debian-mirror-gitlab/spec/models/ci/job_artifact_spec.rb

552 lines
16 KiB
Ruby
Raw Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2018-03-17 18:26:18 +05:30
require 'spec_helper'
2020-07-28 23:09:34 +05:30
RSpec.describe Ci::JobArtifact do
2018-10-15 14:42:47 +05:30
let(:artifact) { create(:ci_job_artifact, :archive) }
2018-03-17 18:26:18 +05:30
describe "Associations" do
it { is_expected.to belong_to(:project) }
it { is_expected.to belong_to(:job) }
end
it { is_expected.to respond_to(:file) }
it { is_expected.to respond_to(:created_at) }
it { is_expected.to respond_to(:updated_at) }
it { is_expected.to delegate_method(:open).to(:file) }
it { is_expected.to delegate_method(:exists?).to(:file) }
2019-02-15 15:39:39 +05:30
it_behaves_like 'having unique enum values'
2021-01-03 14:25:43 +05:30
it_behaves_like 'UpdateProjectStatistics', :with_counter_attribute do
2020-11-24 15:15:51 +05:30
let_it_be(:job, reload: true) { create(:ci_build) }
subject { build(:ci_job_artifact, :archive, job: job, size: 107464) }
2019-09-04 21:01:54 +05:30
end
2020-06-23 00:09:42 +05:30
describe '.not_expired' do
it 'returns artifacts that have not expired' do
_expired_artifact = create(:ci_job_artifact, :expired)
expect(described_class.not_expired).to contain_exactly(artifact)
end
end
2019-09-04 21:01:54 +05:30
describe '.with_reports' do
let!(:artifact) { create(:ci_job_artifact, :archive) }
subject { described_class.with_reports }
it { is_expected.to be_empty }
context 'when there are reports' do
let!(:metrics_report) { create(:ci_job_artifact, :junit) }
let!(:codequality_report) { create(:ci_job_artifact, :codequality) }
2021-01-03 14:25:43 +05:30
it { is_expected.to match_array([metrics_report, codequality_report]) }
2019-09-04 21:01:54 +05:30
end
end
2018-11-18 11:00:15 +05:30
describe '.test_reports' do
subject { described_class.test_reports }
context 'when there is a test report' do
let!(:artifact) { create(:ci_job_artifact, :junit) }
it { is_expected.to eq([artifact]) }
end
context 'when there are no test reports' do
let!(:artifact) { create(:ci_job_artifact, :archive) }
it { is_expected.to be_empty }
end
end
2020-05-24 23:13:21 +05:30
describe '.accessibility_reports' do
subject { described_class.accessibility_reports }
context 'when there is an accessibility report' do
let(:artifact) { create(:ci_job_artifact, :accessibility) }
it { is_expected.to eq([artifact]) }
end
context 'when there are no accessibility report' do
let(:artifact) { create(:ci_job_artifact, :archive) }
it { is_expected.to be_empty }
end
end
2020-04-08 14:13:33 +05:30
describe '.coverage_reports' do
subject { described_class.coverage_reports }
context 'when there is a coverage report' do
let!(:artifact) { create(:ci_job_artifact, :cobertura) }
it { is_expected.to eq([artifact]) }
end
context 'when there are no coverage reports' do
let!(:artifact) { create(:ci_job_artifact, :archive) }
it { is_expected.to be_empty }
end
end
2020-05-24 23:13:21 +05:30
describe '.terraform_reports' do
context 'when there is a terraform report' do
it 'return the job artifact' do
artifact = create(:ci_job_artifact, :terraform)
expect(described_class.terraform_reports).to eq([artifact])
end
end
context 'when there are no terraform reports' do
it 'return the an empty array' do
expect(described_class.terraform_reports).to eq([])
end
end
end
2020-07-28 23:09:34 +05:30
describe '.associated_file_types_for' do
using RSpec::Parameterized::TableSyntax
subject { Ci::JobArtifact.associated_file_types_for(file_type) }
where(:file_type, :result) do
'codequality' | %w(codequality)
'quality' | nil
end
with_them do
it { is_expected.to eq result }
end
end
2018-12-05 23:21:45 +05:30
describe '.erasable' do
subject { described_class.erasable }
context 'when there is an erasable artifact' do
let!(:artifact) { create(:ci_job_artifact, :junit) }
it { is_expected.to eq([artifact]) }
end
context 'when there are no erasable artifacts' do
let!(:artifact) { create(:ci_job_artifact, :trace) }
it { is_expected.to be_empty }
end
end
2020-06-23 00:09:42 +05:30
describe '.downloadable' do
subject { described_class.downloadable }
it 'filters for downloadable artifacts' do
downloadable_artifact = create(:ci_job_artifact, :codequality)
_not_downloadable_artifact = create(:ci_job_artifact, :trace)
expect(subject).to contain_exactly(downloadable_artifact)
end
end
2019-10-12 21:52:04 +05:30
describe '.archived_trace_exists_for?' do
subject { described_class.archived_trace_exists_for?(job_id) }
let!(:artifact) { create(:ci_job_artifact, :trace, job: job) }
let(:job) { create(:ci_build) }
context 'when the specified job_id exists' do
let(:job_id) { job.id }
it { is_expected.to be_truthy }
context 'when the job does have archived trace' do
let!(:artifact) { }
it { is_expected.to be_falsy }
end
end
context 'when the specified job_id does not exist' do
let(:job_id) { 10000 }
it { is_expected.to be_falsy }
end
end
2020-03-13 15:44:24 +05:30
describe '.for_sha' do
2020-05-24 23:13:21 +05:30
let(:first_pipeline) { create(:ci_pipeline) }
let(:second_pipeline) { create(:ci_pipeline, project: first_pipeline.project, sha: Digest::SHA1.hexdigest(SecureRandom.hex)) }
let!(:first_artifact) { create(:ci_job_artifact, job: create(:ci_build, pipeline: first_pipeline)) }
let!(:second_artifact) { create(:ci_job_artifact, job: create(:ci_build, pipeline: second_pipeline)) }
2020-03-13 15:44:24 +05:30
it 'returns job artifacts for a given pipeline sha' do
2020-05-24 23:13:21 +05:30
expect(described_class.for_sha(first_pipeline.sha, first_pipeline.project.id)).to eq([first_artifact])
expect(described_class.for_sha(second_pipeline.sha, first_pipeline.project.id)).to eq([second_artifact])
end
end
2020-03-13 15:44:24 +05:30
2020-04-22 19:07:51 +05:30
describe '.for_job_name' do
it 'returns job artifacts for a given job name' do
first_job = create(:ci_build, name: 'first')
second_job = create(:ci_build, name: 'second')
first_artifact = create(:ci_job_artifact, job: first_job)
second_artifact = create(:ci_job_artifact, job: second_job)
expect(described_class.for_job_name(first_job.name)).to eq([first_artifact])
expect(described_class.for_job_name(second_job.name)).to eq([second_artifact])
end
end
2018-05-09 12:01:36 +05:30
describe 'callbacks' do
describe '#schedule_background_upload' do
2020-05-24 23:13:21 +05:30
subject { create(:ci_job_artifact, :archive) }
2018-05-09 12:01:36 +05:30
context 'when object storage is disabled' do
before do
stub_artifacts_object_storage(enabled: false)
end
it 'does not schedule the migration' do
2018-11-08 19:23:39 +05:30
expect(ObjectStorage::BackgroundMoveWorker).not_to receive(:perform_async)
2018-05-09 12:01:36 +05:30
subject
end
end
context 'when object storage is enabled' do
context 'when background upload is enabled' do
before do
stub_artifacts_object_storage(background_upload: true)
end
it 'schedules the model for migration' do
expect(ObjectStorage::BackgroundMoveWorker).to receive(:perform_async).with('JobArtifactUploader', described_class.name, :file, kind_of(Numeric))
subject
end
end
context 'when background upload is disabled' do
before do
stub_artifacts_object_storage(background_upload: false)
end
it 'schedules the model for migration' do
expect(ObjectStorage::BackgroundMoveWorker).not_to receive(:perform_async)
subject
end
end
end
end
end
2018-10-15 14:42:47 +05:30
context 'creating the artifact' do
let(:project) { create(:project) }
let(:artifact) { create(:ci_job_artifact, :archive, project: project) }
it 'sets the size from the file size' do
2020-04-08 14:13:33 +05:30
expect(artifact.size).to eq(107464)
2018-03-17 18:26:18 +05:30
end
2018-10-15 14:42:47 +05:30
end
context 'updating the artifact file' do
it 'updates the artifact size' do
2018-11-08 19:23:39 +05:30
artifact.update!(file: fixture_file_upload('spec/fixtures/dk.png'))
2018-10-15 14:42:47 +05:30
expect(artifact.size).to eq(1062)
end
2018-03-17 18:26:18 +05:30
end
2020-05-24 23:13:21 +05:30
describe 'validates if file format is supported' do
subject { artifact }
let(:artifact) { build(:ci_job_artifact, file_type: :license_management, file_format: :raw) }
context 'when license_management is supported' do
before do
stub_feature_flags(drop_license_management_artifact: false)
end
it { is_expected.to be_valid }
end
context 'when license_management is not supported' do
before do
stub_feature_flags(drop_license_management_artifact: true)
end
it { is_expected.not_to be_valid }
end
end
2018-11-18 11:00:15 +05:30
describe 'validates file format' do
subject { artifact }
2020-05-24 23:13:21 +05:30
before do
stub_feature_flags(drop_license_management_artifact: false)
end
2018-12-05 23:21:45 +05:30
described_class::TYPE_AND_FORMAT_PAIRS.except(:trace).each do |file_type, file_format|
context "when #{file_type} type with #{file_format} format" do
let(:artifact) { build(:ci_job_artifact, file_type: file_type, file_format: file_format) }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
it { is_expected.to be_valid }
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
context "when #{file_type} type without format specification" do
let(:artifact) { build(:ci_job_artifact, file_type: file_type, file_format: nil) }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
it { is_expected.not_to be_valid }
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
context "when #{file_type} type with other formats" do
described_class.file_formats.except(file_format).values.each do |other_format|
let(:artifact) { build(:ci_job_artifact, file_type: file_type, file_format: other_format) }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
it { is_expected.not_to be_valid }
end
end
2018-11-18 11:00:15 +05:30
end
2018-12-05 23:21:45 +05:30
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
describe 'validates DEFAULT_FILE_NAMES' do
subject { described_class::DEFAULT_FILE_NAMES }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
described_class.file_types.each do |file_type, _|
it "expects #{file_type} to be included" do
is_expected.to include(file_type.to_sym)
end
2018-11-18 11:00:15 +05:30
end
2018-12-05 23:21:45 +05:30
end
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
describe 'validates TYPE_AND_FORMAT_PAIRS' do
subject { described_class::TYPE_AND_FORMAT_PAIRS }
2018-11-18 11:00:15 +05:30
2018-12-05 23:21:45 +05:30
described_class.file_types.each do |file_type, _|
it "expects #{file_type} to be included" do
expect(described_class.file_formats).to include(subject[file_type.to_sym])
end
2018-11-18 11:00:15 +05:30
end
end
2018-03-17 18:26:18 +05:30
describe '#file' do
subject { artifact.file }
context 'the uploader api' do
it { is_expected.to respond_to(:store_dir) }
it { is_expected.to respond_to(:cache_dir) }
it { is_expected.to respond_to(:work_dir) }
end
end
2020-06-23 00:09:42 +05:30
describe 'expired?' do
subject { artifact.expired? }
context 'when expire_at is nil' do
let(:artifact) { build(:ci_job_artifact, expire_at: nil) }
it 'returns false' do
is_expected.to be_falsy
end
end
context 'when expire_at is in the past' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.yesterday) }
it 'returns true' do
is_expected.to be_truthy
end
end
context 'when expire_at is in the future' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.tomorrow) }
it 'returns false' do
is_expected.to be_falsey
end
end
end
describe '#expiring?' do
subject { artifact.expiring? }
context 'when expire_at is nil' do
let(:artifact) { build(:ci_job_artifact, expire_at: nil) }
it 'returns false' do
is_expected.to be_falsy
end
end
context 'when expire_at is in the past' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.yesterday) }
it 'returns false' do
is_expected.to be_falsy
end
end
context 'when expire_at is in the future' do
let(:artifact) { build(:ci_job_artifact, expire_at: Date.tomorrow) }
it 'returns true' do
is_expected.to be_truthy
end
end
end
2018-03-17 18:26:18 +05:30
describe '#expire_in' do
subject { artifact.expire_in }
it { is_expected.to be_nil }
context 'when expire_at is specified' do
2020-06-23 00:09:42 +05:30
let(:expire_at) { Time.current + 7.days }
2018-03-17 18:26:18 +05:30
before do
artifact.expire_at = expire_at
end
2020-06-23 00:09:42 +05:30
it { is_expected.to be_within(5).of(expire_at - Time.current) }
2018-03-17 18:26:18 +05:30
end
end
describe '#expire_in=' do
subject { artifact.expire_in }
it 'when assigning valid duration' do
artifact.expire_in = '7 days'
is_expected.to be_within(10).of(7.days.to_i)
end
it 'when assigning invalid duration' do
expect { artifact.expire_in = '7 elephants' }.to raise_error(ChronicDuration::DurationParseError)
is_expected.to be_nil
end
it 'when resetting value' do
artifact.expire_in = nil
is_expected.to be_nil
end
it 'when setting to 0' do
artifact.expire_in = '0'
is_expected.to be_nil
end
end
2018-05-09 12:01:36 +05:30
describe 'file is being stored' do
subject { create(:ci_job_artifact, :archive) }
context 'when existing object has local store' do
2020-10-24 23:57:45 +05:30
it_behaves_like 'mounted file in local store'
2018-05-09 12:01:36 +05:30
end
context 'when direct upload is enabled' do
before do
stub_artifacts_object_storage(direct_upload: true)
end
context 'when file is stored' do
2020-10-24 23:57:45 +05:30
it_behaves_like 'mounted file in object store'
2018-05-09 12:01:36 +05:30
end
end
end
2020-07-28 23:09:34 +05:30
describe '.file_types' do
context 'all file types have corresponding limit' do
let_it_be(:plan_limits) { create(:plan_limits) }
where(:file_type) do
described_class.file_types.keys
end
with_them do
let(:limit_name) { "#{described_class::PLAN_LIMIT_PREFIX}#{file_type}" }
it { expect(plan_limits.attributes).to include(limit_name), file_type_limit_failure_message(file_type, limit_name) }
end
end
end
describe '.max_artifact_size' do
let(:build) { create(:ci_build) }
subject(:max_size) { described_class.max_artifact_size(type: artifact_type, project: build.project) }
context 'when file type is supported' do
let(:project_closest_setting) { 1024 }
let(:artifact_type) { 'junit' }
2020-10-24 23:57:45 +05:30
let(:limit_name) { "#{described_class::PLAN_LIMIT_PREFIX}#{artifact_type}" }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
let!(:plan_limits) { create(:plan_limits, :default_plan) }
2020-07-28 23:09:34 +05:30
shared_examples_for 'basing off the project closest setting' do
it { is_expected.to eq(project_closest_setting.megabytes.to_i) }
end
shared_examples_for 'basing off the plan limit' do
it { is_expected.to eq(max_size_for_type.megabytes.to_i) }
end
2020-10-24 23:57:45 +05:30
before do
allow(build.project).to receive(:closest_setting).with(:max_artifacts_size).and_return(project_closest_setting)
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and plan limit is disabled for the given artifact type' do
before do
plan_limits.update!(limit_name => 0)
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it_behaves_like 'basing off the project closest setting'
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and project closest setting results to zero' do
let(:project_closest_setting) { 0 }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it { is_expected.to eq(0) }
2020-07-28 23:09:34 +05:30
end
2020-10-24 23:57:45 +05:30
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and plan limit is enabled for the given artifact type' do
before do
plan_limits.update!(limit_name => max_size_for_type)
end
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
context 'and plan limit is smaller than project setting' do
let(:max_size_for_type) { project_closest_setting - 1 }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it_behaves_like 'basing off the plan limit'
2020-07-28 23:09:34 +05:30
end
2020-10-24 23:57:45 +05:30
context 'and plan limit is larger than project setting' do
let(:max_size_for_type) { project_closest_setting + 1 }
2020-07-28 23:09:34 +05:30
2020-10-24 23:57:45 +05:30
it_behaves_like 'basing off the project closest setting'
end
2020-07-28 23:09:34 +05:30
end
end
end
def file_type_limit_failure_message(type, limit_name)
<<~MSG
The artifact type `#{type}` is missing its counterpart plan limit which is expected to be named `#{limit_name}`.
Please refer to https://docs.gitlab.com/ee/development/application_limits.html on how to add new plan limit columns.
Take note that while existing max size plan limits default to 0, succeeding new limits are recommended to have
2020-10-24 23:57:45 +05:30
non-zero default values. Also, remember to update the plan limits documentation (doc/administration/instance_limits.md)
when changes or new entries are made.
2020-07-28 23:09:34 +05:30
MSG
end
2018-03-17 18:26:18 +05:30
end