debian-mirror-gitlab/spec/controllers/projects/jobs_controller_spec.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1601 lines
49 KiB
Ruby
Raw Normal View History

2019-07-31 22:56:46 +05:30
# frozen_string_literal: true
2017-08-17 22:00:37 +05:30
require 'spec_helper'
2023-06-20 00:43:36 +05:30
RSpec.describe Projects::JobsController, :clean_gitlab_redis_shared_state, feature_category: :continuous_integration, factory_default: :keep do
2017-08-17 22:00:37 +05:30
include ApiHelpers
2018-05-09 12:01:36 +05:30
include HttpIOHelpers
2017-08-17 22:00:37 +05:30
2023-06-20 00:43:36 +05:30
let_it_be(:namespace) { create_default(:namespace) }
2022-10-11 01:57:18 +05:30
let_it_be(:project) { create(:project, :public, :repository) }
2023-06-20 00:43:36 +05:30
let_it_be(:merge_request) { create(:merge_request, source_project: project) }
2022-10-11 01:57:18 +05:30
let_it_be(:owner) { create(:owner) }
let_it_be(:admin) { create(:admin) }
let_it_be(:maintainer) { create(:user) }
let_it_be(:developer) { create(:user) }
let_it_be(:reporter) { create(:user) }
let_it_be(:guest) { create(:user) }
before_all do
project.add_owner(owner)
project.add_maintainer(maintainer)
project.add_developer(developer)
project.add_reporter(reporter)
project.add_guest(guest)
2023-06-20 00:43:36 +05:30
create_default(:owner)
create_default(:user)
create_default(:ci_trigger_request)
create_default(:ci_stage)
2022-10-11 01:57:18 +05:30
end
let(:user) { developer }
2023-06-20 00:43:36 +05:30
let_it_be_with_reload(:pipeline) { create(:ci_pipeline, project: project) }
let_it_be(:default_pipeline) { create_default(:ci_pipeline) }
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
before do
2018-10-15 14:42:47 +05:30
stub_feature_flags(ci_enable_live_trace: true)
2017-09-10 17:25:29 +05:30
stub_not_protect_default_branch
end
2017-08-17 22:00:37 +05:30
describe 'GET index' do
context 'when scope is pending' do
before do
create(:ci_build, :pending, pipeline: pipeline)
get_index(scope: 'pending')
end
it 'has only pending builds' do
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-08-17 22:00:37 +05:30
expect(assigns(:builds).first.status).to eq('pending')
end
end
context 'when scope is running' do
before do
create(:ci_build, :running, pipeline: pipeline)
get_index(scope: 'running')
end
2017-09-10 17:25:29 +05:30
it 'has only running jobs' do
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-08-17 22:00:37 +05:30
expect(assigns(:builds).first.status).to eq('running')
end
end
context 'when scope is finished' do
before do
create(:ci_build, :success, pipeline: pipeline)
get_index(scope: 'finished')
end
2017-09-10 17:25:29 +05:30
it 'has only finished jobs' do
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-08-17 22:00:37 +05:30
expect(assigns(:builds).first.status).to eq('success')
end
end
context 'when page is specified' do
let(:last_page) { project.builds.page.total_pages }
context 'when page number is eligible' do
before do
create_list(:ci_build, 2, pipeline: pipeline)
get_index(page: last_page.to_param)
end
it 'redirects to the page' do
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-08-17 22:00:37 +05:30
expect(assigns(:builds).current_page).to eq(last_page)
end
end
end
context 'number of queries' do
2019-09-30 21:07:59 +05:30
render_views
2017-08-17 22:00:37 +05:30
before do
Ci::Build::AVAILABLE_STATUSES.each do |status|
2017-09-10 17:25:29 +05:30
create_job(status, status)
2017-08-17 22:00:37 +05:30
end
2019-09-30 21:07:59 +05:30
allow(Appearance).to receive(:current_without_cache)
.and_return(nil)
2017-08-17 22:00:37 +05:30
end
2017-09-10 17:25:29 +05:30
it 'verifies number of queries', :request_store do
2019-09-30 21:07:59 +05:30
expect { get_index }.not_to be_n_plus_1_query.with_threshold(3)
2017-08-17 22:00:37 +05:30
end
2017-09-10 17:25:29 +05:30
def create_job(name, status)
2019-09-30 21:07:59 +05:30
user = create(:user)
pipeline = create(:ci_pipeline, project: project, user: user)
2023-05-27 22:25:52 +05:30
create(
:ci_build, :tags, :triggered, :artifacts,
pipeline: pipeline, name: name, status: status, user: user
)
2017-08-17 22:00:37 +05:30
end
end
def get_index(**extra_params)
params = {
namespace_id: project.namespace.to_param,
project_id: project
}
2019-02-15 15:39:39 +05:30
get :index, params: params.merge(extra_params)
2017-08-17 22:00:37 +05:30
end
end
2019-09-04 21:01:54 +05:30
describe 'GET show', :request_store do
2017-09-10 17:25:29 +05:30
let!(:job) { create(:ci_build, :failed, pipeline: pipeline) }
2018-11-08 19:23:39 +05:30
let!(:second_job) { create(:ci_build, :failed, pipeline: pipeline) }
let!(:third_job) { create(:ci_build, :failed) }
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
context 'when requesting HTML' do
context 'when job exists' do
2021-02-22 17:27:13 +05:30
let(:extra_params) { { id: job.id } }
2017-09-10 17:25:29 +05:30
it 'has a job' do
2021-02-22 17:27:13 +05:30
get_show(**extra_params)
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:ok)
2017-09-10 17:25:29 +05:30
expect(assigns(:build).id).to eq(job.id)
end
2017-08-17 22:00:37 +05:30
end
2017-09-10 17:25:29 +05:30
context 'when job does not exist' do
before do
2020-04-22 19:07:51 +05:30
get_show(id: non_existing_record_id)
2017-09-10 17:25:29 +05:30
end
it 'renders not_found' do
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2017-09-10 17:25:29 +05:30
end
2017-08-17 22:00:37 +05:30
end
end
2017-09-10 17:25:29 +05:30
context 'when requesting JSON' do
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2017-09-10 17:25:29 +05:30
2017-08-17 22:00:37 +05:30
before do
2017-09-10 17:25:29 +05:30
sign_in(user)
2019-09-04 21:01:54 +05:30
allow_any_instance_of(Ci::Build)
.to receive(:merge_request)
.and_return(merge_request)
end
2020-01-01 13:55:28 +05:30
it 'does not serialize builds in exposed stages' do
2019-09-04 21:01:54 +05:30
get_show_json
2017-09-10 17:25:29 +05:30
2019-09-04 21:01:54 +05:30
json_response.dig('pipeline', 'details', 'stages').tap do |stages|
2019-10-12 21:52:04 +05:30
expect(stages.flat_map(&:keys))
2019-09-04 21:01:54 +05:30
.to eq %w[name title status path dropdown_path]
end
2017-08-17 22:00:37 +05:30
end
2018-11-20 20:47:30 +05:30
context 'when job failed' do
it 'exposes needed information' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-11-20 20:47:30 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['raw_path']).to match(%r{jobs/\d+/raw\z})
2018-12-13 13:39:08 +05:30
expect(json_response['merge_request']['path']).to match(%r{merge_requests/\d+\z})
2018-11-20 20:47:30 +05:30
expect(json_response['new_issue_path']).to include('/issues/new')
end
end
2018-12-13 13:39:08 +05:30
context 'when job is running' do
2019-09-04 21:01:54 +05:30
before do
get_show_json
end
2018-12-13 13:39:08 +05:30
context 'job is cancelable' do
let(:job) { create(:ci_build, :running, pipeline: pipeline) }
2020-01-01 13:55:28 +05:30
it 'cancel_path is present with correct redirect' do
2018-12-13 13:39:08 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['cancel_path']).to include(CGI.escape(json_response['build_path']))
end
end
context 'with web terminal' do
2022-06-02 21:05:25 +05:30
let(:job) { create(:ci_build, :running, :with_runner_session, pipeline: pipeline, user: user) }
2018-12-13 13:39:08 +05:30
2020-01-01 13:55:28 +05:30
it 'exposes the terminal path' do
2018-12-13 13:39:08 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['terminal_path']).to match(%r{/terminal})
end
end
end
2018-11-20 20:47:30 +05:30
context 'when job has artifacts' do
2023-06-20 00:43:36 +05:30
let_it_be(:job) { create(:ci_build, :success, :artifacts, pipeline: pipeline) }
2018-11-20 20:47:30 +05:30
2023-06-20 00:43:36 +05:30
context 'with not expiry date' do
2021-01-03 14:25:43 +05:30
context 'when artifacts are unlocked' do
before do
job.pipeline.unlocked!
end
2020-11-24 15:15:51 +05:30
2021-01-03 14:25:43 +05:30
it 'exposes needed information' do
get_show_json
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['artifact']['download_path']).to match(%r{artifacts/download})
expect(json_response['artifact']['browse_path']).to match(%r{artifacts/browse})
expect(json_response['artifact']).not_to have_key('keep_path')
expect(json_response['artifact']).not_to have_key('expired')
expect(json_response['artifact']).not_to have_key('expired_at')
end
end
context 'when artifacts are locked' do
before do
2023-06-20 00:43:36 +05:30
job.pipeline.reload.artifacts_locked!
2021-01-03 14:25:43 +05:30
end
it 'exposes needed information' do
get_show_json
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['artifact']['download_path']).to match(%r{artifacts/download})
expect(json_response['artifact']['browse_path']).to match(%r{artifacts/browse})
expect(json_response['artifact']).not_to have_key('keep_path')
expect(json_response['artifact']).not_to have_key('expired')
expect(json_response['artifact']).not_to have_key('expired_at')
end
2018-11-20 20:47:30 +05:30
end
end
2020-11-24 15:15:51 +05:30
context 'with expired artifacts' do
2023-06-20 00:43:36 +05:30
before do
job.update!(artifacts_expire_at: 1.minute.ago)
end
2018-11-20 20:47:30 +05:30
2020-11-24 15:15:51 +05:30
context 'when artifacts are unlocked' do
before do
2023-06-20 00:43:36 +05:30
job.pipeline.reload.unlocked!
2020-11-24 15:15:51 +05:30
end
it 'exposes needed information' do
get_show_json
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['artifact']).not_to have_key('download_path')
expect(json_response['artifact']).not_to have_key('browse_path')
expect(json_response['artifact']).not_to have_key('keep_path')
expect(json_response['artifact']['expired']).to eq(true)
expect(json_response['artifact']['expire_at']).not_to be_empty
expect(json_response['artifact']['locked']).to eq(false)
end
end
context 'when artifacts are locked' do
before do
2023-06-20 00:43:36 +05:30
job.pipeline.reload.artifacts_locked!
2020-11-24 15:15:51 +05:30
end
it 'exposes needed information' do
get_show_json
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['artifact']).to have_key('download_path')
expect(json_response['artifact']).to have_key('browse_path')
expect(json_response['artifact']).to have_key('keep_path')
expect(json_response['artifact']['expired']).to eq(true)
expect(json_response['artifact']['expire_at']).not_to be_empty
expect(json_response['artifact']['locked']).to eq(true)
end
2018-11-20 20:47:30 +05:30
end
end
2018-12-05 23:21:45 +05:30
2023-06-20 00:43:36 +05:30
context 'when job passed with no trace' do
it 'exposes empty state illustrations' do
get_show_json
2019-09-04 21:01:54 +05:30
2023-06-20 00:43:36 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['status']['illustration']).to have_key('image')
expect(json_response['status']['illustration']).to have_key('size')
expect(json_response['status']['illustration']).to have_key('title')
end
2018-12-05 23:21:45 +05:30
end
end
context 'with no deployment' do
let(:job) { create(:ci_build, :success, pipeline: pipeline) }
it 'does not exposes the deployment information' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['deployment_status']).to be_nil
end
end
context 'with deployment' do
let(:environment) { create(:environment, project: project, name: 'staging', state: :available) }
2018-12-13 13:39:08 +05:30
let(:job) { create(:ci_build, :running, environment: environment.name, pipeline: pipeline) }
2018-12-05 23:21:45 +05:30
2022-10-11 01:57:18 +05:30
let(:user) { maintainer }
2019-09-04 21:01:54 +05:30
before do
2019-12-04 20:38:33 +05:30
create(:deployment, :success, :on_cluster, environment: environment, project: project)
2019-09-04 21:01:54 +05:30
end
2020-01-01 13:55:28 +05:30
it 'exposes the deployment information' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(json_response).to match_schema('job/job_details')
2019-09-04 21:01:54 +05:30
expect(json_response.dig('deployment_status', 'status')).to eq 'creating'
expect(json_response.dig('deployment_status', 'environment')).not_to be_nil
expect(json_response.dig('deployment_status', 'environment', 'last_deployment')).not_to be_nil
2019-12-04 20:38:33 +05:30
expect(json_response.dig('deployment_status', 'environment', 'last_deployment')).not_to include('commit')
expect(json_response.dig('deployment_status', 'environment', 'last_deployment', 'cluster', 'name')).to eq('test-cluster')
expect(json_response.dig('deployment_status', 'environment', 'last_deployment', 'cluster', 'path')).to be_present
2018-12-05 23:21:45 +05:30
end
end
context 'when user can edit runner' do
context 'that belongs to the project' do
let(:runner) { create(:ci_runner, :project, projects: [project]) }
let(:job) { create(:ci_build, :success, pipeline: pipeline, runner: runner) }
2022-10-11 01:57:18 +05:30
let(:user) { maintainer }
2018-12-05 23:21:45 +05:30
before do
sign_in(user)
end
2020-01-01 13:55:28 +05:30
it 'user can edit runner' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runner']).to have_key('edit_path')
end
end
context 'that belongs to group' do
let(:group) { create(:group) }
let(:runner) { create(:ci_runner, :group, groups: [group]) }
let(:job) { create(:ci_build, :success, pipeline: pipeline, runner: runner) }
2022-10-11 01:57:18 +05:30
let(:user) { maintainer }
2018-12-05 23:21:45 +05:30
before do
sign_in(user)
end
2020-01-01 13:55:28 +05:30
it 'user can not edit runner' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runner']).not_to have_key('edit_path')
end
end
context 'that belongs to instance' do
let(:runner) { create(:ci_runner, :instance) }
let(:job) { create(:ci_build, :success, pipeline: pipeline, runner: runner) }
2022-10-11 01:57:18 +05:30
let(:user) { maintainer }
2018-12-05 23:21:45 +05:30
before do
sign_in(user)
end
2020-01-01 13:55:28 +05:30
it 'user can not edit runner' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runner']).not_to have_key('edit_path')
end
end
end
context 'when no runners are available' do
let(:runner) { create(:ci_runner, :instance, active: false) }
let(:job) { create(:ci_build, :pending, pipeline: pipeline, runner: runner) }
it 'exposes needed information' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runners']['online']).to be false
expect(json_response['runners']['available']).to be false
2018-12-13 13:39:08 +05:30
expect(json_response['stuck']).to be true
2018-12-05 23:21:45 +05:30
end
end
context 'when no runner is online' do
let(:runner) { create(:ci_runner, :instance) }
let(:job) { create(:ci_build, :pending, pipeline: pipeline, runner: runner) }
it 'exposes needed information' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runners']['online']).to be false
expect(json_response['runners']['available']).to be true
2018-12-13 13:39:08 +05:30
expect(json_response['stuck']).to be true
2018-12-05 23:21:45 +05:30
end
end
context 'settings_path' do
2019-09-04 21:01:54 +05:30
before do
get_show_json
end
2018-12-05 23:21:45 +05:30
context 'when user is developer' do
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2018-12-05 23:21:45 +05:30
it 'settings_path is not available' do
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runners']).not_to have_key('settings_path')
end
end
context 'when user is maintainer' do
2022-10-11 01:57:18 +05:30
let(:user) { admin }
2018-12-05 23:21:45 +05:30
before do
sign_in(user)
end
2020-04-22 19:07:51 +05:30
context 'when admin mode is disabled' do
it 'settings_path is not available' do
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runners']).not_to have_key('settings_path')
end
end
context 'when admin mode is enabled', :enable_admin_mode do
it 'settings_path is available' do
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['runners']['settings_path']).to match(/runners/)
end
2018-12-05 23:21:45 +05:30
end
end
end
context 'when no trace is available' do
it 'has_trace is false' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to match_response_schema('job/job_details')
expect(json_response['has_trace']).to be false
end
end
2021-12-11 22:18:48 +05:30
context 'when job has live trace' do
2018-12-05 23:21:45 +05:30
let(:job) { create(:ci_build, :running, :trace_live, pipeline: pipeline) }
2021-12-11 22:18:48 +05:30
it 'has_trace is true' do
2019-09-04 21:01:54 +05:30
get_show_json
2021-12-11 22:18:48 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['has_trace']).to be true
end
end
context 'when has live trace and unarchived artifact' do
let(:job) { create(:ci_build, :running, :trace_live, :unarchived_trace_artifact, pipeline: pipeline) }
it 'has_trace is true' do
get_show_json
expect(response).to have_gitlab_http_status(:ok)
2018-12-05 23:21:45 +05:30
expect(response).to match_response_schema('job/job_details')
expect(json_response['has_trace']).to be true
end
end
it 'exposes the stage the job belongs to' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(json_response['stage']).to eq('test')
end
end
2019-09-04 21:01:54 +05:30
context 'when requesting triggered job JSON' do
2018-12-05 23:21:45 +05:30
let(:trigger) { create(:ci_trigger, project: project) }
let(:trigger_request) { create(:ci_trigger_request, pipeline: pipeline, trigger: trigger) }
let(:job) { create(:ci_build, pipeline: pipeline, trigger_request: trigger_request) }
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2018-12-05 23:21:45 +05:30
before do
sign_in(user)
2019-09-04 21:01:54 +05:30
allow_any_instance_of(Ci::Build)
.to receive(:merge_request)
.and_return(merge_request)
2018-12-05 23:21:45 +05:30
end
context 'with no variables' do
it 'exposes trigger information' do
2019-09-04 21:01:54 +05:30
get_show_json
2018-12-05 23:21:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
expect(json_response['trigger']['short_token']).to eq 'toke'
expect(json_response['trigger']['variables'].length).to eq 0
end
end
context 'with variables' do
before do
create(:ci_pipeline_variable, pipeline: pipeline, key: :TRIGGER_KEY_1, value: 'TRIGGER_VALUE_1')
2019-02-15 15:39:39 +05:30
end
2018-12-23 12:14:25 +05:30
2020-01-01 13:55:28 +05:30
context 'user is a maintainer' do
2022-10-11 01:57:18 +05:30
let(:user) { maintainer }
2019-02-15 15:39:39 +05:30
2022-10-11 01:57:18 +05:30
before do
2019-09-04 21:01:54 +05:30
get_show_json
2019-02-15 15:39:39 +05:30
end
it 'returns a job_detail' do
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
end
it 'exposes trigger information and variables' do
expect(json_response['trigger']['short_token']).to eq 'toke'
expect(json_response['trigger']['variables'].length).to eq 1
end
it 'exposes correct variable properties' do
first_variable = json_response['trigger']['variables'].first
expect(first_variable['key']).to eq "TRIGGER_KEY_1"
expect(first_variable['value']).to eq "TRIGGER_VALUE_1"
expect(first_variable['public']).to eq false
end
2018-12-05 23:21:45 +05:30
end
2019-02-15 15:39:39 +05:30
context 'user is not a mantainer' do
before do
2019-09-04 21:01:54 +05:30
get_show_json
2019-02-15 15:39:39 +05:30
end
it 'returns a job_detail' do
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/job_details')
end
it 'exposes trigger information and variables' do
expect(json_response['trigger']['short_token']).to eq 'toke'
expect(json_response['trigger']['variables'].length).to eq 1
end
it 'exposes correct variable properties' do
first_variable = json_response['trigger']['variables'].first
expect(first_variable['key']).to eq "TRIGGER_KEY_1"
expect(first_variable['value']).to be_nil
expect(first_variable['public']).to eq false
end
2018-12-05 23:21:45 +05:30
end
end
2017-08-17 22:00:37 +05:30
end
2019-09-04 21:01:54 +05:30
def get_show_json
expect { get_show(id: job.id, format: :json) }
2022-10-11 01:57:18 +05:30
.to change { Gitlab::GitalyClient.get_request_count }.by_at_most(3)
2019-09-04 21:01:54 +05:30
end
2017-08-17 22:00:37 +05:30
def get_show(**extra_params)
params = {
namespace_id: project.namespace.to_param,
project_id: project
}
2019-02-15 15:39:39 +05:30
get :show, params: params.merge(extra_params)
2017-08-17 22:00:37 +05:30
end
end
describe 'GET trace.json' do
before do
get_trace
end
2018-03-17 18:26:18 +05:30
context 'when job has a trace artifact' do
let(:job) { create(:ci_build, :trace_artifact, pipeline: pipeline) }
it 'returns a trace' do
expect(response).to have_gitlab_http_status(:ok)
2019-12-21 20:55:43 +05:30
expect(response).to match_response_schema('job/build_trace')
2018-03-17 18:26:18 +05:30
expect(json_response['id']).to eq job.id
expect(json_response['status']).to eq job.status
2019-12-21 20:55:43 +05:30
expect(json_response['state']).to be_present
expect(json_response['append']).not_to be_nil
expect(json_response['truncated']).not_to be_nil
expect(json_response['size']).to be_present
expect(json_response['total']).to be_present
expect(json_response['lines'].count).to be_positive
end
2021-02-22 17:27:13 +05:30
2023-03-04 22:38:38 +05:30
context 'when debug_mode? is enabled' do
before do
allow_next_found_instance_of(Ci::Build) do |build|
allow(build).to receive(:debug_mode?).and_return(true)
2021-02-22 17:27:13 +05:30
end
end
2023-01-13 00:05:48 +05:30
context 'with proper permissions on a project' do
let(:user) { developer }
before do
sign_in(user)
end
it 'returns response ok' do
get_trace
expect(response).to have_gitlab_http_status(:ok)
end
end
context 'without proper permissions for debug logging' do
let(:user) { guest }
before do
sign_in(user)
end
it 'returns response forbidden' do
get_trace
expect(response).to have_gitlab_http_status(:forbidden)
end
end
end
2019-12-21 20:55:43 +05:30
end
2021-12-11 22:18:48 +05:30
context 'when job has a live trace' do
2019-12-21 20:55:43 +05:30
let(:job) { create(:ci_build, :trace_live, pipeline: pipeline) }
2021-12-11 22:18:48 +05:30
shared_examples_for 'returns trace' do
it 'returns a trace' do
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/build_trace')
expect(json_response['id']).to eq job.id
expect(json_response['status']).to eq job.status
expect(json_response['lines']).to match_array [{ 'content' => [{ 'text' => 'BUILD TRACE' }], 'offset' => 0 }]
end
end
it_behaves_like 'returns trace'
context 'when job has unarchived artifact' do
let(:job) { create(:ci_build, :trace_live, :unarchived_trace_artifact, pipeline: pipeline) }
it_behaves_like 'returns trace'
2019-12-21 20:55:43 +05:30
end
2020-03-13 15:44:24 +05:30
2021-02-22 17:27:13 +05:30
context 'when job is running' do
let(:job) { create(:ci_build, :trace_live, :running, pipeline: pipeline) }
2020-03-13 15:44:24 +05:30
2021-02-22 17:27:13 +05:30
it 'sets being-watched flag for the job' do
expect(response).to have_gitlab_http_status(:ok)
expect(job.trace.being_watched?).to be(true)
end
end
context 'when job is not running' do
it 'does not set being-watched flag for the job' do
expect(response).to have_gitlab_http_status(:ok)
expect(job.trace.being_watched?).to be(false)
end
2020-03-13 15:44:24 +05:30
end
2019-12-21 20:55:43 +05:30
end
context 'when job has no traces' do
let(:job) { create(:ci_build, pipeline: pipeline) }
it 'returns no traces' do
2021-02-22 17:27:13 +05:30
expect(response).to have_gitlab_http_status(:no_content)
2019-12-21 20:55:43 +05:30
end
end
context 'when job has a trace with ANSI sequence and Unicode' do
let(:job) { create(:ci_build, :unicode_trace_live, pipeline: pipeline) }
it 'returns a trace with Unicode' do
expect(response).to have_gitlab_http_status(:ok)
expect(response).to match_response_schema('job/build_trace')
expect(json_response['id']).to eq job.id
expect(json_response['status']).to eq job.status
2022-10-11 01:57:18 +05:30
expect(json_response['lines'].flat_map { |l| l['content'].map { |c| c['text'] } }).to include("ヾ(´༎ຶД༎ຶ`)ノ")
2019-12-21 20:55:43 +05:30
end
end
context 'when trace artifact is in ObjectStorage' do
let(:url) { 'http://object-storage/trace' }
let(:file_path) { expand_fixture_path('trace/sample_trace') }
let!(:job) { create(:ci_build, :success, :trace_artifact, pipeline: pipeline) }
before do
allow_any_instance_of(JobArtifactUploader).to receive(:file_storage?) { false }
allow_any_instance_of(JobArtifactUploader).to receive(:url) { url }
allow_any_instance_of(JobArtifactUploader).to receive(:size) { File.size(file_path) }
end
context 'when there are no network issues' do
before do
stub_remote_url_206(url, file_path)
get_trace
end
it 'returns a trace' do
expect(response).to have_gitlab_http_status(:ok)
expect(json_response['id']).to eq job.id
expect(json_response['status']).to eq job.status
expect(json_response['lines'].count).to be_positive
end
end
2018-05-09 12:01:36 +05:30
context 'when there is a network issue' do
before do
2018-11-18 11:00:15 +05:30
stub_remote_url_500(url)
2018-05-09 12:01:36 +05:30
end
it 'returns a trace' do
2018-11-18 11:00:15 +05:30
expect { get_trace }.to raise_error(Gitlab::HttpIO::FailedToGetChunkError)
2018-05-09 12:01:36 +05:30
end
end
end
2017-08-17 22:00:37 +05:30
def get_trace
2019-12-21 20:55:43 +05:30
get :trace,
params: {
namespace_id: project.namespace,
project_id: project,
id: job.id
},
format: :json
2017-08-17 22:00:37 +05:30
end
end
describe 'POST retry' do
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2017-08-17 22:00:37 +05:30
before do
sign_in(user)
end
2023-04-23 21:23:45 +05:30
context 'when job is not retryable' do
context 'and the job is a bridge' do
let(:job) { create(:ci_bridge, :failed, :reached_max_descendant_pipelines_depth, pipeline: pipeline) }
it 'renders unprocessable_entity' do
post_retry
expect(response).to have_gitlab_http_status(:unprocessable_entity)
end
end
context 'and the job is a build' do
let(:job) { create(:ci_build, :deployment_rejected, pipeline: pipeline) }
it 'renders unprocessable_entity' do
post_retry
expect(response).to have_gitlab_http_status(:unprocessable_entity)
end
end
end
2017-09-10 17:25:29 +05:30
context 'when job is retryable' do
2023-04-23 21:23:45 +05:30
context 'and the job is a bridge' do
let(:job) { create(:ci_bridge, :retryable, pipeline: pipeline) }
it 'responds :ok' do
post_retry
2017-08-17 22:00:37 +05:30
2023-04-23 21:23:45 +05:30
expect(response).to have_gitlab_http_status(:ok)
end
end
context 'and the job is a build' do
let(:job) { create(:ci_build, :retryable, pipeline: pipeline) }
2021-11-11 11:23:49 +05:30
2023-04-23 21:23:45 +05:30
it 'redirects to the retried job page' do
post_retry
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(namespace_project_job_path(id: Ci::Build.last.id))
end
2017-08-17 22:00:37 +05:30
end
2021-11-11 11:23:49 +05:30
shared_examples_for 'retried job has the same attributes' do
it 'creates a new build has the same attributes from the previous build' do
expect { post_retry }.to change { Ci::Build.count }.by(1)
retried_build = Ci::Build.last
2022-06-21 17:19:12 +05:30
Ci::Build.clone_accessors.each do |accessor|
2023-05-27 22:25:52 +05:30
expect(job.read_attribute(accessor)).to eq(retried_build.read_attribute(accessor)),
2021-11-11 11:23:49 +05:30
"Mismatched attribute on \"#{accessor}\". " \
"It was \"#{job.read_attribute(accessor)}\" but changed to \"#{retried_build.read_attribute(accessor)}\""
end
end
end
context 'with branch pipeline' do
let!(:job) { create(:ci_build, :retryable, tag: true, when: 'on_success', pipeline: pipeline) }
it_behaves_like 'retried job has the same attributes'
end
context 'with tag pipeline' do
let!(:job) { create(:ci_build, :retryable, tag: false, when: 'on_success', pipeline: pipeline) }
it_behaves_like 'retried job has the same attributes'
end
2017-08-17 22:00:37 +05:30
end
def post_retry
2019-02-15 15:39:39 +05:30
post :retry, params: {
2023-05-27 22:25:52 +05:30
namespace_id: project.namespace,
project_id: project,
id: job.id
}
2017-08-17 22:00:37 +05:30
end
end
describe 'POST play' do
2019-10-12 21:52:04 +05:30
let(:variable_attributes) { [] }
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2019-10-12 21:52:04 +05:30
2017-08-17 22:00:37 +05:30
before do
project.add_developer(user)
2023-05-27 22:25:52 +05:30
create(:protected_branch, :developers_can_merge, name: 'protected-branch', project: project)
2017-08-17 22:00:37 +05:30
sign_in(user)
end
2017-09-10 17:25:29 +05:30
context 'when job is playable' do
let(:job) { create(:ci_build, :playable, pipeline: pipeline) }
2017-08-17 22:00:37 +05:30
2017-09-10 17:25:29 +05:30
it 'redirects to the played job page' do
2021-01-03 14:25:43 +05:30
post_play
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:found)
2017-09-10 17:25:29 +05:30
expect(response).to redirect_to(namespace_project_job_path(id: job.id))
2017-08-17 22:00:37 +05:30
end
it 'transits to pending' do
2021-01-03 14:25:43 +05:30
post_play
2017-09-10 17:25:29 +05:30
expect(job.reload).to be_pending
2017-08-17 22:00:37 +05:30
end
2019-10-12 21:52:04 +05:30
context 'when job variables are specified' do
let(:variable_attributes) { [{ key: 'first', secret_value: 'first' }] }
it 'assigns the job variables' do
2021-01-03 14:25:43 +05:30
post_play
2019-10-12 21:52:04 +05:30
expect(job.reload.job_variables.map(&:key)).to contain_exactly('first')
end
end
2021-01-03 14:25:43 +05:30
context 'when job is bridge' do
let(:downstream_project) { create(:project) }
let(:job) { create(:ci_bridge, :playable, pipeline: pipeline, downstream: downstream_project) }
before do
downstream_project.add_developer(user)
end
it 'redirects to the pipeline page' do
post_play
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(pipeline_path(pipeline))
builds_namespace_project_pipeline_path(id: pipeline.id)
end
it 'transits to pending' do
post_play
expect(job.reload).to be_pending
end
end
2017-08-17 22:00:37 +05:30
end
2017-09-10 17:25:29 +05:30
context 'when job is not playable' do
let(:job) { create(:ci_build, pipeline: pipeline) }
2017-08-17 22:00:37 +05:30
it 'renders unprocessable_entity' do
2021-01-03 14:25:43 +05:30
post_play
2018-03-17 18:26:18 +05:30
expect(response).to have_gitlab_http_status(:unprocessable_entity)
2017-08-17 22:00:37 +05:30
end
end
def post_play
2019-02-15 15:39:39 +05:30
post :play, params: {
namespace_id: project.namespace,
project_id: project,
2019-10-12 21:52:04 +05:30
id: job.id,
job_variables_attributes: variable_attributes
2019-02-15 15:39:39 +05:30
}
2017-08-17 22:00:37 +05:30
end
end
describe 'POST cancel' do
2021-10-27 15:23:28 +05:30
context 'when user is authorized to cancel the build' do
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2021-10-27 15:23:28 +05:30
before do
sign_in(user)
end
context 'when continue url is present' do
let(:job) { create(:ci_build, :cancelable, pipeline: pipeline) }
2017-08-17 22:00:37 +05:30
2022-07-16 23:28:13 +05:30
before do
post_cancel(continue: { to: url })
end
2021-10-27 15:23:28 +05:30
context 'when continue to is a safe url' do
let(:url) { '/test' }
2017-08-17 22:00:37 +05:30
2021-10-27 15:23:28 +05:30
it 'redirects to the continue url' do
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(url)
end
2018-12-13 13:39:08 +05:30
2021-10-27 15:23:28 +05:30
it 'transits to canceled' do
expect(job.reload).to be_canceled
end
2018-12-13 13:39:08 +05:30
end
2021-10-27 15:23:28 +05:30
context 'when continue to is not a safe url' do
let(:url) { 'http://example.com' }
2022-07-16 23:28:13 +05:30
it 'redirects to the builds page' do
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(builds_namespace_project_pipeline_path(id: pipeline.id))
2021-10-27 15:23:28 +05:30
end
2018-12-13 13:39:08 +05:30
end
2017-08-17 22:00:37 +05:30
end
2021-10-27 15:23:28 +05:30
context 'when continue url is not present' do
before do
post_cancel
end
context 'when job is cancelable' do
let(:job) { create(:ci_build, :cancelable, pipeline: pipeline) }
it 'redirects to the builds page' do
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(builds_namespace_project_pipeline_path(id: pipeline.id))
end
it 'transits to canceled' do
expect(job.reload).to be_canceled
end
end
context 'when job is not cancelable' do
let(:job) { create(:ci_build, :canceled, pipeline: pipeline) }
2018-12-13 13:39:08 +05:30
2021-10-27 15:23:28 +05:30
it 'returns unprocessable_entity' do
expect(response).to have_gitlab_http_status(:unprocessable_entity)
end
2018-12-13 13:39:08 +05:30
end
2017-08-17 22:00:37 +05:30
end
end
2021-10-27 15:23:28 +05:30
context 'when user is not authorized to cancel the build' do
let!(:job) { create(:ci_build, :cancelable, pipeline: pipeline) }
2022-10-11 01:57:18 +05:30
let(:user) { guest }
2018-12-13 13:39:08 +05:30
before do
2021-10-27 15:23:28 +05:30
sign_in(user)
2018-12-13 13:39:08 +05:30
post_cancel
end
2017-08-17 22:00:37 +05:30
2021-10-27 15:23:28 +05:30
it 'responds with not_found' do
expect(response).to have_gitlab_http_status(:not_found)
2018-12-13 13:39:08 +05:30
end
2021-10-27 15:23:28 +05:30
it 'does not transit to canceled' do
expect(job.reload).not_to be_canceled
2017-08-17 22:00:37 +05:30
end
end
2018-12-13 13:39:08 +05:30
def post_cancel(additional_params = {})
2019-02-15 15:39:39 +05:30
post :cancel, params: { namespace_id: project.namespace,
project_id: project,
id: job.id }.merge(additional_params)
2017-08-17 22:00:37 +05:30
end
end
2018-12-05 23:21:45 +05:30
describe 'POST unschedule' do
before do
2022-10-11 01:57:18 +05:30
create(:protected_branch, :developers_can_merge, name: 'protected-branch', project: project)
2021-10-27 15:23:28 +05:30
end
2018-12-05 23:21:45 +05:30
2021-10-27 15:23:28 +05:30
context 'when user is authorized to unschedule the build' do
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2021-10-27 15:23:28 +05:30
before do
sign_in(user)
2018-12-05 23:21:45 +05:30
2021-10-27 15:23:28 +05:30
post_unschedule
end
2018-12-05 23:21:45 +05:30
2021-10-27 15:23:28 +05:30
context 'when job is scheduled' do
let(:job) { create(:ci_build, :scheduled, pipeline: pipeline) }
2018-12-05 23:21:45 +05:30
2021-10-27 15:23:28 +05:30
it 'redirects to the unscheduled job page' do
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(namespace_project_job_path(id: job.id))
end
2018-12-05 23:21:45 +05:30
2021-10-27 15:23:28 +05:30
it 'transits to manual' do
expect(job.reload).to be_manual
end
2018-12-05 23:21:45 +05:30
end
2021-10-27 15:23:28 +05:30
context 'when job is not scheduled' do
let(:job) { create(:ci_build, pipeline: pipeline) }
it 'renders unprocessable_entity' do
expect(response).to have_gitlab_http_status(:unprocessable_entity)
end
2018-12-05 23:21:45 +05:30
end
end
2021-10-27 15:23:28 +05:30
context 'when user is not authorized to unschedule the build' do
let(:job) { create(:ci_build, :scheduled, pipeline: pipeline) }
2022-10-11 01:57:18 +05:30
let(:user) { guest }
2018-12-05 23:21:45 +05:30
2021-10-27 15:23:28 +05:30
before do
sign_in(user)
post_unschedule
end
it 'responds with not_found' do
expect(response).to have_gitlab_http_status(:not_found)
end
it 'does not transit to scheduled' do
expect(job.reload).not_to be_manual
2018-12-05 23:21:45 +05:30
end
end
def post_unschedule
2021-10-27 15:23:28 +05:30
post :unschedule, params: { namespace_id: project.namespace, project_id: project, id: job.id }
2018-12-05 23:21:45 +05:30
end
end
2017-08-17 22:00:37 +05:30
describe 'POST erase' do
2022-10-11 01:57:18 +05:30
let(:user) { maintainer }
2018-03-17 18:26:18 +05:30
2017-08-17 22:00:37 +05:30
before do
sign_in(user)
end
2022-07-23 23:45:48 +05:30
context 'when project is not undergoing stats refresh' do
before do
post_erase
2017-08-17 22:00:37 +05:30
end
2022-07-23 23:45:48 +05:30
shared_examples_for 'erases' do
it 'redirects to the erased job page' do
expect(response).to have_gitlab_http_status(:found)
expect(response).to redirect_to(namespace_project_job_path(id: job.id))
end
2017-08-17 22:00:37 +05:30
2022-07-23 23:45:48 +05:30
it 'erases artifacts' do
expect(job.artifacts_file.present?).to be_falsey
expect(job.artifacts_metadata.present?).to be_falsey
end
it 'erases trace' do
expect(job.trace.exist?).to be_falsey
end
2017-08-17 22:00:37 +05:30
end
2022-07-23 23:45:48 +05:30
context 'when job is successful and has artifacts' do
let(:job) { create(:ci_build, :erasable, :trace_artifact, pipeline: pipeline) }
2021-12-11 22:18:48 +05:30
2022-07-23 23:45:48 +05:30
it_behaves_like 'erases'
end
2021-12-11 22:18:48 +05:30
2022-07-23 23:45:48 +05:30
context 'when job has live trace and unarchived artifact' do
let(:job) { create(:ci_build, :success, :trace_live, :unarchived_trace_artifact, pipeline: pipeline) }
2021-12-11 22:18:48 +05:30
2022-07-23 23:45:48 +05:30
it_behaves_like 'erases'
end
2021-12-11 22:18:48 +05:30
2022-07-23 23:45:48 +05:30
context 'when job is erased' do
let(:job) { create(:ci_build, :erased, pipeline: pipeline) }
2017-08-17 22:00:37 +05:30
2022-07-23 23:45:48 +05:30
it 'returns unprocessable_entity' do
expect(response).to have_gitlab_http_status(:unprocessable_entity)
end
2018-03-17 18:26:18 +05:30
end
2022-07-23 23:45:48 +05:30
context 'when user is developer' do
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2022-07-23 23:45:48 +05:30
let(:job) { create(:ci_build, :erasable, :trace_artifact, pipeline: pipeline, user: triggered_by) }
2018-03-17 18:26:18 +05:30
2022-07-23 23:45:48 +05:30
context 'when triggered by same user' do
let(:triggered_by) { user }
2018-03-17 18:26:18 +05:30
2022-07-23 23:45:48 +05:30
it 'has successful status' do
expect(response).to have_gitlab_http_status(:found)
end
end
context 'when triggered by different user' do
2022-10-11 01:57:18 +05:30
let(:triggered_by) { maintainer }
2022-07-23 23:45:48 +05:30
it 'does not have successful status' do
expect(response).not_to have_gitlab_http_status(:found)
end
2018-03-17 18:26:18 +05:30
end
end
2022-07-23 23:45:48 +05:30
end
context 'when project is undergoing stats refresh' do
it_behaves_like 'preventing request because of ongoing project stats refresh' do
let(:job) { create(:ci_build, :erasable, :trace_artifact, pipeline: pipeline) }
let(:make_request) { post_erase }
2018-03-17 18:26:18 +05:30
2022-07-23 23:45:48 +05:30
it 'does not erase artifacts' do
make_request
2018-03-17 18:26:18 +05:30
2022-07-23 23:45:48 +05:30
expect(job.artifacts_file).to be_present
expect(job.artifacts_metadata).to be_present
2018-03-17 18:26:18 +05:30
end
2017-08-17 22:00:37 +05:30
end
end
def post_erase
2019-02-15 15:39:39 +05:30
post :erase, params: {
namespace_id: project.namespace,
project_id: project,
id: job.id
}
2017-08-17 22:00:37 +05:30
end
end
describe 'GET raw' do
2018-05-09 12:01:36 +05:30
subject do
2019-02-15 15:39:39 +05:30
post :raw, params: {
namespace_id: project.namespace,
project_id: project,
id: job.id
}
2017-08-17 22:00:37 +05:30
end
2021-02-22 17:27:13 +05:30
context 'when job has a trace artifact' do
2018-03-17 18:26:18 +05:30
let(:job) { create(:ci_build, :trace_artifact, pipeline: pipeline) }
2019-02-15 15:39:39 +05:30
it "sets #{Gitlab::Workhorse::DETECT_HEADER} header" do
2019-01-03 12:48:30 +05:30
response = subject
2018-12-23 12:14:25 +05:30
2019-01-03 12:48:30 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response.headers["Content-Type"]).to eq("text/plain; charset=utf-8")
expect(response.body).to eq(job.job_artifacts_trace.open.read)
2019-02-15 15:39:39 +05:30
expect(response.header[Gitlab::Workhorse::DETECT_HEADER]).to eq "true"
2018-03-17 18:26:18 +05:30
end
2021-02-22 17:27:13 +05:30
2023-01-13 00:05:48 +05:30
context 'when CI_DEBUG_TRACE and/or CI_DEBUG_SERVICES are enabled' do
using RSpec::Parameterized::TableSyntax
where(:ci_debug_trace, :ci_debug_services) do
2023-03-04 22:38:38 +05:30
true | true
true | false
false | true
false | false
2021-02-22 17:27:13 +05:30
end
2023-01-13 00:05:48 +05:30
with_them do
2021-02-22 17:27:13 +05:30
before do
2023-01-13 00:05:48 +05:30
create(:ci_instance_variable, key: 'CI_DEBUG_TRACE', value: ci_debug_trace)
create(:ci_instance_variable, key: 'CI_DEBUG_SERVICES', value: ci_debug_services)
2021-02-22 17:27:13 +05:30
end
2023-01-13 00:05:48 +05:30
context 'with proper permissions for debug logging on a project' do
let(:user) { developer }
2021-02-22 17:27:13 +05:30
2023-01-13 00:05:48 +05:30
before do
sign_in(user)
end
2021-02-22 17:27:13 +05:30
2023-01-13 00:05:48 +05:30
it 'returns response ok' do
response = subject
2022-10-11 01:57:18 +05:30
2023-01-13 00:05:48 +05:30
expect(response).to have_gitlab_http_status(:ok)
end
2021-02-22 17:27:13 +05:30
end
2023-01-13 00:05:48 +05:30
context 'without proper permissions for debug logging on a project' do
let(:user) { reporter }
2021-02-22 17:27:13 +05:30
2023-01-13 00:05:48 +05:30
before do
sign_in(user)
end
it 'returns response forbidden if dev mode enabled' do
response = subject
2023-03-04 22:38:38 +05:30
if ci_debug_trace || ci_debug_services
2023-01-13 00:05:48 +05:30
expect(response).to have_gitlab_http_status(:forbidden)
else
expect(response).to have_gitlab_http_status(:ok)
end
end
2021-02-22 17:27:13 +05:30
end
end
end
2018-03-17 18:26:18 +05:30
end
2021-12-11 22:18:48 +05:30
context 'when job has a live trace' do
2018-03-17 18:26:18 +05:30
let(:job) { create(:ci_build, :trace_live, pipeline: pipeline) }
2017-08-17 22:00:37 +05:30
2021-12-11 22:18:48 +05:30
shared_examples_for 'sends live trace' do
it 'sends a trace file' do
response = subject
2018-05-09 12:01:36 +05:30
2021-12-11 22:18:48 +05:30
expect(response).to have_gitlab_http_status(:ok)
expect(response.headers["Content-Type"]).to eq("text/plain; charset=utf-8")
expect(response.headers["Content-Disposition"]).to match(/^inline/)
expect(response.body).to eq("BUILD TRACE")
end
end
it_behaves_like 'sends live trace'
context 'and when job has unarchived artifact' do
let(:job) { create(:ci_build, :trace_live, :unarchived_trace_artifact, pipeline: pipeline) }
it_behaves_like 'sends live trace'
2017-08-17 22:00:37 +05:30
end
end
2017-09-10 17:25:29 +05:30
context 'when job does not have a trace file' do
let(:job) { create(:ci_build, pipeline: pipeline) }
2017-08-17 22:00:37 +05:30
it 'returns not_found' do
2018-05-09 12:01:36 +05:30
response = subject
expect(response).to have_gitlab_http_status(:ok)
expect(response.body).to eq ''
2017-08-17 22:00:37 +05:30
end
end
2018-05-09 12:01:36 +05:30
context 'when the trace artifact is in ObjectStorage' do
let!(:job) { create(:ci_build, :trace_artifact, pipeline: pipeline) }
before do
allow_any_instance_of(JobArtifactUploader).to receive(:file_storage?) { false }
end
it 'redirect to the trace file url' do
expect(subject).to redirect_to(job.job_artifacts_trace.file.url)
end
2017-08-17 22:00:37 +05:30
end
end
2018-11-08 19:23:39 +05:30
describe 'GET #terminal' do
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2018-11-08 19:23:39 +05:30
before do
sign_in(user)
end
context 'when job exists' do
context 'and it has a terminal' do
2022-06-02 21:05:25 +05:30
let!(:job) { create(:ci_build, :running, :with_runner_session, pipeline: pipeline, user: user) }
2018-11-08 19:23:39 +05:30
it 'has a job' do
get_terminal(id: job.id)
expect(response).to have_gitlab_http_status(:ok)
expect(assigns(:build).id).to eq(job.id)
end
end
context 'and does not have a terminal' do
2022-06-02 21:05:25 +05:30
let!(:job) { create(:ci_build, :running, pipeline: pipeline, user: user) }
2018-11-08 19:23:39 +05:30
it 'returns not_found' do
get_terminal(id: job.id)
expect(response).to have_gitlab_http_status(:not_found)
end
end
end
context 'when job does not exist' do
it 'renders not_found' do
2020-04-22 19:07:51 +05:30
get_terminal(id: non_existing_record_id)
2018-11-08 19:23:39 +05:30
expect(response).to have_gitlab_http_status(:not_found)
end
end
def get_terminal(**extra_params)
params = {
namespace_id: project.namespace.to_param,
project_id: project
}
2019-02-15 15:39:39 +05:30
get :terminal, params: params.merge(extra_params)
2018-11-08 19:23:39 +05:30
end
end
describe 'GET #terminal_websocket_authorize' do
2022-06-02 21:05:25 +05:30
let!(:job) { create(:ci_build, :running, :with_runner_session, pipeline: pipeline, user: user) }
2018-11-08 19:23:39 +05:30
2022-10-11 01:57:18 +05:30
let(:user) { developer }
2018-11-08 19:23:39 +05:30
before do
sign_in(user)
end
context 'with valid workhorse signature' do
before do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_return(nil)
end
context 'and valid id' do
it 'returns the terminal for the job' do
expect(Gitlab::Workhorse)
2019-07-07 11:18:12 +05:30
.to receive(:channel_websocket)
2018-11-08 19:23:39 +05:30
.and_return(workhorse: :response)
get_terminal_websocket(id: job.id)
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:ok)
2018-11-08 19:23:39 +05:30
expect(response.headers["Content-Type"]).to eq(Gitlab::Workhorse::INTERNAL_API_CONTENT_TYPE)
expect(response.body).to eq('{"workhorse":"response"}')
end
end
context 'and invalid id' do
it 'returns 404' do
2020-04-22 19:07:51 +05:30
get_terminal_websocket(id: non_existing_record_id)
2018-11-08 19:23:39 +05:30
2020-03-13 15:44:24 +05:30
expect(response).to have_gitlab_http_status(:not_found)
2018-11-08 19:23:39 +05:30
end
end
end
context 'with invalid workhorse signature' do
it 'aborts with an exception' do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_raise(JWT::DecodeError)
expect { get_terminal_websocket(id: job.id) }.to raise_error(JWT::DecodeError)
end
end
def get_terminal_websocket(**extra_params)
params = {
namespace_id: project.namespace.to_param,
project_id: project
}
2019-02-15 15:39:39 +05:30
get :terminal_websocket_authorize, params: params.merge(extra_params)
2018-11-08 19:23:39 +05:30
end
end
2020-06-23 00:09:42 +05:30
describe 'GET #proxy_websocket_authorize' do
let(:user) { maintainer }
let(:pipeline) { create(:ci_pipeline, project: project, source: :webide, config_source: :webide_source, user: user) }
let(:job) { create(:ci_build, :running, :with_runner_session, pipeline: pipeline, user: user) }
let(:extra_params) { { id: job.id } }
let(:path) { :proxy_websocket_authorize }
let(:render_method) { :channel_websocket }
let(:expected_data) do
{
'Channel' => {
'Subprotocols' => ["terminal.gitlab.com"],
2023-01-10 11:22:00 +05:30
'Url' => 'wss://gitlab.example.com/proxy/build/default_port/',
2020-06-23 00:09:42 +05:30
'Header' => {
'Authorization' => [nil]
},
'MaxSessionTime' => nil,
'CAPem' => nil
}
}.to_json
end
before do
stub_feature_flags(build_service_proxy: true)
allow(job).to receive(:has_terminal?).and_return(true)
sign_in(user)
end
context 'access rights' do
before do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_return(nil)
make_request
end
context 'with admin' do
let(:user) { admin }
context 'when admin mode is enabled', :enable_admin_mode do
it 'returns 200' do
expect(response).to have_gitlab_http_status(:ok)
end
end
context 'when admin mode is disabled' do
it 'returns 404' do
expect(response).to have_gitlab_http_status(:not_found)
end
end
end
context 'with owner' do
let(:user) { owner }
it 'returns 200' do
expect(response).to have_gitlab_http_status(:ok)
end
end
context 'with maintainer' do
let(:user) { maintainer }
it 'returns 200' do
expect(response).to have_gitlab_http_status(:ok)
end
end
context 'with developer' do
let(:user) { developer }
it 'returns 404' do
expect(response).to have_gitlab_http_status(:not_found)
end
end
context 'with reporter' do
let(:user) { reporter }
it 'returns 404' do
expect(response).to have_gitlab_http_status(:not_found)
end
end
context 'with guest' do
let(:user) { guest }
it 'returns 404' do
expect(response).to have_gitlab_http_status(:not_found)
end
end
context 'with non member' do
let(:user) { create(:user) }
it 'returns 404' do
expect(response).to have_gitlab_http_status(:not_found)
end
end
end
context 'when pipeline is not from a webide source' do
context 'with admin' do
let(:user) { admin }
let(:pipeline) { create(:ci_pipeline, project: project, source: :chat, user: user) }
before do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_return(nil)
make_request
end
it 'returns 404' do
expect(response).to have_gitlab_http_status(:not_found)
end
end
end
context 'when workhorse signature is valid' do
before do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_return(nil)
end
context 'and the id is valid' do
it 'returns the proxy data for the service running in the job' do
make_request
expect(response).to have_gitlab_http_status(:ok)
expect(response.headers["Content-Type"]).to eq(Gitlab::Workhorse::INTERNAL_API_CONTENT_TYPE)
expect(response.body).to eq(expected_data)
end
end
context 'and the id is invalid' do
let(:extra_params) { { id: non_existing_record_id } }
it 'returns 404' do
make_request
expect(response).to have_gitlab_http_status(:not_found)
end
end
end
context 'with invalid workhorse signature' do
it 'aborts with an exception' do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_raise(JWT::DecodeError)
expect { make_request }.to raise_error(JWT::DecodeError)
end
end
context 'when feature flag :build_service_proxy is disabled' do
let(:user) { admin }
it 'returns 404' do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_return(nil)
stub_feature_flags(build_service_proxy: false)
make_request
expect(response).to have_gitlab_http_status(:not_found)
end
end
it 'converts the url scheme into wss' do
allow(Gitlab::Workhorse).to receive(:verify_api_request!).and_return(nil)
expect(job.runner_session_url).to start_with('https://')
2023-01-10 11:22:00 +05:30
expect(Gitlab::Workhorse).to receive(:channel_websocket)
.with(a_hash_including(url: "wss://gitlab.example.com/proxy/build/default_port/"))
2020-06-23 00:09:42 +05:30
make_request
end
def make_request
params = {
namespace_id: project.namespace.to_param,
project_id: project
}
get path, params: params.merge(extra_params)
end
end
2017-08-17 22:00:37 +05:30
end