2018-11-12 13:18:57 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe ::Ci::DestroyPipelineService do
|
|
|
|
let(:project) { create(:project) }
|
|
|
|
let!(:pipeline) { create(:ci_pipeline, project: project) }
|
|
|
|
|
|
|
|
subject { described_class.new(project, user).execute(pipeline) }
|
|
|
|
|
|
|
|
context 'user is owner' do
|
|
|
|
let(:user) { project.owner }
|
|
|
|
|
|
|
|
it 'destroys the pipeline' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect { pipeline.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
|
|
end
|
|
|
|
|
2019-01-10 01:50:51 -05:00
|
|
|
it 'does not log an audit event' do
|
|
|
|
expect { subject }.not_to change { SecurityEvent.count }
|
2018-11-12 13:18:57 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the pipeline has jobs' do
|
|
|
|
let!(:build) { create(:ci_build, project: project, pipeline: pipeline) }
|
|
|
|
|
|
|
|
it 'destroys associated jobs' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect { build.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'destroys associated stages' do
|
|
|
|
stages = pipeline.stages
|
|
|
|
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(stages).to all(raise_error(ActiveRecord::RecordNotFound))
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when job has artifacts' do
|
|
|
|
let!(:artifact) { create(:ci_job_artifact, :archive, job: build) }
|
|
|
|
|
|
|
|
it 'destroys associated artifacts' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect { artifact.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'user is not owner' do
|
|
|
|
let(:user) { create(:user) }
|
|
|
|
|
2018-11-13 11:27:00 -05:00
|
|
|
it 'raises an exception' do
|
|
|
|
expect { subject }.to raise_error(Gitlab::Access::AccessDeniedError)
|
2018-11-12 13:18:57 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|