diff options
Diffstat (limited to 'spec/graphql/mutations/terraform/state')
-rw-r--r-- | spec/graphql/mutations/terraform/state/delete_spec.rb | 55 | ||||
-rw-r--r-- | spec/graphql/mutations/terraform/state/lock_spec.rb | 68 | ||||
-rw-r--r-- | spec/graphql/mutations/terraform/state/unlock_spec.rb | 61 |
3 files changed, 184 insertions, 0 deletions
diff --git a/spec/graphql/mutations/terraform/state/delete_spec.rb b/spec/graphql/mutations/terraform/state/delete_spec.rb new file mode 100644 index 00000000000..313a85a4bac --- /dev/null +++ b/spec/graphql/mutations/terraform/state/delete_spec.rb @@ -0,0 +1,55 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe Mutations::Terraform::State::Delete do + let_it_be(:user) { create(:user) } + let_it_be(:state) { create(:terraform_state) } + + let(:mutation) do + described_class.new( + object: double, + context: { current_user: user }, + field: double + ) + end + + it { expect(described_class.graphql_name).to eq('TerraformStateDelete') } + it { expect(described_class).to require_graphql_authorizations(:admin_terraform_state) } + + describe '#resolve' do + let(:global_id) { state.to_global_id } + + subject { mutation.resolve(id: global_id) } + + context 'user does not have permission' do + it 'raises an error', :aggregate_failures do + expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + expect { state.reload }.not_to raise_error + end + end + + context 'user has permission' do + before do + state.project.add_maintainer(user) + end + + it 'deletes the state', :aggregate_failures do + expect do + expect(subject).to eq(errors: []) + end.to change { ::Terraform::State.count }.by(-1) + + expect { state.reload }.to raise_error(ActiveRecord::RecordNotFound) + end + end + + context 'with invalid params' do + let(:global_id) { user.to_global_id } + + it 'raises an error', :aggregate_failures do + expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + expect { state.reload }.not_to raise_error + end + end + end +end diff --git a/spec/graphql/mutations/terraform/state/lock_spec.rb b/spec/graphql/mutations/terraform/state/lock_spec.rb new file mode 100644 index 00000000000..c83563040fd --- /dev/null +++ b/spec/graphql/mutations/terraform/state/lock_spec.rb @@ -0,0 +1,68 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe Mutations::Terraform::State::Lock do + let_it_be(:user) { create(:user) } + let_it_be(:state) { create(:terraform_state) } + + let(:mutation) do + described_class.new( + object: double, + context: { current_user: user }, + field: double + ) + end + + it { expect(described_class.graphql_name).to eq('TerraformStateLock') } + it { expect(described_class).to require_graphql_authorizations(:admin_terraform_state) } + + describe '#resolve' do + let(:global_id) { state.to_global_id } + + subject { mutation.resolve(id: global_id) } + + context 'user does not have permission' do + it 'raises an error', :aggregate_failures do + expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + expect(state.reload).not_to be_locked + end + end + + context 'user has permission' do + before do + state.project.add_maintainer(user) + end + + it 'locks the state', :aggregate_failures do + expect(subject).to eq(errors: []) + + expect(state.reload).to be_locked + expect(state.locked_by_user).to eq(user) + expect(state.lock_xid).to be_present + expect(state.locked_at).to be_present + end + + context 'state is already locked' do + let(:locked_by_user) { create(:user) } + let(:state) { create(:terraform_state, :locked, locked_by_user: locked_by_user) } + + it 'does not modify the existing lock', :aggregate_failures do + expect(subject).to eq(errors: ['state is already locked']) + + expect(state.reload).to be_locked + expect(state.locked_by_user).to eq(locked_by_user) + end + end + end + + context 'with invalid params' do + let(:global_id) { user.to_global_id } + + it 'raises an error', :aggregate_failures do + expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + expect(state.reload).not_to be_locked + end + end + end +end diff --git a/spec/graphql/mutations/terraform/state/unlock_spec.rb b/spec/graphql/mutations/terraform/state/unlock_spec.rb new file mode 100644 index 00000000000..4918a1c4abf --- /dev/null +++ b/spec/graphql/mutations/terraform/state/unlock_spec.rb @@ -0,0 +1,61 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe Mutations::Terraform::State::Unlock do + let_it_be(:user) { create(:user) } + let_it_be(:state) { create(:terraform_state, :locked) } + + let(:mutation) do + described_class.new( + object: double, + context: { current_user: user }, + field: double + ) + end + + it { expect(described_class.graphql_name).to eq('TerraformStateUnlock') } + it { expect(described_class).to require_graphql_authorizations(:admin_terraform_state) } + + describe '#resolve' do + let(:global_id) { state.to_global_id } + + subject { mutation.resolve(id: global_id) } + + context 'user does not have permission' do + it 'raises an error', :aggregate_failures do + expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + expect(state.reload).to be_locked + end + end + + context 'user has permission' do + before do + state.project.add_maintainer(user) + end + + it 'unlocks the state', :aggregate_failures do + expect(subject).to eq(errors: []) + expect(state.reload).not_to be_locked + end + + context 'state is already unlocked' do + let(:state) { create(:terraform_state) } + + it 'does not modify the state' do + expect(subject).to eq(errors: []) + expect(state.reload).not_to be_locked + end + end + end + + context 'with invalid params' do + let(:global_id) { user.to_global_id } + + it 'raises an error', :aggregate_failures do + expect { subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + expect(state.reload).to be_locked + end + end + end +end |