diff options
Diffstat (limited to 'spec/graphql/resolvers/ci')
-rw-r--r-- | spec/graphql/resolvers/ci/jobs_resolver_spec.rb | 40 | ||||
-rw-r--r-- | spec/graphql/resolvers/ci/runner_setup_resolver_spec.rb | 104 |
2 files changed, 144 insertions, 0 deletions
diff --git a/spec/graphql/resolvers/ci/jobs_resolver_spec.rb b/spec/graphql/resolvers/ci/jobs_resolver_spec.rb new file mode 100644 index 00000000000..a836c89bd61 --- /dev/null +++ b/spec/graphql/resolvers/ci/jobs_resolver_spec.rb @@ -0,0 +1,40 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe Resolvers::Ci::JobsResolver do + include GraphqlHelpers + + let_it_be(:pipeline) { create(:ci_pipeline) } + + before_all do + create(:ci_build, name: 'Normal job', pipeline: pipeline) + create(:ci_build, :sast, name: 'DAST job', pipeline: pipeline) + create(:ci_build, :dast, name: 'SAST job', pipeline: pipeline) + create(:ci_build, :container_scanning, name: 'Container scanning job', pipeline: pipeline) + end + + describe '#resolve' do + context 'when security_report_types is empty' do + it "returns all of the pipeline's jobs" do + jobs = resolve(described_class, obj: pipeline, args: {}, ctx: {}) + + job_names = jobs.map(&:name) + expect(job_names).to contain_exactly('Normal job', 'DAST job', 'SAST job', 'Container scanning job') + end + end + + context 'when security_report_types is present' do + it "returns the pipeline's jobs with the given security report types" do + report_types = [ + ::Types::Security::ReportTypeEnum.values['SAST'].value, + ::Types::Security::ReportTypeEnum.values['DAST'].value + ] + jobs = resolve(described_class, obj: pipeline, args: { security_report_types: report_types }, ctx: {}) + + job_names = jobs.map(&:name) + expect(job_names).to contain_exactly('DAST job', 'SAST job') + end + end + end +end diff --git a/spec/graphql/resolvers/ci/runner_setup_resolver_spec.rb b/spec/graphql/resolvers/ci/runner_setup_resolver_spec.rb new file mode 100644 index 00000000000..3d004290d9b --- /dev/null +++ b/spec/graphql/resolvers/ci/runner_setup_resolver_spec.rb @@ -0,0 +1,104 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe Resolvers::Ci::RunnerSetupResolver do + include GraphqlHelpers + + describe '#resolve' do + let(:user) { create(:user) } + + subject(:resolve_subject) { resolve(described_class, ctx: { current_user: user }, args: { platform: platform, architecture: 'amd64' }.merge(target_param)) } + + context 'with container platforms' do + let(:platform) { 'docker' } + let(:project) { create(:project) } + let(:target_param) { { project_id: project.to_global_id } } + + it 'returns install instructions' do + expect(resolve_subject[:install_instructions]).not_to eq(nil) + end + + it 'does not return register instructions' do + expect(resolve_subject[:register_instructions]).to eq(nil) + end + end + + context 'with regular platforms' do + let(:platform) { 'linux' } + + context 'without target parameter' do + let(:target_param) { {} } + + context 'when user is not admin' do + it 'returns access error' do + expect { resolve_subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + end + end + + context 'when user is admin' do + before do + user.update!(admin: true) + end + + it 'returns install and register instructions' do + expect(resolve_subject.keys).to contain_exactly(:install_instructions, :register_instructions) + expect(resolve_subject.values).not_to include(nil) + end + end + end + + context 'with project target parameter' do + let(:project) { create(:project) } + let(:target_param) { { project_id: project.to_global_id } } + + context 'when user has access to admin builds on project' do + before do + project.add_maintainer(user) + end + + it 'returns install and register instructions' do + expect(resolve_subject.keys).to contain_exactly(:install_instructions, :register_instructions) + expect(resolve_subject.values).not_to include(nil) + end + end + + context 'when user does not have access to admin builds on project' do + before do + project.add_developer(user) + end + + it 'returns access error' do + expect { resolve_subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + end + end + end + + context 'with group target parameter' do + let(:group) { create(:group) } + let(:target_param) { { group_id: group.to_global_id } } + + context 'when user has access to admin builds on group' do + before do + group.add_owner(user) + end + + it 'returns install and register instructions' do + expect(resolve_subject.keys).to contain_exactly(:install_instructions, :register_instructions) + expect(resolve_subject.values).not_to include(nil) + end + end + + context 'when user does not have access to admin builds on group' do + before do + group.add_developer(user) + end + + it 'returns access error' do + expect { resolve_subject }.to raise_error(Gitlab::Graphql::Errors::ResourceNotAvailable) + end + end + end + end + end +end |