debian-mirror-gitlab/spec/services/git/branch_push_service_spec.rb

725 lines
25 KiB
Ruby
Raw Normal View History

2019-07-31 22:56:46 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Git::BranchPushService, services: true do
2014-09-02 18:07:02 +05:30
include RepoHelpers
2020-03-13 15:44:24 +05:30
let_it_be(:user) { create(:user) }
let_it_be(:project, reload: true) { create(:project, :repository) }
2021-09-30 23:02:18 +05:30
2017-09-10 17:25:29 +05:30
let(:blankrev) { Gitlab::Git::BLANK_SHA }
let(:oldrev) { sample_commit.parent_id }
let(:newrev) { sample_commit.id }
2019-07-31 22:56:46 +05:30
let(:branch) { 'master' }
let(:ref) { "refs/heads/#{branch}" }
2020-03-13 15:44:24 +05:30
let(:push_options) { nil }
2014-09-02 18:07:02 +05:30
before do
2018-11-18 11:00:15 +05:30
project.add_maintainer(user)
2014-09-02 18:07:02 +05:30
end
2015-04-26 12:48:37 +05:30
describe 'Push branches' do
2016-04-02 18:10:28 +05:30
subject do
2020-03-13 15:44:24 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref, push_options: push_options)
2016-04-02 18:10:28 +05:30
end
2015-04-26 12:48:37 +05:30
context 'new branch' do
2017-09-10 17:25:29 +05:30
let(:oldrev) { blankrev }
2015-04-26 12:48:37 +05:30
it { is_expected.to be_truthy }
2016-04-02 18:10:28 +05:30
2017-08-17 22:00:37 +05:30
it 'calls the after_push_commit hook' do
expect(project.repository).to receive(:after_push_commit).with('master')
2016-04-02 18:10:28 +05:30
subject
end
2017-08-17 22:00:37 +05:30
it 'calls the after_create_branch hook' do
expect(project.repository).to receive(:after_create_branch)
2016-08-24 12:49:21 +05:30
subject
end
2015-04-26 12:48:37 +05:30
end
context 'existing branch' do
it { is_expected.to be_truthy }
2016-04-02 18:10:28 +05:30
2017-08-17 22:00:37 +05:30
it 'calls the after_push_commit hook' do
expect(project.repository).to receive(:after_push_commit).with('master')
2016-08-24 12:49:21 +05:30
subject
end
2015-04-26 12:48:37 +05:30
end
context 'rm branch' do
2017-09-10 17:25:29 +05:30
let(:newrev) { blankrev }
2015-04-26 12:48:37 +05:30
it { is_expected.to be_truthy }
2016-04-02 18:10:28 +05:30
2017-08-17 22:00:37 +05:30
it 'calls the after_push_commit hook' do
expect(project.repository).to receive(:after_push_commit).with('master')
2016-04-02 18:10:28 +05:30
subject
end
2017-08-17 22:00:37 +05:30
it 'calls the after_remove_branch hook' do
expect(project.repository).to receive(:after_remove_branch)
2016-04-02 18:10:28 +05:30
subject
end
2015-04-26 12:48:37 +05:30
end
end
2017-09-10 17:25:29 +05:30
describe "Pipelines" do
2019-12-21 20:55:43 +05:30
subject { execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref) }
2017-09-10 17:25:29 +05:30
2014-09-02 18:07:02 +05:30
before do
2017-09-10 17:25:29 +05:30
stub_ci_pipeline_to_return_yaml_file
2014-09-02 18:07:02 +05:30
end
2019-10-12 21:52:04 +05:30
it 'creates a pipeline with the right parameters' do
expect(Ci::CreatePipelineService)
.to receive(:new)
.with(project,
user,
{
before: oldrev,
after: newrev,
ref: ref,
checkout_sha: SeedRepo::Commit::ID,
2020-01-01 13:55:28 +05:30
variables_attributes: [],
2019-10-12 21:52:04 +05:30
push_options: {}
}).and_call_original
subject
end
2017-09-10 17:25:29 +05:30
it "creates a new pipeline" do
2018-03-17 18:26:18 +05:30
expect { subject }.to change { Ci::Pipeline.count }
2019-10-12 21:52:04 +05:30
pipeline = Ci::Pipeline.last
expect(pipeline).to be_push
expect(Gitlab::Git::BRANCH_REF_PREFIX + pipeline.ref).to eq(ref)
2017-09-10 17:25:29 +05:30
end
2019-12-04 20:38:33 +05:30
context 'when pipeline has errors' do
before do
config = YAML.dump({ test: { script: 'ls', only: ['feature'] } })
stub_ci_pipeline_yaml_file(config)
end
it 'reports an error' do
2020-03-13 15:44:24 +05:30
allow(Gitlab::Runtime).to receive(:sidekiq?).and_return(true)
2019-12-04 20:38:33 +05:30
expect(Sidekiq.logger).to receive(:warn)
expect { subject }.not_to change { Ci::Pipeline.count }
end
2020-03-13 15:44:24 +05:30
context 'with push options' do
let(:push_options) { ['mr.create'] }
it 'sanitizes push options' do
allow(Gitlab::Runtime).to receive(:sidekiq?).and_return(true)
expect(Sidekiq.logger).to receive(:warn) do |args|
pipeline_params = args[:pipeline_params]
expect(pipeline_params.keys).to match_array(%i(before after ref variables_attributes checkout_sha))
end
expect { subject }.not_to change { Ci::Pipeline.count }
end
end
2019-12-04 20:38:33 +05:30
end
2020-04-08 14:13:33 +05:30
context 'when .gitlab-ci.yml file is invalid' do
before do
stub_ci_pipeline_yaml_file('invalid yaml file')
end
it 'persists an error pipeline' do
expect { subject }.to change { Ci::Pipeline.count }
pipeline = Ci::Pipeline.last
expect(pipeline).to be_push
expect(pipeline).to be_failed
expect(pipeline).to be_config_error
end
end
2017-09-10 17:25:29 +05:30
end
2019-07-31 22:56:46 +05:30
describe "Updates merge requests" do
it "when pushing a new branch for the first time" do
expect(UpdateMergeRequestsWorker)
.to receive(:perform_async)
2021-10-27 15:23:28 +05:30
.with(project.id, user.id, blankrev, newrev, ref)
2017-09-10 17:25:29 +05:30
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: ref)
2017-08-17 22:00:37 +05:30
end
2014-09-02 18:07:02 +05:30
end
2016-06-02 11:05:42 +05:30
describe "Updates git attributes" do
context "for default branch" do
it "calls the copy attributes method for the first push to the default branch" do
expect(project.repository).to receive(:copy_gitattributes).with('master')
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: ref)
2016-06-02 11:05:42 +05:30
end
it "calls the copy attributes method for changes to the default branch" do
2017-09-10 17:25:29 +05:30
expect(project.repository).to receive(:copy_gitattributes).with(ref)
2016-06-02 11:05:42 +05:30
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2016-06-02 11:05:42 +05:30
end
end
context "for non-default branch" do
before do
# Make sure the "default" branch is different
allow(project).to receive(:default_branch).and_return('not-master')
end
it "does not call copy attributes method" do
expect(project.repository).not_to receive(:copy_gitattributes)
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2016-06-02 11:05:42 +05:30
end
end
end
describe "Webhooks" do
context "execute webhooks" do
2019-10-12 21:52:04 +05:30
before do
create(:project_hook, push_events: true, project: project)
end
2014-09-02 18:07:02 +05:30
it "when pushing a branch for the first time" do
2015-04-26 12:48:37 +05:30
expect(project).to receive(:execute_hooks)
expect(project.default_branch).to eq("master")
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: ref)
2016-09-13 17:45:13 +05:30
expect(project.protected_branches).not_to be_empty
2018-11-18 11:00:15 +05:30
expect(project.protected_branches.first.push_access_levels.map(&:access_level)).to eq([Gitlab::Access::MAINTAINER])
expect(project.protected_branches.first.merge_access_levels.map(&:access_level)).to eq([Gitlab::Access::MAINTAINER])
2014-09-02 18:07:02 +05:30
end
2015-04-26 12:48:37 +05:30
it "when pushing a branch for the first time with default branch protection disabled" do
2020-04-08 14:13:33 +05:30
expect(project.namespace).to receive(:default_branch_protection).and_return(Gitlab::Access::PROTECTION_NONE)
2015-04-26 12:48:37 +05:30
expect(project).to receive(:execute_hooks)
expect(project.default_branch).to eq("master")
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: ref)
2016-09-13 17:45:13 +05:30
expect(project.protected_branches).to be_empty
2014-09-02 18:07:02 +05:30
end
2015-04-26 12:48:37 +05:30
it "when pushing a branch for the first time with default branch protection set to 'developers can push'" do
2020-04-08 14:13:33 +05:30
expect(project.namespace).to receive(:default_branch_protection).and_return(Gitlab::Access::PROTECTION_DEV_CAN_PUSH)
2015-04-26 12:48:37 +05:30
expect(project).to receive(:execute_hooks)
expect(project.default_branch).to eq("master")
2016-08-24 12:49:21 +05:30
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: ref)
2016-09-13 17:45:13 +05:30
expect(project.protected_branches).not_to be_empty
expect(project.protected_branches.last.push_access_levels.map(&:access_level)).to eq([Gitlab::Access::DEVELOPER])
2018-11-18 11:00:15 +05:30
expect(project.protected_branches.last.merge_access_levels.map(&:access_level)).to eq([Gitlab::Access::MAINTAINER])
2016-08-24 12:49:21 +05:30
end
2016-09-29 09:46:39 +05:30
it "when pushing a branch for the first time with an existing branch permission configured" do
2020-04-08 14:13:33 +05:30
expect(project.namespace).to receive(:default_branch_protection).and_return(Gitlab::Access::PROTECTION_DEV_CAN_PUSH)
2016-09-29 09:46:39 +05:30
create(:protected_branch, :no_one_can_push, :developers_can_merge, project: project, name: 'master')
expect(project).to receive(:execute_hooks)
expect(project.default_branch).to eq("master")
2019-12-04 20:38:33 +05:30
expect(ProtectedBranches::CreateService).not_to receive(:new)
2016-09-29 09:46:39 +05:30
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: ref)
2016-09-29 09:46:39 +05:30
expect(project.protected_branches).not_to be_empty
expect(project.protected_branches.last.push_access_levels.map(&:access_level)).to eq([Gitlab::Access::NO_ACCESS])
expect(project.protected_branches.last.merge_access_levels.map(&:access_level)).to eq([Gitlab::Access::DEVELOPER])
end
2016-08-24 12:49:21 +05:30
it "when pushing a branch for the first time with default branch protection set to 'developers can merge'" do
2020-04-08 14:13:33 +05:30
expect(project.namespace).to receive(:default_branch_protection).and_return(Gitlab::Access::PROTECTION_DEV_CAN_MERGE)
2016-08-24 12:49:21 +05:30
expect(project).to receive(:execute_hooks)
expect(project.default_branch).to eq("master")
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: ref)
2016-09-13 17:45:13 +05:30
expect(project.protected_branches).not_to be_empty
2018-11-18 11:00:15 +05:30
expect(project.protected_branches.first.push_access_levels.map(&:access_level)).to eq([Gitlab::Access::MAINTAINER])
2016-09-13 17:45:13 +05:30
expect(project.protected_branches.first.merge_access_levels.map(&:access_level)).to eq([Gitlab::Access::DEVELOPER])
2015-04-26 12:48:37 +05:30
end
it "when pushing new commits to existing branch" do
expect(project).to receive(:execute_hooks)
2021-10-27 15:23:28 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2014-09-02 18:07:02 +05:30
end
end
end
describe "cross-reference notes" do
let(:issue) { create :issue, project: project }
let(:commit_author) { create :user }
2015-09-11 14:41:01 +05:30
let(:commit) { project.commit }
2014-09-02 18:07:02 +05:30
before do
2018-03-17 18:26:18 +05:30
project.add_developer(commit_author)
project.add_developer(user)
2016-06-02 11:05:42 +05:30
2015-09-11 14:41:01 +05:30
allow(commit).to receive_messages(
2015-10-24 18:46:33 +05:30
safe_message: "this commit \n mentions #{issue.to_reference}",
2014-09-02 18:07:02 +05:30
references: [issue],
author_name: commit_author.name,
author_email: commit_author.email
2015-09-11 14:41:01 +05:30
)
2016-06-02 11:05:42 +05:30
2017-09-10 17:25:29 +05:30
allow_any_instance_of(ProcessCommitWorker).to receive(:build_commit)
.and_return(commit)
2017-08-17 22:00:37 +05:30
2015-09-11 14:41:01 +05:30
allow(project.repository).to receive(:commits_between).and_return([commit])
2014-09-02 18:07:02 +05:30
end
2019-12-26 22:10:19 +05:30
it "creates a note if a pushed commit mentions an issue", :sidekiq_might_not_need_inline do
2015-09-11 14:41:01 +05:30
expect(SystemNoteService).to receive(:cross_reference).with(issue, commit, commit_author)
2014-09-02 18:07:02 +05:30
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2014-09-02 18:07:02 +05:30
end
it "only creates a cross-reference note if one doesn't already exist" do
2015-09-11 14:41:01 +05:30
SystemNoteService.cross_reference(issue, commit, user)
2014-09-02 18:07:02 +05:30
2015-09-11 14:41:01 +05:30
expect(SystemNoteService).not_to receive(:cross_reference).with(issue, commit, commit_author)
2014-09-02 18:07:02 +05:30
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2014-09-02 18:07:02 +05:30
end
2020-05-24 23:13:21 +05:30
it "defaults to the pushing user if the commit's author is not known", :sidekiq_inline, :use_clean_rails_redis_caching do
2015-09-11 14:41:01 +05:30
allow(commit).to receive_messages(
author_name: 'unknown name',
author_email: 'unknown@email.com'
)
expect(SystemNoteService).to receive(:cross_reference).with(issue, commit, user)
2014-09-02 18:07:02 +05:30
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2014-09-02 18:07:02 +05:30
end
2019-12-26 22:10:19 +05:30
it "finds references in the first push to a non-default branch", :sidekiq_might_not_need_inline do
2017-09-10 17:25:29 +05:30
allow(project.repository).to receive(:commits_between).with(blankrev, newrev).and_return([])
allow(project.repository).to receive(:commits_between).with("master", newrev).and_return([commit])
2014-09-02 18:07:02 +05:30
2015-09-11 14:41:01 +05:30
expect(SystemNoteService).to receive(:cross_reference).with(issue, commit, commit_author)
2014-09-02 18:07:02 +05:30
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: 'refs/heads/other')
2014-09-02 18:07:02 +05:30
end
end
2016-09-29 09:46:39 +05:30
describe "issue metrics" do
let(:issue) { create :issue, project: project }
let(:commit_author) { create :user }
let(:commit) { project.commit }
2020-05-24 23:13:21 +05:30
let(:commit_time) { Time.current }
2016-09-29 09:46:39 +05:30
before do
2018-03-17 18:26:18 +05:30
project.add_developer(commit_author)
project.add_developer(user)
2016-09-29 09:46:39 +05:30
allow(commit).to receive_messages(
safe_message: "this commit \n mentions #{issue.to_reference}",
references: [issue],
author_name: commit_author.name,
author_email: commit_author.email,
committed_date: commit_time
)
2017-09-10 17:25:29 +05:30
allow_any_instance_of(ProcessCommitWorker).to receive(:build_commit)
.and_return(commit)
2017-08-17 22:00:37 +05:30
2016-09-29 09:46:39 +05:30
allow(project.repository).to receive(:commits_between).and_return([commit])
end
context "while saving the 'first_mentioned_in_commit_at' metric for an issue" do
2020-05-24 23:13:21 +05:30
it 'sets the metric for referenced issues', :sidekiq_inline, :use_clean_rails_redis_caching do
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2016-09-29 09:46:39 +05:30
2016-11-03 12:29:30 +05:30
expect(issue.reload.metrics.first_mentioned_in_commit_at).to be_like_time(commit_time)
2016-09-29 09:46:39 +05:30
end
it 'does not set the metric for non-referenced issues' do
non_referenced_issue = create(:issue, project: project)
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2016-09-29 09:46:39 +05:30
expect(non_referenced_issue.reload.metrics.first_mentioned_in_commit_at).to be_nil
end
end
end
2015-09-25 12:07:36 +05:30
describe "closing issues from pushed commits containing a closing reference" do
2014-09-02 18:07:02 +05:30
let(:issue) { create :issue, project: project }
let(:other_issue) { create :issue, project: project }
let(:commit_author) { create :user }
2015-09-11 14:41:01 +05:30
let(:closing_commit) { project.commit }
2014-09-02 18:07:02 +05:30
before do
2015-09-11 14:41:01 +05:30
allow(closing_commit).to receive_messages(
2014-09-02 18:07:02 +05:30
issue_closing_regex: /^([Cc]loses|[Ff]ixes) #\d+/,
safe_message: "this is some work.\n\ncloses ##{issue.iid}",
author_name: commit_author.name,
author_email: commit_author.email
2015-09-11 14:41:01 +05:30
)
2014-09-02 18:07:02 +05:30
2017-09-10 17:25:29 +05:30
allow(project.repository).to receive(:commits_between)
.and_return([closing_commit])
2016-06-02 11:05:42 +05:30
2017-09-10 17:25:29 +05:30
allow_any_instance_of(ProcessCommitWorker).to receive(:build_commit)
.and_return(closing_commit)
2017-08-17 22:00:37 +05:30
2018-11-18 11:00:15 +05:30
project.add_maintainer(commit_author)
2014-09-02 18:07:02 +05:30
end
2015-09-25 12:07:36 +05:30
context "to default branches" do
2019-12-26 22:10:19 +05:30
it "closes issues", :sidekiq_might_not_need_inline do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2015-09-25 12:07:36 +05:30
expect(Issue.find(issue.id)).to be_closed
end
2014-09-02 18:07:02 +05:30
2019-12-26 22:10:19 +05:30
it "adds a note indicating that the issue is now closed", :sidekiq_might_not_need_inline do
2015-09-25 12:07:36 +05:30
expect(SystemNoteService).to receive(:change_status).with(issue, project, commit_author, "closed", closing_commit)
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2015-09-25 12:07:36 +05:30
end
2014-09-02 18:07:02 +05:30
2015-09-25 12:07:36 +05:30
it "doesn't create additional cross-reference notes" do
expect(SystemNoteService).not_to receive(:cross_reference)
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2015-09-25 12:07:36 +05:30
end
2014-09-02 18:07:02 +05:30
end
2015-09-11 14:41:01 +05:30
2015-09-25 12:07:36 +05:30
context "to non-default branches" do
before do
# Make sure the "default" branch is different
allow(project).to receive(:default_branch).and_return('not-master')
end
2020-05-24 23:13:21 +05:30
it "creates cross-reference notes", :sidekiq_inline, :use_clean_rails_redis_caching do
2015-09-25 12:07:36 +05:30
expect(SystemNoteService).to receive(:cross_reference).with(issue, closing_commit, commit_author)
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2015-09-25 12:07:36 +05:30
end
2015-09-11 14:41:01 +05:30
2015-09-25 12:07:36 +05:30
it "doesn't close issues" do
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2015-09-25 12:07:36 +05:30
expect(Issue.find(issue.id)).to be_opened
end
2015-09-11 14:41:01 +05:30
end
2015-12-23 02:04:40 +05:30
context "for jira issue tracker" do
include JiraServiceHelper
2021-09-30 23:02:18 +05:30
let(:jira_tracker) { project.create_jira_integration if project.jira_integration.nil? }
2015-12-23 02:04:40 +05:30
before do
2021-09-30 23:02:18 +05:30
# project.create_jira_integration doesn't seem to invalidate the cache here
2016-11-03 12:29:30 +05:30
project.has_external_issue_tracker = true
2021-09-30 23:02:18 +05:30
stub_jira_integration_test
jira_integration_settings
2017-08-17 22:00:37 +05:30
stub_jira_urls("JIRA-1")
2015-12-23 02:04:40 +05:30
allow(closing_commit).to receive_messages({
2017-09-10 17:25:29 +05:30
issue_closing_regex: Regexp.new(Gitlab.config.gitlab.issue_closing_pattern),
safe_message: message,
author_name: commit_author.name,
author_email: commit_author.email
})
allow(JIRA::Resource::Remotelink).to receive(:all).and_return([])
2015-12-23 02:04:40 +05:30
allow(project.repository).to receive_messages(commits_between: [closing_commit])
end
after do
jira_tracker.destroy!
end
context "mentioning an issue" do
let(:message) { "this is some work.\n\nrelated to JIRA-1" }
2020-05-24 23:13:21 +05:30
it "initiates one api call to jira server to mention the issue", :sidekiq_inline, :use_clean_rails_redis_caching do
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2015-12-23 02:04:40 +05:30
2017-08-17 22:00:37 +05:30
expect(WebMock).to have_requested(:post, jira_api_comment_url('JIRA-1')).with(
2015-12-23 02:04:40 +05:30
body: /mentioned this issue in/
).once
end
end
context "closing an issue" do
2019-03-02 22:35:43 +05:30
let(:message) { "this is some work.\n\ncloses JIRA-1" }
2017-09-10 17:25:29 +05:30
let(:comment_body) do
{
2020-03-13 15:44:24 +05:30
body: "Issue solved with [#{closing_commit.id}|http://#{Gitlab.config.gitlab.host}/#{project.full_path}/-/commit/#{closing_commit.id}]."
2017-09-10 17:25:29 +05:30
}.to_json
end
2017-08-17 22:00:37 +05:30
before do
open_issue = JIRA::Resource::Issue.new(jira_tracker.client, attrs: { "id" => "JIRA-1" })
closed_issue = open_issue.dup
allow(open_issue).to receive(:resolution).and_return(false)
allow(closed_issue).to receive(:resolution).and_return(true)
allow(JIRA::Resource::Issue).to receive(:find).and_return(open_issue, closed_issue)
allow_any_instance_of(JIRA::Resource::Issue).to receive(:key).and_return("JIRA-1")
end
2016-11-03 12:29:30 +05:30
2019-12-26 22:10:19 +05:30
context "using right markdown", :sidekiq_might_not_need_inline do
2016-11-03 12:29:30 +05:30
it "initiates one api call to jira server to close the issue" do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
expect(WebMock).to have_requested(:post, jira_api_transition_url('JIRA-1')).once
2016-11-03 12:29:30 +05:30
end
it "initiates one api call to jira server to comment on the issue" do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
expect(WebMock).to have_requested(:post, jira_api_comment_url('JIRA-1')).with(
2016-11-03 12:29:30 +05:30
body: comment_body
).once
end
2015-12-23 02:04:40 +05:30
end
2017-09-10 17:25:29 +05:30
context "using internal issue reference" do
context 'when internal issues are disabled' do
before do
project.issues_enabled = false
project.save!
end
let(:message) { "this is some work.\n\ncloses #1" }
it "does not initiates one api call to jira server to close the issue" do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2015-12-23 02:04:40 +05:30
2017-09-10 17:25:29 +05:30
expect(WebMock).not_to have_requested(:post, jira_api_transition_url('JIRA-1'))
end
2016-11-03 12:29:30 +05:30
2017-09-10 17:25:29 +05:30
it "does not initiates one api call to jira server to comment on the issue" do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
expect(WebMock).not_to have_requested(:post, jira_api_comment_url('JIRA-1')).with(
body: comment_body
).once
end
2016-11-03 12:29:30 +05:30
end
2019-12-26 22:10:19 +05:30
context 'when internal issues are enabled', :sidekiq_might_not_need_inline do
2017-09-10 17:25:29 +05:30
let(:issue) { create(:issue, project: project) }
let(:message) { "this is some work.\n\ncloses JIRA-1 \n\n closes #{issue.to_reference}" }
2016-11-03 12:29:30 +05:30
2017-09-10 17:25:29 +05:30
it "initiates one api call to jira server to close the jira issue" do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
expect(WebMock).to have_requested(:post, jira_api_transition_url('JIRA-1')).once
end
it "initiates one api call to jira server to comment on the jira issue" do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
expect(WebMock).to have_requested(:post, jira_api_comment_url('JIRA-1')).with(
body: comment_body
).once
end
it "closes the internal issue" do
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
expect(issue.reload).to be_closed
end
it "adds a note indicating that the issue is now closed" do
expect(SystemNoteService).to receive(:change_status)
.with(issue, project, commit_author, "closed", closing_commit)
2019-12-21 20:55:43 +05:30
execute_service(project, commit_author, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
end
2016-11-03 12:29:30 +05:30
end
2015-12-23 02:04:40 +05:30
end
end
end
2014-09-02 18:07:02 +05:30
end
2015-09-11 14:41:01 +05:30
describe "empty project" do
let(:project) { create(:project_empty_repo) }
2017-09-10 17:25:29 +05:30
let(:new_ref) { 'refs/heads/feature' }
2015-09-11 14:41:01 +05:30
before do
allow(project).to receive(:default_branch).and_return('feature')
expect(project).to receive(:change_head) { 'feature'}
end
it 'push to first branch updates HEAD' do
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: blankrev, newrev: newrev, ref: new_ref)
2015-09-11 14:41:01 +05:30
end
end
2016-04-02 18:10:28 +05:30
2019-07-31 22:56:46 +05:30
describe "CI environments" do
context 'create branch' do
let(:oldrev) { blankrev }
2017-08-17 22:00:37 +05:30
2019-07-31 22:56:46 +05:30
it 'does nothing' do
2021-10-27 15:23:28 +05:30
expect(::Environments::StopService).not_to receive(:new)
2017-08-17 22:00:37 +05:30
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2017-08-17 22:00:37 +05:30
end
end
2019-07-31 22:56:46 +05:30
context 'update branch' do
it 'does nothing' do
2021-10-27 15:23:28 +05:30
expect(::Environments::StopService).not_to receive(:new)
2017-08-17 22:00:37 +05:30
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2017-08-17 22:00:37 +05:30
end
end
2019-07-31 22:56:46 +05:30
context 'delete branch' do
let(:newrev) { blankrev }
2017-09-10 17:25:29 +05:30
2019-07-31 22:56:46 +05:30
it 'stops environments' do
2021-10-27 15:23:28 +05:30
expect_next_instance_of(::Environments::StopService) do |stop_service|
2019-07-31 22:56:46 +05:30
expect(stop_service.project).to eq(project)
expect(stop_service.current_user).to eq(user)
2021-10-27 15:23:28 +05:30
expect(stop_service).to receive(:execute_for_branch).with(branch)
2017-09-10 17:25:29 +05:30
end
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
end
2019-07-31 22:56:46 +05:30
end
end
2017-09-10 17:25:29 +05:30
2020-07-28 23:09:34 +05:30
describe 'artifacts' do
context 'create branch' do
let(:oldrev) { blankrev }
it 'does nothing' do
expect(::Ci::RefDeleteUnlockArtifactsWorker).not_to receive(:perform_async)
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
end
end
context 'update branch' do
it 'does nothing' do
expect(::Ci::RefDeleteUnlockArtifactsWorker).not_to receive(:perform_async)
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
end
end
context 'delete branch' do
let(:newrev) { blankrev }
it 'unlocks artifacts' do
expect(::Ci::RefDeleteUnlockArtifactsWorker)
.to receive(:perform_async).with(project.id, user.id, "refs/heads/#{branch}")
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
end
end
end
2019-07-31 22:56:46 +05:30
describe 'Hooks' do
context 'run on a branch' do
it 'delegates to Git::BranchHooksService' do
expect_next_instance_of(::Git::BranchHooksService) do |hooks_service|
expect(hooks_service.project).to eq(project)
expect(hooks_service.current_user).to eq(user)
expect(hooks_service.params).to include(
2019-12-21 20:55:43 +05:30
change: {
oldrev: oldrev,
newrev: newrev,
ref: ref
}
2019-07-31 22:56:46 +05:30
)
2018-11-18 11:00:15 +05:30
2019-07-31 22:56:46 +05:30
expect(hooks_service).to receive(:execute)
2018-11-18 11:00:15 +05:30
end
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
end
end
2019-07-31 22:56:46 +05:30
context 'run on a tag' do
let(:ref) { 'refs/tags/v1.1.0' }
2017-09-10 17:25:29 +05:30
2019-07-31 22:56:46 +05:30
it 'does nothing' do
expect(::Git::BranchHooksService).not_to receive(:new)
2017-09-10 17:25:29 +05:30
2019-12-21 20:55:43 +05:30
execute_service(project, user, oldrev: oldrev, newrev: newrev, ref: ref)
2017-09-10 17:25:29 +05:30
end
end
2017-08-17 22:00:37 +05:30
end
2020-03-13 15:44:24 +05:30
def execute_service(project, user, change, push_options = {})
service = described_class.new(project, user, change: change, push_options: push_options)
2016-04-02 18:10:28 +05:30
service.execute
service
end
2020-11-24 15:15:51 +05:30
context 'Jira Connect hooks' do
let_it_be(:project) { create(:project, :repository) }
2021-09-30 23:02:18 +05:30
2020-11-24 15:15:51 +05:30
let(:branch_to_sync) { nil }
let(:commits_to_sync) { [] }
let(:params) do
{ change: { oldrev: oldrev, newrev: newrev, ref: ref } }
end
subject do
described_class.new(project, user, params)
end
shared_examples 'enqueues Jira sync worker' do
2021-02-22 17:27:13 +05:30
specify :aggregate_failures do
2020-11-24 15:15:51 +05:30
Sidekiq::Testing.fake! do
expect(JiraConnect::SyncBranchWorker).to receive(:perform_async)
2021-02-22 17:27:13 +05:30
.with(project.id, branch_to_sync, commits_to_sync, kind_of(Numeric))
2020-11-24 15:15:51 +05:30
.and_call_original
expect { subject.execute }.to change(JiraConnect::SyncBranchWorker.jobs, :size).by(1)
end
end
end
shared_examples 'does not enqueue Jira sync worker' do
specify do
Sidekiq::Testing.fake! do
expect { subject.execute }.not_to change(JiraConnect::SyncBranchWorker.jobs, :size)
end
end
end
context 'with a Jira subscription' do
before do
create(:jira_connect_subscription, namespace: project.namespace)
end
context 'branch name contains Jira issue key' do
let(:branch_to_sync) { 'branch-JIRA-123' }
let(:ref) { "refs/heads/#{branch_to_sync}" }
it_behaves_like 'enqueues Jira sync worker'
end
context 'commit message contains Jira issue key' do
let(:commits_to_sync) { [newrev] }
before do
allow_any_instance_of(Commit).to receive(:safe_message).and_return('Commit with key JIRA-123')
end
it_behaves_like 'enqueues Jira sync worker'
end
context 'branch name and commit message does not contain Jira issue key' do
it_behaves_like 'does not enqueue Jira sync worker'
end
end
context 'without a Jira subscription' do
it_behaves_like 'does not enqueue Jira sync worker'
end
end
2015-09-11 14:41:01 +05:30
end