debian-mirror-gitlab/spec/graphql/mutations/environments/canary_ingress/update_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

82 lines
2.4 KiB
Ruby
Raw Normal View History

2021-02-22 17:27:13 +05:30
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Mutations::Environments::CanaryIngress::Update do
let_it_be(:project) { create(:project) }
let_it_be(:environment) { create(:environment, project: project) }
let_it_be(:maintainer) { create(:user) }
let_it_be(:reporter) { create(:user) }
2021-09-30 23:02:18 +05:30
2021-02-22 17:27:13 +05:30
let(:user) { maintainer }
subject(:mutation) { described_class.new(object: nil, context: { current_user: user }, field: nil) }
before_all do
project.add_maintainer(maintainer)
project.add_reporter(reporter)
end
describe '#resolve' do
subject { mutation.resolve(id: environment_id, weight: weight) }
let(:environment_id) { environment.to_global_id.to_s }
let(:weight) { 50 }
let(:update_service) { double('update_service') }
before do
allow(Environments::CanaryIngress::UpdateService).to receive(:new) { update_service }
end
context 'when service execution succeeded' do
before do
allow(update_service).to receive(:execute_async) { { status: :success } }
end
it 'returns no errors' do
expect(subject[:errors]).to be_empty
end
2022-06-21 17:19:12 +05:30
context 'with certificate_based_clusters disabled' do
before do
stub_feature_flags(certificate_based_clusters: false)
end
it 'returns notice about feature removal' do
expect(subject[:errors]).to match_array([
'This endpoint was deactivated as part of the certificate-based' \
'kubernetes integration removal. See Epic:' \
'https://gitlab.com/groups/gitlab-org/configure/-/epics/8'
])
end
end
2021-02-22 17:27:13 +05:30
end
context 'when service encounters a problem' do
before do
allow(update_service).to receive(:execute_async) { { status: :error, message: 'something went wrong' } }
end
it 'returns an error' do
expect(subject[:errors]).to eq(['something went wrong'])
end
end
context 'when environment is not found' do
let(:environment_id) { non_existing_record_id.to_s }
it 'raises an error' do
expect { subject }.to raise_error(GraphQL::CoercionError)
end
end
context 'when user is reporter who does not have permission to access the environment' do
let(:user) { reporter }
it 'raises an error' do
2021-12-11 22:18:48 +05:30
expect { subject }.to raise_error(Gitlab::Graphql::Authorize::AuthorizeResource::RESOURCE_ACCESS_ERROR)
2021-02-22 17:27:13 +05:30
end
end
end
end