# frozen_string_literal: true require 'spec_helper' RSpec.describe ::Ci::DestroyPipelineService do let(:project) { create(:project, :repository) } let!(:pipeline) { create(:ci_pipeline, :success, project: project, sha: project.commit.id) } subject { described_class.new(project, user).execute(pipeline) } context 'user is owner' do let(:user) { project.owner } it 'destroys the pipeline' do subject expect { pipeline.reload }.to raise_error(ActiveRecord::RecordNotFound) end it 'clears the cache', :use_clean_rails_memory_store_caching do create(:commit_status, :success, pipeline: pipeline, ref: pipeline.ref) expect(project.pipeline_status.has_status?).to be_truthy subject # Need to use find to avoid memoization expect(Project.find(project.id).pipeline_status.has_status?).to be_falsey end it 'does not log an audit event' do expect { subject }.not_to change { SecurityEvent.count } end context 'when the pipeline has jobs' do let!(:build) { create(:ci_build, project: project, pipeline: pipeline) } it 'destroys associated jobs' do subject expect { build.reload }.to raise_error(ActiveRecord::RecordNotFound) end it 'destroys associated stages' do stages = pipeline.stages subject expect(stages).to all(raise_error(ActiveRecord::RecordNotFound)) end context 'when job has artifacts' do let!(:artifact) { create(:ci_job_artifact, :archive, job: build) } it 'destroys associated artifacts' do subject expect { artifact.reload }.to raise_error(ActiveRecord::RecordNotFound) end end end end context 'user is not owner' do let(:user) { create(:user) } it 'raises an exception' do expect { subject }.to raise_error(Gitlab::Access::AccessDeniedError) end end end