debian-mirror-gitlab/spec/models/plan_limits_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

252 lines
7.6 KiB
Ruby
Raw Normal View History

2020-05-24 23:13:21 +05:30
# frozen_string_literal: true
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe PlanLimits do
let_it_be(:project) { create(:project) }
let_it_be(:plan_limits) { create(:plan_limits) }
2021-09-30 23:02:18 +05:30
2020-07-28 23:09:34 +05:30
let(:project_hooks_count) { 2 }
2020-05-24 23:13:21 +05:30
before do
2020-07-28 23:09:34 +05:30
create_list(:project_hook, project_hooks_count, project: project)
2020-05-24 23:13:21 +05:30
end
2020-07-28 23:09:34 +05:30
describe '#exceeded?' do
let(:alternate_limit) { double('an alternate limit value') }
subject(:exceeded_limit) { plan_limits.exceeded?(:project_hooks, limit_subject, alternate_limit: alternate_limit) }
before do
allow(plan_limits).to receive(:limit_for).with(:project_hooks, alternate_limit: alternate_limit).and_return(limit)
end
shared_examples_for 'comparing limits' do
context 'when limit for given name results to a disabled value' do
let(:limit) { nil }
it { is_expected.to eq(false) }
end
context 'when limit for given name results to a non-disabled value' do
context 'and given count is smaller than limit' do
let(:limit) { project_hooks_count + 1 }
it { is_expected.to eq(false) }
end
context 'and given count is equal to the limit' do
let(:limit) { project_hooks_count }
it { is_expected.to eq(true) }
end
context 'and given count is greater than the limit' do
let(:limit) { project_hooks_count - 1 }
it { is_expected.to eq(true) }
end
end
end
context 'when given limit subject is an integer' do
let(:limit_subject) { project.hooks.count }
it_behaves_like 'comparing limits'
end
context 'when given limit subject is an ActiveRecord::Relation' do
let(:limit_subject) { project.hooks }
it_behaves_like 'comparing limits'
end
context 'when given limit subject is something else' do
let(:limit_subject) { ProjectHook }
let(:limit) { 100 }
it 'raises an error' do
expect { exceeded_limit }.to raise_error(ArgumentError)
2020-05-24 23:13:21 +05:30
end
end
end
2020-07-28 23:09:34 +05:30
describe '#limit_for' do
let(:alternate_limit) { nil }
subject(:limit) { plan_limits.limit_for(:project_hooks, alternate_limit: alternate_limit) }
context 'when given limit name does not exist' do
it 'raises an error' do
expect { plan_limits.limit_for(:project_foo) }.to raise_error(described_class::LimitUndefinedError)
end
2020-05-24 23:13:21 +05:30
end
2020-07-28 23:09:34 +05:30
context 'when given limit name is disabled' do
before do
plan_limits.update!(project_hooks: 0)
end
it { is_expected.to eq(nil) }
context 'and alternate_limit is a non-zero integer' do
let(:alternate_limit) { 1 }
it { is_expected.to eq(1) }
end
context 'and alternate_limit is zero' do
let(:alternate_limit) { 0 }
it { is_expected.to eq(nil) }
end
context 'and alternate_limit is a proc that returns non-zero integer' do
let(:alternate_limit) { -> { 1 } }
it { is_expected.to eq(1) }
end
context 'and alternate_limit is a proc that returns zero' do
let(:alternate_limit) { -> { 0 } }
it { is_expected.to eq(nil) }
end
context 'and alternate_limit is a proc that returns nil' do
let(:alternate_limit) { -> { nil } }
it { is_expected.to eq(nil) }
2020-05-24 23:13:21 +05:30
end
end
2020-07-28 23:09:34 +05:30
context 'when given limit name is enabled' do
let(:plan_limit_value) { 2 }
2020-05-24 23:13:21 +05:30
before do
2020-07-28 23:09:34 +05:30
plan_limits.update!(project_hooks: plan_limit_value)
2020-05-24 23:13:21 +05:30
end
2020-07-28 23:09:34 +05:30
context 'and alternate_limit is a non-zero integer that is bigger than the plan limit' do
let(:alternate_limit) { plan_limit_value + 1 }
it { is_expected.to eq(plan_limit_value) }
end
context 'and alternate_limit is a non-zero integer that is smaller than the plan limit' do
let(:alternate_limit) { plan_limit_value - 1 }
it { is_expected.to eq(alternate_limit) }
end
context 'and alternate_limit is zero' do
let(:alternate_limit) { 0 }
it { is_expected.to eq(plan_limit_value) }
end
context 'and alternate_limit is a proc that returns non-zero integer that is bigger than the plan limit' do
let(:alternate_limit) { -> { plan_limit_value + 1 } }
it { is_expected.to eq(plan_limit_value) }
end
context 'and alternate_limit is a proc that returns non-zero integer that is smaller than the plan limit' do
let(:alternate_limit) { -> { plan_limit_value - 1 } }
it { is_expected.to eq(alternate_limit.call) }
end
context 'and alternate_limit is a proc that returns zero' do
let(:alternate_limit) { -> { 0 } }
it { is_expected.to eq(plan_limit_value) }
end
context 'and alternate_limit is a proc that returns nil' do
let(:alternate_limit) { -> { nil } }
it { is_expected.to eq(plan_limit_value) }
2020-05-24 23:13:21 +05:30
end
end
end
context 'validates default values' do
2020-07-28 23:09:34 +05:30
# TODO: For now, these columns have default values set to 0.
# Each artifact type listed here have their own matching issues to determine
# the actual limit value. In each of those issues, the default value should also be updated to
# a non-zero value. Also update existing values of zero to whatever the default value will be.
# For a list of the issues, see: https://gitlab.com/gitlab-org/gitlab/-/issues/211378#note_355619970
let(:disabled_max_artifact_size_columns) do
%w[
ci_max_artifact_size_archive
ci_max_artifact_size_metadata
ci_max_artifact_size_trace
ci_max_artifact_size_junit
ci_max_artifact_size_sast
ci_max_artifact_size_dast
2021-09-30 23:02:18 +05:30
ci_max_artifact_size_cluster_image_scanning
2020-07-28 23:09:34 +05:30
ci_max_artifact_size_codequality
ci_max_artifact_size_license_management
ci_max_artifact_size_performance
ci_max_artifact_size_browser_performance
ci_max_artifact_size_load_performance
ci_max_artifact_size_metrics
ci_max_artifact_size_metrics_referee
ci_max_artifact_size_network_referee
ci_max_artifact_size_dotenv
ci_max_artifact_size_cobertura
ci_max_artifact_size_accessibility
ci_max_artifact_size_cluster_applications
ci_max_artifact_size_secret_detection
ci_max_artifact_size_requirements
2023-03-04 22:38:38 +05:30
ci_max_artifact_size_requirements_v2
2020-07-28 23:09:34 +05:30
ci_max_artifact_size_coverage_fuzzing
2021-01-03 14:25:43 +05:30
ci_max_artifact_size_api_fuzzing
2020-07-28 23:09:34 +05:30
]
end
2023-07-09 08:55:56 +05:30
# Remove ci_active_pipelines when db column is removed
# https://gitlab.com/gitlab-org/gitlab/-/issues/408141
2020-05-24 23:13:21 +05:30
let(:columns_with_zero) do
%w[
ci_active_pipelines
ci_pipeline_size
ci_active_jobs
2020-07-28 23:09:34 +05:30
storage_size_limit
2021-02-11 23:33:58 +05:30
daily_invites
2021-06-08 01:23:25 +05:30
web_hook_calls
2022-07-23 23:45:48 +05:30
web_hook_calls_mid
web_hook_calls_low
2021-09-04 01:27:46 +05:30
ci_daily_pipeline_schedule_triggers
2022-06-21 17:19:12 +05:30
repository_size
2022-07-23 23:45:48 +05:30
security_policy_scan_execution_schedules
2023-03-17 16:20:25 +05:30
enforcement_limit
notification_limit
2023-06-20 00:43:36 +05:30
project_access_token_limit
2020-07-28 23:09:34 +05:30
] + disabled_max_artifact_size_columns
2020-05-24 23:13:21 +05:30
end
2023-03-17 16:20:25 +05:30
let(:datetime_columns) do
%w[dashboard_limit_enabled_at]
end
2020-05-24 23:13:21 +05:30
it "has positive values for enabled limits" do
attributes = plan_limits.attributes
attributes = attributes.except(described_class.primary_key)
attributes = attributes.except(described_class.reflections.values.map(&:foreign_key))
attributes = attributes.except(*columns_with_zero)
2023-03-17 16:20:25 +05:30
attributes = attributes.except(*datetime_columns)
2020-05-24 23:13:21 +05:30
expect(attributes).to all(include(be_positive))
end
it "has zero values for disabled limits" do
attributes = plan_limits.attributes
attributes = attributes.slice(*columns_with_zero)
expect(attributes).to all(include(be_zero))
end
end
end