171 lines
5.4 KiB
Ruby
171 lines
5.4 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'spec_helper'
|
|
|
|
describe GitlabSchema do
|
|
let(:user) { build :user }
|
|
|
|
it 'uses batch loading' do
|
|
expect(field_instrumenters).to include(BatchLoader::GraphQL)
|
|
end
|
|
|
|
it 'enables the preload instrumenter' do
|
|
expect(field_instrumenters).to include(BatchLoader::GraphQL)
|
|
end
|
|
|
|
it 'enables the authorization instrumenter' do
|
|
expect(field_instrumenters).to include(instance_of(::Gitlab::Graphql::Authorize::Instrumentation))
|
|
end
|
|
|
|
it 'enables using presenters' do
|
|
expect(field_instrumenters).to include(instance_of(::Gitlab::Graphql::Present::Instrumentation))
|
|
end
|
|
|
|
it 'has the base mutation' do
|
|
expect(described_class.mutation).to eq(::Types::MutationType.to_graphql)
|
|
end
|
|
|
|
it 'has the base query' do
|
|
expect(described_class.query).to eq(::Types::QueryType.to_graphql)
|
|
end
|
|
|
|
it 'paginates active record relations using `Gitlab::Graphql::Connections::KeysetConnection`' do
|
|
connection = GraphQL::Relay::BaseConnection::CONNECTION_IMPLEMENTATIONS[ActiveRecord::Relation.name]
|
|
|
|
expect(connection).to eq(Gitlab::Graphql::Connections::KeysetConnection)
|
|
end
|
|
|
|
describe '.execute' do
|
|
context 'for different types of users' do
|
|
context 'when no context' do
|
|
it 'returns DEFAULT_MAX_COMPLEXITY' do
|
|
expect(GraphQL::Schema)
|
|
.to receive(:execute)
|
|
.with('query', hash_including(max_complexity: GitlabSchema::DEFAULT_MAX_COMPLEXITY))
|
|
|
|
described_class.execute('query')
|
|
end
|
|
end
|
|
|
|
context 'when no user' do
|
|
it 'returns DEFAULT_MAX_COMPLEXITY' do
|
|
expect(GraphQL::Schema)
|
|
.to receive(:execute)
|
|
.with('query', hash_including(max_complexity: GitlabSchema::DEFAULT_MAX_COMPLEXITY))
|
|
|
|
described_class.execute('query', context: {})
|
|
end
|
|
|
|
it 'returns DEFAULT_MAX_DEPTH' do
|
|
expect(GraphQL::Schema)
|
|
.to receive(:execute)
|
|
.with('query', hash_including(max_depth: GitlabSchema::DEFAULT_MAX_DEPTH))
|
|
|
|
described_class.execute('query', context: {})
|
|
end
|
|
end
|
|
|
|
context 'when a logged in user' do
|
|
it 'returns AUTHENTICATED_COMPLEXITY' do
|
|
expect(GraphQL::Schema).to receive(:execute).with('query', hash_including(max_complexity: GitlabSchema::AUTHENTICATED_COMPLEXITY))
|
|
|
|
described_class.execute('query', context: { current_user: user })
|
|
end
|
|
|
|
it 'returns AUTHENTICATED_MAX_DEPTH' do
|
|
expect(GraphQL::Schema).to receive(:execute).with('query', hash_including(max_depth: GitlabSchema::AUTHENTICATED_MAX_DEPTH))
|
|
|
|
described_class.execute('query', context: { current_user: user })
|
|
end
|
|
end
|
|
|
|
context 'when an admin user' do
|
|
it 'returns ADMIN_COMPLEXITY' do
|
|
user = build :user, :admin
|
|
|
|
expect(GraphQL::Schema).to receive(:execute).with('query', hash_including(max_complexity: GitlabSchema::ADMIN_COMPLEXITY))
|
|
|
|
described_class.execute('query', context: { current_user: user })
|
|
end
|
|
end
|
|
|
|
context 'when max_complexity passed on the query' do
|
|
it 'returns what was passed on the query' do
|
|
expect(GraphQL::Schema).to receive(:execute).with('query', hash_including(max_complexity: 1234))
|
|
|
|
described_class.execute('query', max_complexity: 1234)
|
|
end
|
|
end
|
|
|
|
context 'when max_depth passed on the query' do
|
|
it 'returns what was passed on the query' do
|
|
expect(GraphQL::Schema).to receive(:execute).with('query', hash_including(max_depth: 1234))
|
|
|
|
described_class.execute('query', max_depth: 1234)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
describe '.id_from_object' do
|
|
it 'returns a global id' do
|
|
expect(described_class.id_from_object(build(:project, id: 1))).to be_a(GlobalID)
|
|
end
|
|
|
|
it "raises a meaningful error if a global id couldn't be generated" do
|
|
expect { described_class.id_from_object(build(:wiki_directory)) }
|
|
.to raise_error(RuntimeError, /include `GlobalID::Identification` into/i)
|
|
end
|
|
end
|
|
|
|
describe '.object_from_id' do
|
|
context 'for subclasses of `ApplicationRecord`' do
|
|
it 'returns the correct record' do
|
|
user = create(:user)
|
|
|
|
result = described_class.object_from_id(user.to_global_id.to_s)
|
|
|
|
expect(result.__sync).to eq(user)
|
|
end
|
|
|
|
it 'batchloads the queries' do
|
|
user1 = create(:user)
|
|
user2 = create(:user)
|
|
|
|
expect do
|
|
[described_class.object_from_id(user1.to_global_id),
|
|
described_class.object_from_id(user2.to_global_id)].map(&:__sync)
|
|
end.not_to exceed_query_limit(1)
|
|
end
|
|
end
|
|
|
|
context 'for other classes' do
|
|
# We cannot use an anonymous class here as `GlobalID` expects `.name` not
|
|
# to return `nil`
|
|
class TestGlobalId
|
|
include GlobalID::Identification
|
|
attr_accessor :id
|
|
|
|
def initialize(id)
|
|
@id = id
|
|
end
|
|
end
|
|
|
|
it 'falls back to a regular find' do
|
|
result = TestGlobalId.new(123)
|
|
|
|
expect(TestGlobalId).to receive(:find).with("123").and_return(result)
|
|
|
|
expect(described_class.object_from_id(result.to_global_id)).to eq(result)
|
|
end
|
|
end
|
|
|
|
it 'raises the correct error on invalid input' do
|
|
expect { described_class.object_from_id("bogus id") }.to raise_error(Gitlab::Graphql::Errors::ArgumentError)
|
|
end
|
|
end
|
|
|
|
def field_instrumenters
|
|
described_class.instrumenters[:field] + described_class.instrumenters[:field_after_built_ins]
|
|
end
|
|
end
|