252 lines
6.9 KiB
Ruby
252 lines
6.9 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
RSpec.describe Projects::RunnersController, feature_category: :runner_fleet do
|
|
let_it_be(:user) { create(:user) }
|
|
let_it_be(:project) { create(:project) }
|
|
let_it_be(:runner) { create(:ci_runner, :project, projects: [project]) }
|
|
|
|
let(:params) do
|
|
{
|
|
namespace_id: project.namespace,
|
|
project_id: project,
|
|
id: runner
|
|
}
|
|
end
|
|
|
|
before do
|
|
sign_in(user)
|
|
project.add_maintainer(user)
|
|
end
|
|
|
|
describe '#new' do
|
|
let(:params) do
|
|
{
|
|
namespace_id: project.namespace,
|
|
project_id: project
|
|
}
|
|
end
|
|
|
|
context 'when create_runner_workflow_for_namespace is enabled' do
|
|
before do
|
|
stub_feature_flags(create_runner_workflow_for_namespace: [project.namespace])
|
|
end
|
|
|
|
context 'when user is maintainer' do
|
|
before do
|
|
project.add_maintainer(user)
|
|
end
|
|
|
|
it 'renders new with 200 status code' do
|
|
get :new, params: params
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
expect(response).to render_template(:new)
|
|
end
|
|
end
|
|
|
|
context 'when user is not maintainer' do
|
|
before do
|
|
project.add_developer(user)
|
|
end
|
|
|
|
it 'renders a 404' do
|
|
get :new, params: params
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when create_runner_workflow_for_namespace is disabled' do
|
|
before do
|
|
stub_feature_flags(create_runner_workflow_for_namespace: false)
|
|
end
|
|
|
|
context 'when user is maintainer' do
|
|
before do
|
|
project.add_maintainer(user)
|
|
end
|
|
|
|
it 'renders a 404' do
|
|
get :new, params: params
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#register' do
|
|
subject(:register) { get :register, params: { namespace_id: project.namespace, project_id: project, id: new_runner } }
|
|
|
|
context 'when create_runner_workflow_for_namespace is enabled' do
|
|
before do
|
|
stub_feature_flags(create_runner_workflow_for_namespace: [project.namespace])
|
|
end
|
|
|
|
context 'when user is maintainer' do
|
|
before do
|
|
project.add_maintainer(user)
|
|
end
|
|
|
|
context 'when runner can be registered after creation' do
|
|
let_it_be(:new_runner) { create(:ci_runner, :project, projects: [project], registration_type: :authenticated_user) }
|
|
|
|
it 'renders a :register template' do
|
|
register
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
expect(response).to render_template(:register)
|
|
end
|
|
end
|
|
|
|
context 'when runner cannot be registered after creation' do
|
|
let_it_be(:new_runner) { runner }
|
|
|
|
it 'returns :not_found' do
|
|
register
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when user is not maintainer' do
|
|
before do
|
|
project.add_developer(user)
|
|
end
|
|
|
|
context 'when runner can be registered after creation' do
|
|
let_it_be(:new_runner) { create(:ci_runner, :project, projects: [project], registration_type: :authenticated_user) }
|
|
|
|
it 'returns :not_found' do
|
|
register
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'when create_runner_workflow_for_namespace is disabled' do
|
|
let_it_be(:new_runner) { create(:ci_runner, :project, projects: [project], registration_type: :authenticated_user) }
|
|
|
|
before do
|
|
stub_feature_flags(create_runner_workflow_for_namespace: false)
|
|
end
|
|
|
|
context 'when user is maintainer' do
|
|
before do
|
|
project.add_maintainer(user)
|
|
end
|
|
|
|
it 'returns :not_found' do
|
|
register
|
|
|
|
expect(response).to have_gitlab_http_status(:not_found)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '#update' do
|
|
it 'updates the runner and ticks the queue' do
|
|
new_desc = runner.description.swapcase
|
|
|
|
expect do
|
|
post :update, params: params.merge(runner: { description: new_desc })
|
|
end.to change { runner.ensure_runner_queue_value }
|
|
|
|
runner.reload
|
|
|
|
expect(response).to have_gitlab_http_status(:found)
|
|
expect(runner.description).to eq(new_desc)
|
|
end
|
|
end
|
|
|
|
describe '#destroy' do
|
|
it 'destroys the runner' do
|
|
expect_next_instance_of(Ci::Runners::UnregisterRunnerService, runner, user) do |service|
|
|
expect(service).to receive(:execute).once.and_call_original
|
|
end
|
|
|
|
delete :destroy, params: params
|
|
|
|
expect(response).to have_gitlab_http_status(:found)
|
|
expect(Ci::Runner.find_by(id: runner.id)).to be_nil
|
|
end
|
|
end
|
|
|
|
describe '#resume' do
|
|
it 'marks the runner as active and ticks the queue' do
|
|
runner.update!(active: false)
|
|
|
|
expect do
|
|
post :resume, params: params
|
|
end.to change { runner.ensure_runner_queue_value }
|
|
|
|
runner.reload
|
|
|
|
expect(response).to have_gitlab_http_status(:found)
|
|
expect(runner.active).to eq(true)
|
|
end
|
|
end
|
|
|
|
describe '#pause' do
|
|
it 'marks the runner as inactive and ticks the queue' do
|
|
runner.update!(active: true)
|
|
|
|
expect do
|
|
post :pause, params: params
|
|
end.to change { runner.ensure_runner_queue_value }
|
|
|
|
runner.reload
|
|
|
|
expect(response).to have_gitlab_http_status(:found)
|
|
expect(runner.active).to eq(false)
|
|
end
|
|
end
|
|
|
|
describe '#toggle_shared_runners' do
|
|
let(:group) { create(:group) }
|
|
let(:project) { create(:project, group: group) }
|
|
|
|
it 'toggles shared_runners_enabled when the group allows shared runners' do
|
|
project.update!(shared_runners_enabled: true)
|
|
|
|
post :toggle_shared_runners, params: params
|
|
|
|
project.reload
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
expect(project.shared_runners_enabled).to eq(false)
|
|
end
|
|
|
|
it 'toggles shared_runners_enabled when the group disallows shared runners but allows overrides' do
|
|
group.update!(shared_runners_enabled: false, allow_descendants_override_disabled_shared_runners: true)
|
|
project.update!(shared_runners_enabled: false)
|
|
|
|
post :toggle_shared_runners, params: params
|
|
|
|
project.reload
|
|
|
|
expect(response).to have_gitlab_http_status(:ok)
|
|
expect(project.shared_runners_enabled).to eq(true)
|
|
end
|
|
|
|
it 'does not enable if the group disallows shared runners' do
|
|
group.update!(shared_runners_enabled: false, allow_descendants_override_disabled_shared_runners: false)
|
|
project.update!(shared_runners_enabled: false)
|
|
|
|
post :toggle_shared_runners, params: params
|
|
|
|
project.reload
|
|
|
|
expect(response).to have_gitlab_http_status(:unauthorized)
|
|
expect(project.shared_runners_enabled).to eq(false)
|
|
expect(json_response['error']).to eq('Shared runners enabled cannot be enabled because parent group does not allow it')
|
|
end
|
|
end
|
|
end
|