debian-mirror-gitlab/spec/models/ci/job_artifact_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

828 lines
24 KiB
Ruby
Raw Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2018-03-17 18:26:18 +05:30
require 'spec_helper'
2023-04-23 21:23:45 +05:30
RSpec.describe Ci::JobArtifact, feature_category: :build_artifacts do
2018-10-15 14:42:47 +05:30
let(:artifact) { create(:ci_job_artifact, :archive) }
2018-03-17 18:26:18 +05:30
describe "Associations" do
it { is_expected.to belong_to(:project) }
2023-05-27 22:25:52 +05:30
it { is_expected.to belong_to(:job).class_name('Ci::Build').with_foreign_key(:job_id).inverse_of(:job_artifacts) }
2022-10-11 01:57:18 +05:30
it { is_expected.to validate_presence_of(:job) }
it { is_expected.to validate_presence_of(:partition_id) }
2018-03-17 18:26:18 +05:30
end
it { is_expected.to respond_to(:file) }
it { is_expected.to respond_to(:created_at) }
it { is_expected.to respond_to(:updated_at) }
it { is_expected.to delegate_method(:open).to(:file) }
it { is_expected.to delegate_method(:exists?).to(:file) }
2019-02-15 15:39:39 +05:30
it_behaves_like 'having unique enum values'
2021-01-03 14:25:43 +05:30
it_behaves_like 'UpdateProjectStatistics', :with_counter_attribute do
2020-11-24 15:15:51 +05:30
let_it_be(:job, reload: true) { create(:ci_build) }
subject { build(:ci_job_artifact, :archive, job: job, size: 107464) }
2019-09-04 21:01:54 +05:30
end
2023-04-23 21:23:45 +05:30
describe 'after_create_commit callback' do
it 'logs the job artifact create' do
artifact = build(:ci_job_artifact, file_type: 3, size: 8888, file_format: 2, locked: 1)
expect(Gitlab::Ci::Artifacts::Logger).to receive(:log_created) do |record|
expect(record.size).to eq(artifact.size)
expect(record.file_type).to eq(artifact.file_type)
expect(record.file_format).to eq(artifact.file_format)
expect(record.locked).to eq(artifact.locked)
end
artifact.save!
end
end
describe 'after_destroy_commit callback' do
it 'logs the job artifact destroy' do
expect(Gitlab::Ci::Artifacts::Logger).to receive(:log_deleted).with(artifact, :log_destroy)
artifact.destroy!
end
end
2020-06-23 00:09:42 +05:30
describe '.not_expired' do
it 'returns artifacts that have not expired' do
_expired_artifact = create(:ci_job_artifact, :expired)
expect(described_class.not_expired).to contain_exactly(artifact)
end
end
2022-07-23 23:45:48 +05:30
describe '.all_reports' do
2019-09-04 21:01:54 +05:30
let!(:artifact) { create(:ci_job_artifact, :archive) }
2022-07-23 23:45:48 +05:30
subject { described_class.all_reports }
2019-09-04 21:01:54 +05:30
it { is_expected.to be_empty }
context 'when there are reports' do
let!(:metrics_report) { create(:ci_job_artifact, :junit) }
let!(:codequality_report) { create(:ci_job_artifact, :codequality) }
2021-01-03 14:25:43 +05:30
it { is_expected.to match_array([metrics_report, codequality_report]) }
2019-09-04 21:01:54 +05:30
end
end
2022-10-11 01:57:18 +05:30
describe '.of_report_type' do
subject { described_class.of_report_type(report_type) }
2018-11-18 11:00:15 +05:30
2022-10-11 01:57:18 +05:30
describe 'test_reports' do
let(:report_type) { :test }
2018-11-18 11:00:15 +05:30
2022-10-11 01:57:18 +05:30
context 'when there is a test report' do
let!(:artifact) { create(:ci_job_artifact, :junit) }
2018-11-18 11:00:15 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to eq([artifact]) }
end
2018-11-18 11:00:15 +05:30
2022-10-11 01:57:18 +05:30
context 'when there are no test reports' do
let!(:artifact) { create(:ci_job_artifact, :archive) }
it { is_expected.to be_empty }
end
2018-11-18 11:00:15 +05:30
end
2022-10-11 01:57:18 +05:30
describe 'accessibility_reports' do
let(:report_type) { :accessibility }
2020-05-24 23:13:21 +05:30
2022-10-11 01:57:18 +05:30
context 'when there is an accessibility report' do
let(:artifact) { create(:ci_job_artifact, :accessibility) }
2020-05-24 23:13:21 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to eq([artifact]) }
end
2020-05-24 23:13:21 +05:30
2022-10-11 01:57:18 +05:30
context 'when there are no accessibility report' do
let(:artifact) { create(:ci_job_artifact, :archive) }
2020-05-24 23:13:21 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to be_empty }
end
2020-05-24 23:13:21 +05:30
end
2022-10-11 01:57:18 +05:30
describe 'coverage_reports' do
let(:report_type) { :coverage }
2020-04-08 14:13:33 +05:30
2022-10-11 01:57:18 +05:30
context 'when there is a coverage report' do
let!(:artifact) { create(:ci_job_artifact, :cobertura) }
2020-04-08 14:13:33 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to eq([artifact]) }
end
2020-04-08 14:13:33 +05:30
2022-10-11 01:57:18 +05:30
context 'when there are no coverage reports' do
let!(:artifact) { create(:ci_job_artifact, :archive) }
2021-02-22 17:27:13 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to be_empty }
end
2021-02-22 17:27:13 +05:30
end
2022-10-11 01:57:18 +05:30
describe 'codequality_reports' do
let(:report_type) { :codequality }
2021-02-22 17:27:13 +05:30
2022-10-11 01:57:18 +05:30
context 'when there is a codequality report' do
let!(:artifact) { create(:ci_job_artifact, :codequality) }
2021-02-22 17:27:13 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to eq([artifact]) }
end
2021-02-22 17:27:13 +05:30
2022-10-11 01:57:18 +05:30
context 'when there are no codequality reports' do
let!(:artifact) { create(:ci_job_artifact, :archive) }
2020-04-08 14:13:33 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to be_empty }
end
2020-04-08 14:13:33 +05:30
end
2022-10-11 01:57:18 +05:30
describe 'terraform_reports' do
let(:report_type) { :terraform }
context 'when there is a terraform report' do
let!(:artifact) { create(:ci_job_artifact, :terraform) }
2020-05-24 23:13:21 +05:30
2022-10-11 01:57:18 +05:30
it { is_expected.to eq([artifact]) }
2020-05-24 23:13:21 +05:30
end
2022-10-11 01:57:18 +05:30
context 'when there are no terraform reports' do
let!(:artifact) { create(:ci_job_artifact, :archive) }
it { is_expected.to be_empty }
2020-05-24 23:13:21 +05:30
end
end
end
2023-03-17 16:20:25 +05:30
describe 'artifacts_public?' do
subject { artifact.public_access? }
context 'when job artifact created by default' do
let!(:artifact) { create(:ci_job_artifact) }
it { is_expected.to be_truthy }
end
context 'when job artifact created as public' do
let!(:artifact) { create(:ci_job_artifact, :public) }
it { is_expected.to be_truthy }
end
context 'when job artifact created as private' do
let!(:artifact) { build(:ci_job_artifact, :private) }
it { is_expected.to be_falsey }
context 'and the non_public_artifacts feature flag is disabled' do
let!(:artifact) { build(:ci_job_artifact, :private) }
before do
stub_feature_flags(non_public_artifacts: false)
end
it { is_expected.to be_truthy }
end
end
end
2022-08-27 11:52:29 +05:30
describe '.file_types_for_report' do
it 'returns the report file types for the report type' do
expect(described_class.file_types_for_report(:test)).to match_array(%w[junit])
end
context 'when given an unrecognized report type' do
it 'raises error' do
2022-10-11 01:57:18 +05:30
expect { described_class.file_types_for_report(:blah) }.to raise_error(ArgumentError, "Unrecognized report type: blah")
2022-08-27 11:52:29 +05:30
end
end
end
2020-07-28 23:09:34 +05:30
describe '.associated_file_types_for' do
using RSpec::Parameterized::TableSyntax
subject { Ci::JobArtifact.associated_file_types_for(file_type) }
where(:file_type, :result) do
2022-10-11 01:57:18 +05:30
'codequality' | %w(codequality)
'quality' | nil
2020-07-28 23:09:34 +05:30
end
with_them do
it { is_expected.to eq result }
end
end
2022-03-02 08:16:31 +05:30
describe '.erasable_file_types' do
subject { described_class.erasable_file_types }
it 'returns a list of erasable file types' do
all_types = described_class.file_types.keys
erasable_types = all_types - described_class::NON_ERASABLE_FILE_TYPES
expect(subject).to contain_exactly(*erasable_types)
end
end
2018-12-05 23:21:45 +05:30
describe '.erasable' do
subject { described_class.erasable }
context 'when there is an erasable artifact' do
let!(:artifact) { create(:ci_job_artifact, :junit) }
it { is_expected.to eq([artifact]) }
end
context 'when there are no erasable artifacts' do
let!(:artifact) { create(:ci_job_artifact, :trace) }
it { is_expected.to be_empty }
end
end
2023-05-27 22:25:52 +05:30
describe '.non_trace' do
subject { described_class.non_trace }
context 'when there is only a trace job artifact' do
let!(:trace) { create(:ci_job_artifact, :trace) }
it { is_expected.to be_empty }
end
context 'when there is only a non-trace job artifact' do
let!(:junit) { create(:ci_job_artifact, :junit) }
it { is_expected.to eq([junit]) }
end
context 'when there are both trace and non-trace job artifacts' do
let!(:trace) { create(:ci_job_artifact, :trace) }
let!(:junit) { create(:ci_job_artifact, :junit) }
it { is_expected.to eq([junit]) }
end
end
2020-06-23 00:09:42 +05:30
describe '.downloadable' do
subject { described_class.downloadable }
it 'filters for downloadable artifacts' do
downloadable_artifact = create(:ci_job_artifact, :codequality)
_not_downloadable_artifact = create(:ci_job_artifact, :trace)
expect(subject).to contain_exactly(downloadable_artifact)
end
end
2019-10-12 21:52:04 +05:30
describe '.archived_trace_exists_for?' do
subject { described_class.archived_trace_exists_for?(job_id) }
let!(:artifact) { create(:ci_job_artifact, :trace, job: job) }
let(:job) { create(:ci_build) }
context 'when the specified job_id exists' do
let(:job_id) { job.id }
it { is_expected.to be_truthy }
context 'when the job does have archived trace' do
2022-08-27 11:52:29 +05:30
let!(:artifact) {}
2019-10-12 21:52:04 +05:30
it { is_expected.to be_falsy }
end
end
context 'when the specified job_id does not exist' do
let(:job_id) { 10000 }
it { is_expected.to be_falsy }
end
end
2022-07-16 23:28:13 +05:30
describe '#stored?' do
subject { artifact.stored? }
2021-04-29 21:17:54 +05:30
context 'when the file exists' do
it { is_expected.to be_truthy }
end
context 'when the file does not exist' do
before do
artifact.file.remove!
end
it { is_expected.to be_falsy }
end
end
2020-03-13 15:44:24 +05:30
describe '.for_sha' do
2020-05-24 23:13:21 +05:30
let(:first_pipeline) { create(:ci_pipeline) }
let(:second_pipeline) { create(:ci_pipeline, project: first_pipeline.project, sha: Digest::SHA1.hexdigest(SecureRandom.hex)) }
let!(:first_artifact) { create(:ci_job_artifact, job: create(:ci_build, pipeline: first_pipeline)) }
let!(:second_artifact) { create(:ci_job_artifact, job: create(:ci_build, pipeline: second_pipeline)) }
2020-03-13 15:44:24 +05:30
it 'returns job artifacts for a given pipeline sha' do
2020-05-24 23:13:21 +05:30
expect(described_class.for_sha(first_pipeline.sha, first_pipeline.project.id)).to eq([first_artifact])
expect(described_class.for_sha(second_pipeline.sha, first_pipeline.project.id)).to eq([second_artifact])
end
end
2020-03-13 15:44:24 +05:30
2020-04-22 19:07:51 +05:30
describe '.for_job_name' do
it 'returns job artifacts for a given job name' do
first_job = create(:ci_build, name: 'first')
second_job = create(:ci_build, name: 'second')
first_artifact = create(:ci_job_artifact, job: first_job)
second_artifact = create(:ci_job_artifact, job: second_job)
expect(described_class.for_job_name(first_job.name)).to eq([first_artifact])
expect(described_class.for_job_name(second_job.name)).to eq([second_artifact])
end
end
2021-03-08 18:12:59 +05:30
describe '.unlocked' do
let_it_be(:job_artifact) { create(:ci_job_artifact) }
context 'with locked pipelines' do
before do
job_artifact.job.pipeline.artifacts_locked!
end
it 'returns an empty array' do
expect(described_class.unlocked).to be_empty
end
end
context 'with unlocked pipelines' do
before do
job_artifact.job.pipeline.unlocked!
end
it 'returns the artifact' do
expect(described_class.unlocked).to eq([job_artifact])
end
end
end
2022-06-21 17:19:12 +05:30
describe '.order_expired_asc' do
let_it_be(:first_artifact) { create(:ci_job_artifact, expire_at: 2.days.ago) }
let_it_be(:second_artifact) { create(:ci_job_artifact, expire_at: 1.day.ago) }
it 'returns ordered artifacts' do
expect(described_class.order_expired_asc).to eq([first_artifact, second_artifact])
end
end
2021-09-30 23:02:18 +05:30
describe '.for_project' do
it 'returns artifacts only for given project(s)', :aggregate_failures do
artifact1 = create(:ci_job_artifact)
artifact2 = create(:ci_job_artifact)
create(:ci_job_artifact)
expect(described_class.for_project(artifact1.project)).to match_array([artifact1])
expect(described_class.for_project([artifact1.project, artifact2.project])).to match_array([artifact1, artifact2])
end
end
describe 'created_in_time_range' do
it 'returns artifacts created in given time range', :aggregate_failures do
artifact1 = create(:ci_job_artifact, created_at: 1.day.ago)
artifact2 = create(:ci_job_artifact, created_at: 1.month.ago)
artifact3 = create(:ci_job_artifact, created_at: 1.year.ago)
expect(described_class.created_in_time_range(from: 1.week.ago)).to match_array([artifact1])
expect(described_class.created_in_time_range(to: 1.week.ago)).to match_array([artifact2, artifact3])
expect(described_class.created_in_time_range(from: 2.months.ago, to: 1.week.ago)).to match_array([artifact2])
end
end
2022-07-23 23:45:48 +05:30
describe '.created_at_before' do
it 'returns artifacts' do
artifact1 = create(:ci_job_artifact, created_at: 1.day.ago)
_artifact2 = create(:ci_job_artifact, created_at: 1.day.from_now)
expect(described_class.created_at_before(Time.current)).to match_array([artifact1])
end
end
describe '.id_before' do
it 'returns artifacts' do
artifact1 = create(:ci_job_artifact)
artifact2 = create(:ci_job_artifact)
expect(described_class.id_before(artifact2.id)).to match_array([artifact1, artifact2])
end
end
describe '.id_after' do
it 'returns artifacts' do
artifact1 = create(:ci_job_artifact)
artifact2 = create(:ci_job_artifact)
expect(described_class.id_after(artifact1.id)).to match_array([artifact2])
end
end
describe '.ordered_by_id' do
it 'returns artifacts in asc order' do
artifact1 = create(:ci_job_artifact)
artifact2 = create(:ci_job_artifact)
expect(described_class.ordered_by_id).to eq([artifact1, artifact2])
end
end
2018-10-15 14:42:47 +05:30
context 'creating the artifact' do
let(:project) { create(:project) }
let(:artifact) { create(:ci_job_artifact, :archive, project: project) }
it 'sets the size from the file size' do
2020-04-08 14:13:33 +05:30
expect(artifact.size).to eq(107464)
2018-03-17 18:26:18 +05:30
end
2018-10-15 14:42:47 +05:30
end
context 'updating the artifact file' do
it 'updates the artifact size' do
2018-11-08 19:23:39 +05:30
artifact.update!(file: fixture_file_upload('spec/fixtures/dk.png'))
2018-10-15 14:42:47 +05:30
expect(artifact.size).to eq(1062)
end
2018-03-17 18:26:18 +05:30
end
2021-12-11 22:18:48 +05:30
context 'when updating any field except the file' do
let(:artifact) { create(:ci_job_artifact, :unarchived_trace_artifact, file_store: 2) }
before do
stub_artifacts_object_storage(direct_upload: true)
artifact.file.object_store = 1
end
it 'the `after_commit` hook does not update `file_store`' do
artifact.update!(expire_at: Time.current)
expect(artifact.file_store).to be(2)
end
end
2018-11-18 11:00:15 +05:30
describe 'validates file format' do
subject { artifact }
2018-12-05 23:21:45 +05:30
described_class::TYPE_AND_FORMAT_PAIRS.except(:trace).each do |file_type, file_format|
context "when #{file_type} type with #{file_format} format" do
let(:artifact) { build(:ci_job_artifact, file_type: file_type, file_format: file_format) }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
it { is_expected.to be_valid }
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
context "when #{file_type} type without format specification" do
let(:artifact) { build(:ci_job_artifact, file_type: file_type, file_format: nil) }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
it { is_expected.not_to be_valid }
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
context "when #{file_type} type with other formats" do
described_class.file_formats.except(file_format).values.each do |other_format|
2023-07-09 08:55:56 +05:30
context "with #{other_format}" do
let(:artifact) { build(:ci_job_artifact, file_type: file_type, file_format: other_format) }
2018-11-18 11:00:15 +05:30
2023-07-09 08:55:56 +05:30
it { is_expected.not_to be_valid }
end
2018-12-05 23:21:45 +05:30
end
end
2018-11-18 11:00:15 +05:30
end
2018-12-05 23:21:45 +05:30
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
describe 'validates DEFAULT_FILE_NAMES' do
subject { described_class::DEFAULT_FILE_NAMES }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
described_class.file_types.each do |file_type, _|
it "expects #{file_type} to be included" do
is_expected.to include(file_type.to_sym)
end
2018-11-18 11:00:15 +05:30
end
2018-12-05 23:21:45 +05:30
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
describe 'validates TYPE_AND_FORMAT_PAIRS' do
subject { described_class::TYPE_AND_FORMAT_PAIRS }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
described_class.file_types.each do |file_type, _|
it "expects #{file_type} to be included" do
expect(described_class.file_formats).to include(subject[file_type.to_sym])
end
2018-11-18 11:00:15 +05:30
end
end
2018-03-17 18:26:18 +05:30
describe '#file' do
subject { artifact.file }
context 'the uploader api' do
it { is_expected.to respond_to(:store_dir) }
it { is_expected.to respond_to(:cache_dir) }
it { is_expected.to respond_to(:work_dir) }
end
end
2020-06-23 00:09:42 +05:30
describe 'expired?' do
subject { artifact.expired? }
context 'when expire_at is nil' do
let(:artifact) { build(:ci_job_artifact, expire_at: nil) }
it 'returns false' do
is_expected.to be_falsy
end
end
context 'when expire_at is in the past' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.yesterday) }
it 'returns true' do
is_expected.to be_truthy
end
end
context 'when expire_at is in the future' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.tomorrow) }
it 'returns false' do
is_expected.to be_falsey
end
end
end
describe '#expiring?' do
subject { artifact.expiring? }
context 'when expire_at is nil' do
let(:artifact) { build(:ci_job_artifact, expire_at: nil) }
it 'returns false' do
is_expected.to be_falsy
end
end
context 'when expire_at is in the past' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.yesterday) }
it 'returns false' do
is_expected.to be_falsy
end
end
context 'when expire_at is in the future' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.tomorrow) }
it 'returns true' do
is_expected.to be_truthy
end
end
end
2018-03-17 18:26:18 +05:30
describe '#expire_in' do
subject { artifact.expire_in }
it { is_expected.to be_nil }
context 'when expire_at is specified' do
2020-06-23 00:09:42 +05:30
let(:expire_at) { Time.current + 7.days }
2018-03-17 18:26:18 +05:30
before do
artifact.expire_at = expire_at
end
2020-06-23 00:09:42 +05:30
it { is_expected.to be_within(5).of(expire_at - Time.current) }
2018-03-17 18:26:18 +05:30
end
end
describe '#expire_in=' do
subject { artifact.expire_in }
it 'when assigning valid duration' do
artifact.expire_in = '7 days'
is_expected.to be_within(10).of(7.days.to_i)
end
it 'when assigning invalid duration' do
expect { artifact.expire_in = '7 elephants' }.to raise_error(ChronicDuration::DurationParseError)
is_expected.to be_nil
end
it 'when resetting value' do
artifact.expire_in = nil
is_expected.to be_nil
end
it 'when setting to 0' do
artifact.expire_in = '0'
is_expected.to be_nil
end
end
2018-05-09 12:01:36 +05:30
2021-12-11 22:18:48 +05:30
describe '#store_after_commit?' do
let(:file_type) { :archive }
let(:artifact) { build(:ci_job_artifact, file_type) }
context 'when direct upload is enabled' do
before do
stub_artifacts_object_storage(direct_upload: true)
end
context 'when the artifact is a trace' do
let(:file_type) { :trace }
2022-03-02 08:16:31 +05:30
it 'returns true' do
expect(artifact.store_after_commit?).to be_truthy
2021-12-11 22:18:48 +05:30
end
end
context 'when the artifact is not a trace' do
it 'returns false' do
expect(artifact.store_after_commit?).to be_falsey
end
end
end
context 'when direct upload is disabled' do
before do
stub_artifacts_object_storage(direct_upload: false)
end
it 'returns false' do
expect(artifact.store_after_commit?).to be_falsey
end
end
end
2018-05-09 12:01:36 +05:30
describe 'file is being stored' do
subject { create(:ci_job_artifact, :archive) }
context 'when existing object has local store' do
2020-10-24 23:57:45 +05:30
it_behaves_like 'mounted file in local store'
2018-05-09 12:01:36 +05:30
end
context 'when direct upload is enabled' do
before do
stub_artifacts_object_storage(direct_upload: true)
end
context 'when file is stored' do
2020-10-24 23:57:45 +05:30
it_behaves_like 'mounted file in object store'
2018-05-09 12:01:36 +05:30
end
end
end
2020-07-28 23:09:34 +05:30
describe '.file_types' do
context 'all file types have corresponding limit' do
let_it_be(:plan_limits) { create(:plan_limits) }
where(:file_type) do
described_class.file_types.keys
end
with_them do
let(:limit_name) { "#{described_class::PLAN_LIMIT_PREFIX}#{file_type}" }
it { expect(plan_limits.attributes).to include(limit_name), file_type_limit_failure_message(file_type, limit_name) }
end
end
end
describe '.max_artifact_size' do
let(:build) { create(:ci_build) }
subject(:max_size) { described_class.max_artifact_size(type: artifact_type, project: build.project) }
context 'when file type is supported' do
let(:project_closest_setting) { 1024 }
let(:artifact_type) { 'junit' }
2020-10-24 23:57:45 +05:30
let(:limit_name) { "#{described_class::PLAN_LIMIT_PREFIX}#{artifact_type}" }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
let!(:plan_limits) { create(:plan_limits, :default_plan) }
2020-07-28 23:09:34 +05:30
shared_examples_for 'basing off the project closest setting' do
it { is_expected.to eq(project_closest_setting.megabytes.to_i) }
end
shared_examples_for 'basing off the plan limit' do
it { is_expected.to eq(max_size_for_type.megabytes.to_i) }
end
2020-10-24 23:57:45 +05:30
before do
allow(build.project).to receive(:closest_setting).with(:max_artifacts_size).and_return(project_closest_setting)
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and plan limit is disabled for the given artifact type' do
before do
plan_limits.update!(limit_name => 0)
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it_behaves_like 'basing off the project closest setting'
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and project closest setting results to zero' do
let(:project_closest_setting) { 0 }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it { is_expected.to eq(0) }
2020-07-28 23:09:34 +05:30
end
2020-10-24 23:57:45 +05:30
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and plan limit is enabled for the given artifact type' do
before do
plan_limits.update!(limit_name => max_size_for_type)
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and plan limit is smaller than project setting' do
let(:max_size_for_type) { project_closest_setting - 1 }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it_behaves_like 'basing off the plan limit'
2020-07-28 23:09:34 +05:30
end
2020-10-24 23:57:45 +05:30
context 'and plan limit is larger than project setting' do
let(:max_size_for_type) { project_closest_setting + 1 }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it_behaves_like 'basing off the project closest setting'
end
2020-07-28 23:09:34 +05:30
end
end
end
2021-06-08 01:23:25 +05:30
context 'FastDestroyAll' do
let_it_be(:project) { create(:project) }
let_it_be(:pipeline) { create(:ci_pipeline, project: project) }
let_it_be(:job) { create(:ci_build, pipeline: pipeline, project: project) }
let!(:job_artifact) { create(:ci_job_artifact, :archive, job: job) }
let(:subjects) { pipeline.job_artifacts }
describe '.use_fast_destroy' do
it 'performs cascading delete with fast_destroy_all' do
expect(Ci::DeletedObject.count).to eq(0)
expect(subjects.count).to be > 0
expect { pipeline.destroy! }.not_to raise_error
expect(subjects.count).to eq(0)
expect(Ci::DeletedObject.count).to be > 0
end
it 'updates project statistics' do
2023-03-17 16:20:25 +05:30
expect(ProjectStatistics).to receive(:bulk_increment_statistic).once
.with(project, :build_artifacts_size, [have_attributes(amount: -job_artifact.file.size)])
2021-06-08 01:23:25 +05:30
pipeline.destroy!
end
end
end
2020-07-28 23:09:34 +05:30
def file_type_limit_failure_message(type, limit_name)
<<~MSG
The artifact type `#{type}` is missing its counterpart plan limit which is expected to be named `#{limit_name}`.
Please refer to https://docs.gitlab.com/ee/development/application_limits.html on how to add new plan limit columns.
Take note that while existing max size plan limits default to 0, succeeding new limits are recommended to have
2020-10-24 23:57:45 +05:30
non-zero default values. Also, remember to update the plan limits documentation (doc/administration/instance_limits.md)
when changes or new entries are made.
2020-07-28 23:09:34 +05:30
MSG
end
2022-01-26 12:08:38 +05:30
2022-04-04 11:22:00 +05:30
context 'loose foreign key on ci_job_artifacts.project_id' do
it_behaves_like 'cleanup by a loose foreign key' do
let!(:parent) { create(:project) }
let!(:model) { create(:ci_job_artifact, project: parent) }
end
end
2022-10-11 01:57:18 +05:30
describe 'partitioning' do
let(:job) { build(:ci_build, partition_id: 123) }
let(:artifact) { build(:ci_job_artifact, job: job, partition_id: nil) }
it 'copies the partition_id from job' do
expect { artifact.valid? }.to change(artifact, :partition_id).from(nil).to(123)
end
context 'when the job is missing' do
let(:artifact) do
build(:ci_job_artifact,
project: build_stubbed(:project),
job: nil,
partition_id: nil)
end
it 'does not change the partition_id value' do
expect { artifact.valid? }.not_to change(artifact, :partition_id)
end
end
end
2023-04-23 21:23:45 +05:30
describe '#filename' do
subject { artifact.filename }
it { is_expected.to eq(artifact.file.filename) }
end
2018-03-17 18:26:18 +05:30
end