2019-07-31 22:56:46 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
RSpec.describe Ci::RetryBuildService do
|
2021-01-03 14:25:43 +05:30
|
|
|
let_it_be(:reporter) { create(:user) }
|
|
|
|
let_it_be(:developer) { create(:user) }
|
2020-03-13 15:44:24 +05:30
|
|
|
let_it_be(:project) { create(:project, :repository) }
|
|
|
|
let_it_be(:pipeline) do
|
|
|
|
create(:ci_pipeline, project: project,
|
|
|
|
sha: 'b83d6e391c22777fca1ed3012fce84f633d7fed0')
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
let_it_be(:stage) do
|
2018-10-15 14:42:47 +05:30
|
|
|
create(:ci_stage_entity, project: project,
|
|
|
|
pipeline: pipeline,
|
|
|
|
name: 'test')
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
let_it_be_with_refind(:build) { create(:ci_build, pipeline: pipeline, stage_id: stage.id) }
|
2021-06-08 01:23:25 +05:30
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
let(:user) { developer }
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
let(:service) do
|
|
|
|
described_class.new(project, user)
|
|
|
|
end
|
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
before_all do
|
|
|
|
project.add_developer(developer)
|
|
|
|
project.add_reporter(reporter)
|
|
|
|
end
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
clone_accessors = described_class.clone_accessors
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-05-24 23:13:21 +05:30
|
|
|
reject_accessors =
|
2019-02-15 15:39:39 +05:30
|
|
|
%i[id status user token token_encrypted coverage trace runner
|
2019-09-04 21:01:54 +05:30
|
|
|
artifacts_expire_at
|
2019-02-15 15:39:39 +05:30
|
|
|
created_at updated_at started_at finished_at queued_at erased_by
|
2018-03-17 18:26:18 +05:30
|
|
|
erased_at auto_canceled_by job_artifacts job_artifacts_archive
|
2018-12-05 23:21:45 +05:30
|
|
|
job_artifacts_metadata job_artifacts_trace job_artifacts_junit
|
2020-06-23 00:09:42 +05:30
|
|
|
job_artifacts_sast job_artifacts_secret_detection job_artifacts_dependency_scanning
|
2018-12-05 23:21:45 +05:30
|
|
|
job_artifacts_container_scanning job_artifacts_dast
|
2020-03-13 15:44:24 +05:30
|
|
|
job_artifacts_license_management job_artifacts_license_scanning
|
2020-07-28 23:09:34 +05:30
|
|
|
job_artifacts_performance job_artifacts_browser_performance job_artifacts_load_performance
|
|
|
|
job_artifacts_lsif job_artifacts_terraform job_artifacts_cluster_applications
|
2019-10-12 21:52:04 +05:30
|
|
|
job_artifacts_codequality job_artifacts_metrics scheduled_at
|
2020-03-13 15:44:24 +05:30
|
|
|
job_variables waiting_for_resource_at job_artifacts_metrics_referee
|
2020-04-08 14:13:33 +05:30
|
|
|
job_artifacts_network_referee job_artifacts_dotenv
|
2020-06-23 00:09:42 +05:30
|
|
|
job_artifacts_cobertura needs job_artifacts_accessibility
|
2021-01-03 14:25:43 +05:30
|
|
|
job_artifacts_requirements job_artifacts_coverage_fuzzing
|
|
|
|
job_artifacts_api_fuzzing].freeze
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-05-24 23:13:21 +05:30
|
|
|
ignore_accessors =
|
2018-03-17 18:26:18 +05:30
|
|
|
%i[type lock_version target_url base_tags trace_sections
|
2018-12-13 13:39:08 +05:30
|
|
|
commit_id deployment erased_by_id project_id
|
2017-08-17 22:00:37 +05:30
|
|
|
runner_id tag_taggings taggings tags trigger_request_id
|
2018-05-09 12:01:36 +05:30
|
|
|
user_id auto_canceled_by_id retried failure_reason
|
2019-07-31 22:56:46 +05:30
|
|
|
sourced_pipelines artifacts_file_store artifacts_metadata_store
|
2019-09-04 21:01:54 +05:30
|
|
|
metadata runner_session trace_chunks upstream_pipeline_id
|
2020-03-13 15:44:24 +05:30
|
|
|
artifacts_file artifacts_metadata artifacts_size commands
|
2020-04-08 14:13:33 +05:30
|
|
|
resource resource_group_id processed security_scans author
|
2020-11-24 15:15:51 +05:30
|
|
|
pipeline_id report_results pending_state pages_deployments].freeze
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
shared_examples 'build duplication' do
|
2021-01-03 14:25:43 +05:30
|
|
|
let_it_be(:another_pipeline) { create(:ci_empty_pipeline, project: project) }
|
2017-09-10 17:25:29 +05:30
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
let_it_be(:build) do
|
2018-12-05 23:21:45 +05:30
|
|
|
create(:ci_build, :failed, :expired, :erased, :queued, :coverage, :tags,
|
2020-03-13 15:44:24 +05:30
|
|
|
:allowed_to_fail, :on_tag, :triggered, :teardown_environment, :resource_group,
|
2018-03-17 18:26:18 +05:30
|
|
|
description: 'my-job', stage: 'test', stage_id: stage.id,
|
2018-12-05 23:21:45 +05:30
|
|
|
pipeline: pipeline, auto_canceled_by: another_pipeline,
|
|
|
|
scheduled_at: 10.seconds.since)
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
2021-01-03 14:25:43 +05:30
|
|
|
before_all do
|
2020-05-24 23:13:21 +05:30
|
|
|
# Test correctly behaviour of deprecated artifact because it can be still in use
|
|
|
|
stub_feature_flags(drop_license_management_artifact: false)
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
# Make sure that build has both `stage_id` and `stage` because FactoryBot
|
|
|
|
# can reset one of the fields when assigning another. We plan to deprecate
|
|
|
|
# and remove legacy `stage` column in the future.
|
2020-11-24 15:15:51 +05:30
|
|
|
build.update!(stage: 'test', stage_id: stage.id)
|
2018-12-05 23:21:45 +05:30
|
|
|
|
|
|
|
# Make sure we have one instance for every possible job_artifact_X
|
|
|
|
# associations to check they are correctly rejected on build duplication.
|
|
|
|
Ci::JobArtifact::TYPE_AND_FORMAT_PAIRS.each do |file_type, file_format|
|
|
|
|
create(:ci_job_artifact, file_format,
|
|
|
|
file_type: file_type, job: build, expire_at: build.artifacts_expire_at)
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
create(:ci_job_variable, job: build)
|
|
|
|
create(:ci_build_need, build: build)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
describe 'clone accessors' do
|
2020-04-08 14:13:33 +05:30
|
|
|
let(:forbidden_associations) do
|
|
|
|
Ci::Build.reflect_on_all_associations.each_with_object(Set.new) do |assoc, memo|
|
|
|
|
memo << assoc.name unless assoc.macro == :belongs_to
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-05-24 23:13:21 +05:30
|
|
|
clone_accessors.each do |attribute|
|
2017-08-17 22:00:37 +05:30
|
|
|
it "clones #{attribute} build attribute" do
|
2020-04-08 14:13:33 +05:30
|
|
|
expect(attribute).not_to be_in(forbidden_associations), "association #{attribute} must be `belongs_to`"
|
2018-03-17 18:26:18 +05:30
|
|
|
expect(build.send(attribute)).not_to be_nil
|
|
|
|
expect(new_build.send(attribute)).not_to be_nil
|
2017-08-17 22:00:37 +05:30
|
|
|
expect(new_build.send(attribute)).to eq build.send(attribute)
|
|
|
|
end
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
|
|
|
context 'when job has nullified protected' do
|
|
|
|
before do
|
|
|
|
build.update_attribute(:protected, nil)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "clones protected build attribute" do
|
|
|
|
expect(new_build.protected).to be_nil
|
|
|
|
expect(new_build.protected).to eq build.protected
|
|
|
|
end
|
|
|
|
end
|
2020-04-08 14:13:33 +05:30
|
|
|
|
|
|
|
it 'clones only the needs attributes' do
|
|
|
|
expect(new_build.needs.exists?).to be_truthy
|
|
|
|
expect(build.needs.exists?).to be_truthy
|
|
|
|
|
|
|
|
expect(new_build.needs_attributes).to match(build.needs_attributes)
|
|
|
|
expect(new_build.needs).not_to match(build.needs)
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2020-04-08 14:13:33 +05:30
|
|
|
describe 'reject accessors' do
|
2020-05-24 23:13:21 +05:30
|
|
|
reject_accessors.each do |attribute|
|
2017-08-17 22:00:37 +05:30
|
|
|
it "does not clone #{attribute} build attribute" do
|
|
|
|
expect(new_build.send(attribute)).not_to eq build.send(attribute)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'has correct number of known attributes' do
|
2020-05-24 23:13:21 +05:30
|
|
|
processed_accessors = clone_accessors + reject_accessors
|
|
|
|
known_accessors = processed_accessors + ignore_accessors
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
# :tag_list is a special case, this accessor does not exist
|
|
|
|
# in reflected associations, comes from `act_as_taggable` and
|
|
|
|
# we use it to copy tags, instead of reusing tags.
|
|
|
|
#
|
|
|
|
current_accessors =
|
|
|
|
Ci::Build.attribute_names.map(&:to_sym) +
|
2020-04-08 14:13:33 +05:30
|
|
|
Ci::Build.attribute_aliases.keys.map(&:to_sym) +
|
2017-08-17 22:00:37 +05:30
|
|
|
Ci::Build.reflect_on_all_associations.map(&:name) +
|
2020-04-08 14:13:33 +05:30
|
|
|
[:tag_list, :needs_attributes]
|
2017-08-17 22:00:37 +05:30
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
current_accessors << :secrets if Gitlab.ee?
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
current_accessors.uniq!
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
expect(current_accessors).to include(*processed_accessors)
|
|
|
|
expect(known_accessors).to include(*current_accessors)
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#execute' do
|
2018-11-18 11:00:15 +05:30
|
|
|
let(:new_build) do
|
2021-01-03 14:25:43 +05:30
|
|
|
travel_to(1.second.from_now) do
|
2018-11-18 11:00:15 +05:30
|
|
|
service.execute(build)
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
context 'when user has ability to execute build' do
|
|
|
|
before do
|
2017-09-10 17:25:29 +05:30
|
|
|
stub_not_protect_default_branch
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'build duplication'
|
|
|
|
|
|
|
|
it 'creates a new build that represents the old one' do
|
|
|
|
expect(new_build.name).to eq build.name
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'enqueues the new build' do
|
|
|
|
expect(new_build).to be_pending
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'resolves todos for old build that failed' do
|
2021-04-29 21:17:54 +05:30
|
|
|
expect(::MergeRequests::AddTodoWhenBuildFailsService)
|
2017-08-17 22:00:37 +05:30
|
|
|
.to receive_message_chain(:new, :close)
|
|
|
|
|
|
|
|
service.execute(build)
|
|
|
|
end
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
context 'when there are subsequent processables that are skipped' do
|
2017-08-17 22:00:37 +05:30
|
|
|
let!(:subsequent_build) do
|
2018-03-17 18:26:18 +05:30
|
|
|
create(:ci_build, :skipped, stage_idx: 2,
|
|
|
|
pipeline: pipeline,
|
|
|
|
stage: 'deploy')
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2020-11-24 15:15:51 +05:30
|
|
|
let!(:subsequent_bridge) do
|
|
|
|
create(:ci_bridge, :skipped, stage_idx: 2,
|
|
|
|
pipeline: pipeline,
|
|
|
|
stage: 'deploy')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'resumes pipeline processing in the subsequent stage' do
|
2017-08-17 22:00:37 +05:30
|
|
|
service.execute(build)
|
|
|
|
|
|
|
|
expect(subsequent_build.reload).to be_created
|
2020-11-24 15:15:51 +05:30
|
|
|
expect(subsequent_bridge.reload).to be_created
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2021-03-08 18:12:59 +05:30
|
|
|
|
|
|
|
it 'updates ownership for subsequent builds' do
|
|
|
|
expect { service.execute(build) }.to change { subsequent_build.reload.user }.to(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'updates ownership for subsequent bridges' do
|
|
|
|
expect { service.execute(build) }.to change { subsequent_bridge.reload.user }.to(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not cause n+1 when updaing build ownership' do
|
|
|
|
control_count = ActiveRecord::QueryRecorder.new(skip_cached: false) { service.execute(build) }.count
|
|
|
|
|
|
|
|
create_list(:ci_build, 2, :skipped, stage_idx: build.stage_idx + 1, pipeline: pipeline, stage: 'deploy')
|
|
|
|
|
|
|
|
expect { service.execute(build) }.not_to exceed_all_query_limit(control_count)
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2020-05-24 23:13:21 +05:30
|
|
|
|
|
|
|
context 'when pipeline has other builds' do
|
|
|
|
let!(:stage2) { create(:ci_stage_entity, project: project, pipeline: pipeline, name: 'deploy') }
|
|
|
|
let!(:build2) { create(:ci_build, pipeline: pipeline, stage_id: stage.id ) }
|
|
|
|
let!(:deploy) { create(:ci_build, pipeline: pipeline, stage_id: stage2.id) }
|
|
|
|
let!(:deploy_needs_build2) { create(:ci_build_need, build: deploy, name: build2.name) }
|
|
|
|
|
|
|
|
context 'when build has nil scheduling_type' do
|
|
|
|
before do
|
|
|
|
build.pipeline.processables.update_all(scheduling_type: nil)
|
|
|
|
build.reload
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'populates scheduling_type of processables' do
|
|
|
|
expect(new_build.scheduling_type).to eq('stage')
|
|
|
|
expect(build.reload.scheduling_type).to eq('stage')
|
|
|
|
expect(build2.reload.scheduling_type).to eq('stage')
|
|
|
|
expect(deploy.reload.scheduling_type).to eq('dag')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when build has scheduling_type' do
|
|
|
|
it 'does not call populate_scheduling_type!' do
|
|
|
|
expect_any_instance_of(Ci::Pipeline).not_to receive(:ensure_scheduling_type!)
|
|
|
|
|
|
|
|
expect(new_build.scheduling_type).to eq('stage')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2020-11-24 15:15:51 +05:30
|
|
|
|
|
|
|
context 'when the pipeline is a child pipeline and the bridge is depended' do
|
|
|
|
let!(:parent_pipeline) { create(:ci_pipeline, project: project) }
|
|
|
|
let!(:bridge) { create(:ci_bridge, :strategy_depend, pipeline: parent_pipeline, status: 'success') }
|
|
|
|
let!(:source_pipeline) { create(:ci_sources_pipeline, pipeline: pipeline, source_job: bridge) }
|
|
|
|
|
|
|
|
it 'marks source bridge as pending' do
|
|
|
|
service.execute(build)
|
|
|
|
|
|
|
|
expect(bridge.reload).to be_pending
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user does not have ability to execute build' do
|
2021-01-03 14:25:43 +05:30
|
|
|
let(:user) { reporter }
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'raises an error' do
|
|
|
|
expect { service.execute(build) }
|
|
|
|
.to raise_error Gitlab::Access::AccessDeniedError
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#reprocess' do
|
2018-11-18 11:00:15 +05:30
|
|
|
let(:new_build) do
|
2021-01-03 14:25:43 +05:30
|
|
|
travel_to(1.second.from_now) do
|
2018-11-18 11:00:15 +05:30
|
|
|
service.reprocess!(build)
|
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
|
|
|
|
context 'when user has ability to execute build' do
|
|
|
|
before do
|
2017-09-10 17:25:29 +05:30
|
|
|
stub_not_protect_default_branch
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'build duplication'
|
|
|
|
|
|
|
|
it 'creates a new build that represents the old one' do
|
|
|
|
expect(new_build.name).to eq build.name
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not enqueue the new build' do
|
|
|
|
expect(new_build).to be_created
|
2020-03-13 15:44:24 +05:30
|
|
|
expect(new_build).not_to be_processed
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
it 'does mark old build as retried' do
|
2017-08-17 22:00:37 +05:30
|
|
|
expect(new_build).to be_latest
|
2018-03-17 18:26:18 +05:30
|
|
|
expect(build).to be_retried
|
2020-03-13 15:44:24 +05:30
|
|
|
expect(build).to be_processed
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
2019-12-21 20:55:43 +05:30
|
|
|
|
|
|
|
context 'when build with deployment is retried' do
|
|
|
|
let!(:build) do
|
2020-03-13 15:44:24 +05:30
|
|
|
create(:ci_build, :with_deployment, :deploy_to_production,
|
|
|
|
pipeline: pipeline, stage_id: stage.id, project: project)
|
2019-12-21 20:55:43 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a new deployment' do
|
|
|
|
expect { new_build }.to change { Deployment.count }.by(1)
|
|
|
|
end
|
2020-04-08 14:13:33 +05:30
|
|
|
|
|
|
|
it 'persists expanded environment name' do
|
|
|
|
expect(new_build.metadata.expanded_environment_name).to eq('production')
|
|
|
|
end
|
2019-12-21 20:55:43 +05:30
|
|
|
end
|
2020-03-13 15:44:24 +05:30
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
context 'when build has needs' do
|
2020-03-13 15:44:24 +05:30
|
|
|
before do
|
2020-07-28 23:09:34 +05:30
|
|
|
create(:ci_build_need, build: build, name: 'build1')
|
|
|
|
create(:ci_build_need, build: build, name: 'build2')
|
2020-03-13 15:44:24 +05:30
|
|
|
end
|
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
it 'bulk inserts all needs' do
|
|
|
|
expect(Ci::BuildNeed).to receive(:bulk_insert!).and_call_original
|
2020-03-13 15:44:24 +05:30
|
|
|
|
2020-07-28 23:09:34 +05:30
|
|
|
new_build
|
2020-03-13 15:44:24 +05:30
|
|
|
end
|
|
|
|
end
|
2017-08-17 22:00:37 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when user does not have ability to execute build' do
|
2021-01-03 14:25:43 +05:30
|
|
|
let(:user) { reporter }
|
|
|
|
|
2017-08-17 22:00:37 +05:30
|
|
|
it 'raises an error' do
|
|
|
|
expect { service.reprocess!(build) }
|
|
|
|
.to raise_error Gitlab::Access::AccessDeniedError
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|