118 lines
3 KiB
Ruby
118 lines
3 KiB
Ruby
|
require 'spec_helper'
|
||
|
|
||
|
describe Gitlab::Ci::Config::Entry::Policy do
|
||
|
let(:entry) { described_class.new(config) }
|
||
|
|
||
|
context 'when using simplified policy' do
|
||
|
describe 'validations' do
|
||
|
context 'when entry config value is valid' do
|
||
|
context 'when config is a branch or tag name' do
|
||
|
let(:config) { %w[master feature/branch] }
|
||
|
|
||
|
describe '#valid?' do
|
||
|
it 'is valid' do
|
||
|
expect(entry).to be_valid
|
||
|
end
|
||
|
end
|
||
|
|
||
|
describe '#value' do
|
||
|
it 'returns refs hash' do
|
||
|
expect(entry.value).to eq(refs: config)
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when config is a regexp' do
|
||
|
let(:config) { ['/^issue-.*$/'] }
|
||
|
|
||
|
describe '#valid?' do
|
||
|
it 'is valid' do
|
||
|
expect(entry).to be_valid
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when config is a special keyword' do
|
||
|
let(:config) { %w[tags triggers branches] }
|
||
|
|
||
|
describe '#valid?' do
|
||
|
it 'is valid' do
|
||
|
expect(entry).to be_valid
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when entry value is not valid' do
|
||
|
let(:config) { [1] }
|
||
|
|
||
|
describe '#errors' do
|
||
|
it 'saves errors' do
|
||
|
expect(entry.errors)
|
||
|
.to include /policy config should be an array of strings or regexps/
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when using complex policy' do
|
||
|
context 'when specifiying refs policy' do
|
||
|
let(:config) { { refs: ['master'] } }
|
||
|
|
||
|
it 'is a correct configuraton' do
|
||
|
expect(entry).to be_valid
|
||
|
expect(entry.value).to eq(refs: %w[master])
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when specifying kubernetes policy' do
|
||
|
let(:config) { { kubernetes: 'active' } }
|
||
|
|
||
|
it 'is a correct configuraton' do
|
||
|
expect(entry).to be_valid
|
||
|
expect(entry.value).to eq(kubernetes: 'active')
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when specifying invalid kubernetes policy' do
|
||
|
let(:config) { { kubernetes: 'something' } }
|
||
|
|
||
|
it 'reports an error about invalid policy' do
|
||
|
expect(entry.errors).to include /unknown value: something/
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when specifying unknown policy' do
|
||
|
let(:config) { { refs: ['master'], invalid: :something } }
|
||
|
|
||
|
it 'returns error about invalid key' do
|
||
|
expect(entry.errors).to include /unknown keys: invalid/
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when policy is empty' do
|
||
|
let(:config) { {} }
|
||
|
|
||
|
it 'is not a valid configuration' do
|
||
|
expect(entry.errors).to include /can't be blank/
|
||
|
end
|
||
|
end
|
||
|
end
|
||
|
|
||
|
context 'when policy strategy does not match' do
|
||
|
let(:config) { 'string strategy' }
|
||
|
|
||
|
it 'returns information about errors' do
|
||
|
expect(entry.errors)
|
||
|
.to include /has to be either an array of conditions or a hash/
|
||
|
end
|
||
|
end
|
||
|
|
||
|
describe '.default' do
|
||
|
it 'does not have a default value' do
|
||
|
expect(described_class.default).to be_nil
|
||
|
end
|
||
|
end
|
||
|
end
|