment' do
expect { response }.to change { Ci::Pipeline.count }.by(1)
environment = Environment.find_by_name('review/feature')
expect(response).to be_success
expect(environment).to be_present
expect(environment.merge_request).to eq(merge_request)
end
end
2019-09-04 21:01:54 +05:30
end
end