1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
|
# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Ci::RunnerJobsFinder, feature_category: :fleet_visibility do
let_it_be(:project) { create(:project) }
let_it_be(:runner) { create(:ci_runner, :instance) }
let_it_be(:user) { create(:user) }
let_it_be(:runner_manager) { create(:ci_runner_machine, runner: runner) }
let_it_be(:jobs) { create_list(:ci_build, 5, runner_manager: runner_manager, project: project) }
let(:params) { {} }
subject(:returned_jobs) { described_class.new(runner, user, params).execute }
before_all do
project.add_developer(user)
end
describe '#execute' do
context 'when params is empty' do
let!(:job1) { create(:ci_build, project: project) }
it 'returns all jobs assigned to Runner' do
is_expected.to match_array(jobs)
is_expected.not_to include(job1)
end
end
context 'when the user has guest access' do
it 'does not returns jobs the user does not have permission to see' do
another_project = create(:project)
job = create(:ci_build, runner: runner, project: another_project)
another_project.add_guest(user)
is_expected.not_to match_array(job)
end
end
context 'when the user is admin', :enable_admin_mode do
let_it_be(:user) { create(:user, :admin) }
it { is_expected.to match_array(jobs) }
end
context 'when user is developer' do
before_all do
project.add_developer(user)
end
it { is_expected.to match_array(jobs) }
end
context 'when the user has different access levels in different projects' do
let_it_be(:guest_project) { create(:project).tap { |p| p.add_guest(user) } }
let_it_be(:guest_jobs) { create_list(:ci_build, 2, runner: runner, project: guest_project) }
let_it_be(:reporter_project) { create(:project).tap { |p| p.add_reporter(user) } }
let_it_be(:reporter_jobs) { create_list(:ci_build, 3, runner: runner, project: reporter_project) }
it 'returns only the jobs the user has permission to see', :aggregate_failures do
is_expected.to include(*reporter_jobs)
is_expected.not_to include(*guest_jobs)
end
end
context 'when the user has reporter access level or greater' do
it 'returns jobs assigned to the Runner that the user has access to' do
is_expected.to match_array(jobs)
end
end
context 'when params contains status' do
Ci::HasStatus::AVAILABLE_STATUSES.each do |target_status|
context "when status is #{target_status}" do
let(:params) { { status: target_status } }
let(:exception_status) { (Ci::HasStatus::AVAILABLE_STATUSES - [target_status]).first }
let!(:job) { create(:ci_build, runner: runner, project: project, status: target_status) }
let!(:other_job) { create(:ci_build, runner: runner, project: project, status: exception_status) }
it 'returns matched job', :aggregate_failures do
is_expected.to include(job)
is_expected.not_to include(other_job)
end
end
end
end
context 'when system_id is specified' do
let_it_be(:runner_manager2) { create(:ci_runner_machine, runner: runner) }
let_it_be(:job2) { create(:ci_build, runner_manager: runner_manager2, project: project) }
let(:params) { { system_id: runner_manager.system_xid } }
it 'returns jobs from the specified system' do
expect(returned_jobs).to match_array(jobs)
end
context 'when specified system_id does not exist' do
let(:params) { { system_id: 'unknown_system' } }
it { is_expected.to be_empty }
end
end
context 'when order_by and sort are specified' do
context 'when order_by id and sort is asc' do
let(:params) { { order_by: 'id', sort: 'asc' } }
it 'sorts as id: :asc' do
is_expected.to eq(jobs.sort_by(&:id))
end
end
end
context 'when order_by is specified and sort is not specified' do
context 'when order_by id and sort is not specified' do
let(:params) { { order_by: 'id' } }
it 'sorts as id: :desc' do
is_expected.to eq(jobs.sort_by(&:id).reverse)
end
end
end
end
end
|