# frozen_string_literal: true require 'spec_helper' RSpec.describe BuildDetailsEntity do include ProjectForksHelper it 'inherits from JobEntity' do expect(described_class).to be < JobEntity end describe '#as_json' do let(:project) { create(:project, :repository) } let(:user) { project.owner } let(:pipeline) { create(:ci_pipeline, project: project) } let(:build) { create(:ci_build, :failed, pipeline: pipeline) } let(:request) { double('request', project: project) } let(:entity) do described_class.new(build, request: request, current_user: user, project: project) end subject { entity.as_json } before do allow(request).to receive(:current_user).and_return(user) end it 'contains the needed key value pairs' do expect(subject).to include(:coverage, :erased_at, :duration) expect(subject).to include(:runner, :pipeline) expect(subject).to include(:raw_path, :new_issue_path) end context 'when the user has access to issues and merge requests' do context 'when merge request orginates from the same project' do let(:merge_request) do create(:merge_request, source_project: project, source_branch: build.ref) end before do allow(build).to receive(:merge_request).and_return(merge_request) end it 'contains the needed key value pairs' do expect(subject).to include(:merge_request) expect(subject).to include(:new_issue_path) end it 'exposes correct details of the merge request' do expect(subject[:merge_request][:iid]).to eq merge_request.iid end it 'has a correct merge request path' do expect(subject[:merge_request][:path]).to include project.full_path end end context 'when merge request is from a fork' do let(:forked_project) { fork_project(project) } let(:pipeline) { create(:ci_pipeline, project: forked_project) } before do allow(build).to receive(:merge_request).and_return(merge_request) forked_project.add_developer(user) end let(:merge_request) do create(:merge_request, source_project: forked_project, target_project: project, source_branch: build.ref) end it 'contains the needed key value pairs' do expect(subject).to include(:merge_request) expect(subject).to include(:new_issue_path) end it 'exposes details of the merge request' do expect(subject[:merge_request][:iid]).to eq merge_request.iid end it 'has a merge request path to a target project' do expect(subject[:merge_request][:path]) .to include project.full_path end end context 'when the build has not been erased' do let(:build) { create(:ci_build, :erasable, project: project) } it 'exposes a build erase path' do expect(subject).to include(:erase_path) end end context 'when the build has been erased' do let(:build) { create(:ci_build, :erased, project: project) } it 'exposes the user who erased the build' do expect(subject).to include(:erased_by) end end end context 'when the user can only read the build' do let(:user) { create(:user) } it "won't display the paths to issues and merge requests" do expect(subject['new_issue_path']).to be_nil expect(subject['merge_request_path']).to be_nil end end context 'when the build has failed' do let(:build) { create(:ci_build, :created) } before do build.drop!(:unmet_prerequisites) end it { is_expected.to include(failure_reason: 'unmet_prerequisites') } it { is_expected.to include(callout_message: CommitStatusPresenter.callout_failure_messages[:unmet_prerequisites]) } end context 'when the build has failed due to a missing dependency' do let!(:test1) { create(:ci_build, :success, :expired, pipeline: pipeline, name: 'test1', stage_idx: 0) } let!(:test2) { create(:ci_build, :success, :expired, pipeline: pipeline, name: 'test2', stage_idx: 1) } let!(:build) { create(:ci_build, :pending, pipeline: pipeline, stage_idx: 2, options: { dependencies: %w(test1 test2) }) } let(:message) { subject[:callout_message] } before do build.drop!(:missing_dependency_failure) end it { is_expected.to include(failure_reason: 'missing_dependency_failure') } it 'includes the failing dependencies in the callout message' do expect(message).to include('test1') expect(message).to include('test2') end end context 'when a build has environment with latest deployment' do let(:build) do create(:ci_build, :running, environment: environment.name, pipeline: pipeline) end let(:environment) do create(:environment, project: project, name: 'staging', state: :available) end before do create(:deployment, :success, environment: environment, project: project) allow(request).to receive(:project).and_return(project) end it 'does not serialize latest deployment commit and associated builds' do response = subject.with_indifferent_access response.dig(:deployment_status, :environment, :last_deployment).tap do |deployment| expect(deployment).not_to include(:commit, :manual_actions, :scheduled_actions) end end end context 'when the build has reports' do let!(:report) { create(:ci_job_artifact, :codequality, job: build) } it 'exposes the report artifacts' do expect(subject[:reports].count).to eq(1) expect(subject[:reports].first[:file_type]).to eq('codequality') end end context 'when the build has no archive type artifacts' do let!(:report) { create(:ci_job_artifact, :codequality, job: build) } it 'does not expose any artifact actions path' do expect(subject[:artifact].keys).not_to include(:download_path, :browse_path, :keep_path) end end context 'when the build has expired artifacts' do let!(:build) { create(:ci_build, :artifacts, pipeline: pipeline, artifacts_expire_at: 7.days.ago) } context 'when pipeline is unlocked' do before do build.pipeline.unlocked! end it 'artifact locked is false' do expect(subject.dig(:artifact, :locked)).to eq(false) end it 'does not expose any artifact actions path' do expect(subject[:artifact].keys).not_to include(:download_path, :browse_path, :keep_path) end end context 'when the pipeline is artifacts_locked' do before do build.pipeline.artifacts_locked! end it 'artifact locked is true' do expect(subject.dig(:artifact, :locked)).to eq(true) end it 'exposes download, browse and keep artifact actions path' do expect(subject[:artifact].keys).to include(:download_path, :browse_path, :keep_path) end end end context 'when the build has archive type artifacts' do let!(:build) { create(:ci_build, :artifacts, pipeline: pipeline, artifacts_expire_at: 7.days.from_now) } let!(:report) { create(:ci_job_artifact, :codequality, job: build) } it 'exposes artifact details' do expect(subject[:artifact].keys).to include(:download_path, :browse_path, :keep_path, :expire_at, :expired, :locked) end end context 'when the project is public and the user is a guest' do let(:project) { create(:project, :repository, :public) } let(:user) { create(:project_member, :guest, project: project).user } context 'when the build has public archive type artifacts' do let(:build) { create(:ci_build, :artifacts) } it 'exposes public artifact details' do expect(subject[:artifact].keys).to include(:download_path, :browse_path, :locked) end end context 'when the build has non public archive type artifacts' do let(:build) { create(:ci_build, :artifacts, :non_public_artifacts, pipeline: pipeline) } it 'does not expose non public artifacts' do expect(subject.keys).not_to include(:artifact) end context 'with the non_public_artifacts feature flag disabled' do before do stub_feature_flags(non_public_artifacts: false) end it 'exposes artifact details' do expect(subject[:artifact].keys).to include(:download_path, :browse_path, :locked) end end end end end end