diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2019-12-10 10:53:40 +0300 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2019-12-10 10:53:40 +0300 |
commit | cfc792b9ca064990e6540cb742e80529ea669a81 (patch) | |
tree | 147cd4256319990cebbc02fe8e4fbbbe06f5720a /spec/workers | |
parent | 93c6764dacd4c605027ef1cd367d3aebe420b223 (diff) |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'spec/workers')
3 files changed, 161 insertions, 0 deletions
diff --git a/spec/workers/clusters/applications/activate_service_worker_spec.rb b/spec/workers/clusters/applications/activate_service_worker_spec.rb new file mode 100644 index 00000000000..09f4c536edf --- /dev/null +++ b/spec/workers/clusters/applications/activate_service_worker_spec.rb @@ -0,0 +1,52 @@ +# frozen_string_literal: true + +require 'spec_helper' + +describe Clusters::Applications::ActivateServiceWorker, '#perform' do + context 'cluster exists' do + describe 'prometheus service' do + let(:service_name) { 'prometheus' } + + before do + create(:clusters_applications_prometheus, :installed, cluster: cluster) + end + + context 'cluster type: group' do + let(:group) { create(:group) } + let(:project) { create(:project, group: group) } + let(:cluster) { create(:cluster_for_group, :with_installed_helm, groups: [group]) } + + it 'ensures Prometheus service is activated' do + expect { described_class.new.perform(cluster.id, service_name) } + .to change { project.reload.prometheus_service&.active }.from(nil).to(true) + end + end + + context 'cluster type: project' do + let(:project) { create(:project) } + let(:cluster) { create(:cluster, :with_installed_helm, projects: [project]) } + + it 'ensures Prometheus service is activated' do + expect { described_class.new.perform(cluster.id, service_name) } + .to change { project.reload.prometheus_service&.active }.from(nil).to(true) + end + end + + context 'cluster type: instance' do + let(:project) { create(:project) } + let(:cluster) { create(:cluster, :instance) } + + it 'ensures Prometheus service is activated' do + expect { described_class.new.perform(cluster.id, service_name) } + .to change { project.reload.prometheus_service&.active }.from(nil).to(true) + end + end + end + end + + context 'cluster does not exist' do + it 'does not raise Record Not Found error' do + expect { described_class.new.perform(0, 'ignored in this context') }.not_to raise_error(ActiveRecord::RecordNotFound) + end + end +end diff --git a/spec/workers/clusters/applications/deactivate_service_worker_spec.rb b/spec/workers/clusters/applications/deactivate_service_worker_spec.rb new file mode 100644 index 00000000000..809843a1bc8 --- /dev/null +++ b/spec/workers/clusters/applications/deactivate_service_worker_spec.rb @@ -0,0 +1,68 @@ +# frozen_string_literal: true + +require 'spec_helper' + +describe Clusters::Applications::DeactivateServiceWorker, '#perform' do + context 'cluster exists' do + describe 'prometheus service' do + let(:service_name) { 'prometheus' } + let!(:application) { create(:clusters_applications_prometheus, :installed, cluster: cluster) } + + context 'prometheus service exists' do + let!(:prometheus_service) { create(:prometheus_service, project: project, manual_configuration: false, active: true) } + + before do + application.delete # prometheus service before save synchronises active stated with application existance. + end + + context 'cluster type: group' do + let(:group) { create(:group) } + let(:project) { create(:project, group: group) } + let(:cluster) { create(:cluster_for_group, :with_installed_helm, groups: [group]) } + + it 'ensures Prometheus service is deactivated' do + expect { described_class.new.perform(cluster.id, service_name) } + .to change { prometheus_service.reload.active }.from(true).to(false) + end + end + + context 'cluster type: project' do + let(:project) { create(:project) } + let(:cluster) { create(:cluster, :with_installed_helm, projects: [project]) } + + it 'ensures Prometheus service is deactivated' do + expect { described_class.new.perform(cluster.id, service_name) } + .to change { prometheus_service.reload.active }.from(true).to(false) + end + end + + context 'cluster type: instance' do + let(:project) { create(:project) } + let(:cluster) { create(:cluster, :with_installed_helm, :instance) } + + it 'ensures Prometheus service is deactivated' do + expect { described_class.new.perform(cluster.id, service_name) } + .to change { prometheus_service.reload.active }.from(true).to(false) + end + end + end + + context 'prometheus service does not exist' do + context 'cluster type: project' do + let(:project) { create(:project) } + let(:cluster) { create(:cluster, :with_installed_helm, projects: [project]) } + + it 'does not raise errors' do + expect { described_class.new.perform(cluster.id, service_name) }.not_to raise_error + end + end + end + end + end + + context 'cluster does not exist' do + it 'raises Record Not Found error' do + expect { described_class.new.perform(0, 'ignored in this context') }.to raise_error(ActiveRecord::RecordNotFound) + end + end +end diff --git a/spec/workers/personal_access_tokens/expiring_worker_spec.rb b/spec/workers/personal_access_tokens/expiring_worker_spec.rb new file mode 100644 index 00000000000..fcc09e2705c --- /dev/null +++ b/spec/workers/personal_access_tokens/expiring_worker_spec.rb @@ -0,0 +1,41 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe PersonalAccessTokens::ExpiringWorker, type: :worker do + subject(:worker) { described_class.new } + + describe '#perform' do + context 'when a token needs to be notified' do + let!(:pat) { create(:personal_access_token, expires_at: 5.days.from_now) } + + it 'uses notification service to send the email' do + expect_next_instance_of(NotificationService) do |notification_service| + expect(notification_service).to receive(:access_token_about_to_expire).with(pat.user) + end + + worker.perform + end + + it 'marks the notification as delivered' do + expect { worker.perform }.to change { pat.reload.expire_notification_delivered }.from(false).to(true) + end + end + + context 'when no tokens need to be notified' do + let!(:pat) { create(:personal_access_token, expires_at: 5.days.from_now, expire_notification_delivered: true) } + + it "doesn't use notification service to send the email" do + expect_next_instance_of(NotificationService) do |notification_service| + expect(notification_service).not_to receive(:access_token_about_to_expire).with(pat.user) + end + + worker.perform + end + + it "doesn't change the notificationd delivered of the token" do + expect { worker.perform }.not_to change { pat.reload.expire_notification_delivered } + end + end + end +end |